Common vulnerabilities and Exposures (CVE)

Skip to main content

Required CVE Record Information

Description

A vulnerability has been identified in SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0) (All versions < V4.2), SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0) (All versions < V4.2), SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0) (All versions < V4.2), SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0) (All versions < V4.2), SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0) (All versions < V4.2), SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0) (All versions < V4.2), SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0) (All versions < V4.2), SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0) (All versions < V4.2), SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0) (All versions < V4.2), SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0) (All versions < V4.2), SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0) (All versions < V4.2), SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0) (All versions < V4.2), SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0) (All versions < V4.2), SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0) (All versions < V4.2), SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0) (All versions < V4.2), SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0) (All versions < V4.2), SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0) (All versions < V4.2), SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0) (All versions < V4.2), SIMATIC RF1140R (6GT2831-6CB00) (All versions < V1.1), SIMATIC RF1170R (6GT2831-6BB00) (All versions < V1.1), SIMATIC RF166C (6GT2002-0EE20) (All versions < V2.2), SIMATIC RF185C (6GT2002-0JE10) (All versions < V2.2), SIMATIC RF186C (6GT2002-0JE20) (All versions < V2.2), SIMATIC RF186CI (6GT2002-0JE50) (All versions < V2.2), SIMATIC RF188C (6GT2002-0JE40) (All versions < V2.2), SIMATIC RF188CI (6GT2002-0JE60) (All versions < V2.2), SIMATIC RF360R (6GT2801-5BA30) (All versions < V2.2). The service log files of the affected application can be accessed without proper authentication. This could allow an unauthenticated attacker to get access to sensitive information.

CVSS 2 Total

ScoreSeverityVersionVector String
5.3MEDIUM3.1CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
6.0MEDIUM4.0CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Product Status

Learn more

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Versions 1 Total

Default Status: unknown

affected

Authorized Data Publishers