{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Hirschmann HiSecOS EAGLE versions ant\u00e9rieures \u00e0 4.5.0","product":{"name":"N/A","vendor":{"name":"Belden","scada":true}}},{"description":"Hirschmann ligne HiOS produits : BRS, RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED versions ant\u00e9rieures \u00e0 09.2.00","product":{"name":"N/A","vendor":{"name":"Belden","scada":true}}},{"description":"Hirschmann Edge OpEdge-8D versions ant\u00e9rieures \u00e0 01.0.01 (disponible prochainement)","product":{"name":"N/A","vendor":{"name":"Belden","scada":true}}},{"description":"Hirschmann Wireless BAT-C2 versions ant\u00e9rieures \u00e0 9.14.1.0R3","product":{"name":"N/A","vendor":{"name":"Belden","scada":true}}},{"description":"Hirschmann Lite Managed GECKO versions ant\u00e9rieures \u00e0 2.3.3","product":{"name":"N/A","vendor":{"name":"Belden","scada":true}}},{"description":"Hirschmann HiSecOS EAGLE versions ant\u00e9rieures \u00e0 04.4.00","product":{"name":"N/A","vendor":{"name":"Belden","scada":true}}},{"description":"Hirschmann ligne Classic produits : RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, OCTOPUS versions ant\u00e9rieures \u00e0 09.1.08","product":{"name":"N/A","vendor":{"name":"Belden","scada":true}}},{"description":"Hirschmann Cellular Router EAGLE versions ant\u00e9rieures 6.3.7","product":{"name":"N/A","vendor":{"name":"Belden","scada":true}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2021-41991","url":"https://www.cve.org/CVERecord?id=CVE-2021-41991"},{"name":"CVE-2022-40674","url":"https://www.cve.org/CVERecord?id=CVE-2022-40674"},{"name":"CVE-2022-43680","url":"https://www.cve.org/CVERecord?id=CVE-2022-43680"}],"links":[],"reference":"CERTFR-2023-AVI-0338","revisions":[{"description":"Version initiale","revision_date":"2023-04-25T00:00:00.000000"}],"risks":[{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nBelden. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l'\u00e9diteur.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Belden","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Belden BSECV-2022-26 du 25 avril 2023","url":"https://assets.belden.com/m/6f2d4e1f6bbaeb54/original/BSECV-2022-26.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Belden BSECV-2022-29 du 24 avril 2023","url":"https://assets.belden.com/m/25e4130e915c61a1/original/Belden_Security_Bulletin_BSECV-2022-29_A01.pdf"}]}
