A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could potentially circumvent the authentication mechanism if he/she is able to obtain certain knowledge specific to the attacked device.
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/104672 | third party advisory vdb entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdf | mitigation vendor advisory |