VAR-200203-0070
Vulnerability from variot - Updated: 2025-04-03 22:16Siemens 3568i WAP mobile phones allows remote attackers to cause a denial of service (crash) via an SMS message containing unusual characters. Siemens has a certain number of user groups for the production of various types of mobile phone products.
Some models of Siemens phones have problems with the short message processing function. Malicious attackers can use this vulnerability to make the phone unable to receive short messages.
When the mobile phone receives SMS short messages that contain certain illegal characters, the mobile phone will shut down by mistake when trying to view these messages. Because some models of mobile phones can only be viewed before deleting, these malicious short messages cannot be deleted. When the receiving queue of the mobile phone is filled with malicious short messages, the mobile phone cannot continue to receive short messages. If enough messages are sent, SMS functionality may be completely denied
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200203-0070",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "3568i wap",
"scope": "eq",
"trust": 1.6,
"vendor": "siemens",
"version": "0.0"
},
{
"model": null,
"scope": null,
"trust": 0.6,
"vendor": "none",
"version": null
},
{
"model": "3568i wap",
"scope": null,
"trust": 0.3,
"vendor": "siemens",
"version": null
},
{
"model": "sl45/6688",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2002-0057"
},
{
"db": "BID",
"id": "3870"
},
{
"db": "CNNVD",
"id": "CNNVD-200203-084"
},
{
"db": "NVD",
"id": "CVE-2002-0122"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "benjurry\u203b benjurry@263.net",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200203-084"
}
],
"trust": 0.6
},
"cve": "CVE-2002-0122",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2002-0122",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2002-0122",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200203-084",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200203-084"
},
{
"db": "NVD",
"id": "CVE-2002-0122"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens 3568i WAP mobile phones allows remote attackers to cause a denial of service (crash) via an SMS message containing unusual characters. Siemens has a certain number of user groups for the production of various types of mobile phone products. \n\n\u00a0Some models of Siemens phones have problems with the short message processing function. Malicious attackers can use this vulnerability to make the phone unable to receive short messages. \n\n\u00a0When the mobile phone receives SMS short messages that contain certain illegal characters, the mobile phone will shut down by mistake when trying to view these messages. Because some models of mobile phones can only be viewed before deleting, these malicious short messages cannot be deleted. When the receiving queue of the mobile phone is filled with malicious short messages, the mobile phone cannot continue to receive short messages. If enough messages are sent, SMS functionality may be completely denied",
"sources": [
{
"db": "NVD",
"id": "CVE-2002-0122"
},
{
"db": "CNVD",
"id": "CNVD-2002-0057"
},
{
"db": "BID",
"id": "3870"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2002-0122",
"trust": 2.5
},
{
"db": "BID",
"id": "3870",
"trust": 1.9
},
{
"db": "CNVD",
"id": "CNVD-2002-0057",
"trust": 0.6
},
{
"db": "XF",
"id": "7902",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20020114 SIEMENS MOBIE SMS EXCEPTIONAL CHARACTER VULNERABILITY",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200203-084",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2002-0057"
},
{
"db": "BID",
"id": "3870"
},
{
"db": "CNNVD",
"id": "CNNVD-200203-084"
},
{
"db": "NVD",
"id": "CVE-2002-0122"
}
]
},
"id": "VAR-200203-0070",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2002-0057"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2002-0057"
}
]
},
"last_update_date": "2025-04-03T22:16:56.762000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2002-0122"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "http://online.securityfocus.com/archive/1/250115"
},
{
"trust": 1.6,
"url": "http://www.iss.net/security_center/static/7902.php"
},
{
"trust": 1.6,
"url": "http://www.securityfocus.com/bid/3870"
},
{
"trust": 0.3,
"url": "http://www.siemens.com/page/1,3771,257605-1-999_0_0-0,00.html"
},
{
"trust": 0.3,
"url": "http://www.siemens.com/page/1,3771,257599-1-999_0_0-0,00.html"
}
],
"sources": [
{
"db": "BID",
"id": "3870"
},
{
"db": "CNNVD",
"id": "CNNVD-200203-084"
},
{
"db": "NVD",
"id": "CVE-2002-0122"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2002-0057"
},
{
"db": "BID",
"id": "3870"
},
{
"db": "CNNVD",
"id": "CNNVD-200203-084"
},
{
"db": "NVD",
"id": "CVE-2002-0122"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2002-01-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2002-0057"
},
{
"date": "2002-01-13T00:00:00",
"db": "BID",
"id": "3870"
},
{
"date": "2002-01-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200203-084"
},
{
"date": "2002-03-25T05:00:00",
"db": "NVD",
"id": "CVE-2002-0122"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2002-01-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2002-0057"
},
{
"date": "2009-07-11T09:56:00",
"db": "BID",
"id": "3870"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200203-084"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2002-0122"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200203-084"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens Mobile Phone Short Message Denial of Service Attack Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2002-0057"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200203-084"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.