A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to port 69/udp could modify the administrative client stored on the device. If a legitimate user downloads and executes the modified client from the affected device, then he/she could obtain code execution on the client system.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/104672 | third party advisory vdb entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-197012.pdf | mitigation vendor advisory |