Show plain JSON{"id": "CVE-2019-6569", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.4, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.1, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.2, "exploitabilityScore": 3.9}]}, "published": "2019-03-26T22:29:00.833", "references": [{"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-557804.pdf", "tags": ["Patch", "Vendor Advisory"], "source": "productcert@siemens.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "productcert@siemens.com", "description": [{"lang": "en", "value": "CWE-440"}]}, {"type": "Secondary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The monitor barrier of the affected products insufficiently blocks data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior."}, {"lang": "es", "value": "La barrera de monitorizaci\u00f3n de los productos afectados bloquea insuficientemente el reenv\u00edo de datos a trav\u00e9s del puerto espejo hacia la red reflejada. Un atacante podr\u00eda utilizar este comportamiento para transmitir paquetes maliciosos a los sistemas de la red en espejo, posiblemente influyendo en su configuraci\u00f3n y comportamiento en tiempo de ejecuci\u00f3n"}], "lastModified": "2022-07-12T14:15:13.240", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:scalance_x-200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "443B5E7B-A491-4883-9853-A88D3B24E220", "versionEndExcluding": "5.2.4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:scalance_x-200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6FEF9F9F-4066-483B-BF95-3BA5625284DF"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:scalance_x-300_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "076F3DDE-2B70-4F53-9B12-7CE3D9641E7E", "versionEndExcluding": "4.1.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:scalance_x-300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B2D0AB50-6F0B-4232-8C8E-1647410D362D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:scalance_xp-200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E81AEF3-1F99-4728-B3E1-FFBB22DA64E5", "versionEndExcluding": "4.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:scalance_xp-200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8F962FC7-0616-467F-8CCA-ADEA224B5F7B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:scalance_xc-200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C098F765-4BA2-4E59-9875-35FB5B83B6EB", "versionEndExcluding": "4.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:scalance_xc-200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7719E194-EE3D-4CE8-8C85-CF0D82A553AA"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:scalance_xf-200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB0A1BD9-F58D-4BF4-BF8B-EA8A0A7A1C64", "versionEndExcluding": "4.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:scalance_xf-200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BB503096-C528-478C-BD07-019C2CC882E4"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "productcert@siemens.com"}