{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"commutateurs SCALANCE X-300 (y compris X408 et SIPLUS NET) versions ant\u00e9rieures \u00e0 V4.1.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SINEMA Server versions ant\u00e9rieures \u00e0 V14.0 SP2 Update 1","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"commutateurs SCALANCE X-200RNA","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SINAMICS PERFECT HARMONY GH180","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"TIA Portal V14","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"TIA Portal V16","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"TIA Portal V15 versions ant\u00e9rieures \u00e0 V15.1 Upd 4","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2019-10934","url":"https://www.cve.org/CVERecord?id=CVE-2019-10934"},{"name":"CVE-2019-13933","url":"https://www.cve.org/CVERecord?id=CVE-2019-13933"},{"name":"CVE-2019-10940","url":"https://www.cve.org/CVERecord?id=CVE-2019-10940"},{"name":"CVE-2019-19278","url":"https://www.cve.org/CVERecord?id=CVE-2019-19278"}],"links":[],"reference":"CERTFR-2020-AVI-023","revisions":[{"description":"Version initiale","revision_date":"2020-01-14T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Siemens ssa-880233 du 14 janvier 2020","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-880233.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Siemens ssa-629512 du 14 janvier 2020","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-629512.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Siemens ssa-443566 du 14 janvier 2020","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-443566.pdf"},{"published_at":null,"title":"Note d'information Siemens ssb-382508 du 14 janvier 2020","url":"https://cert-portal.siemens.com/productcert/pdf/ssb-382508.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Siemens ssa-242353 du 14 janvier 2020","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-242353.pdf"}]}
