VAR-202501-1355
Vulnerability from variot - Updated: 2025-11-18 15:35A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.80), SIPROTEC 5 6MD85 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 6MD86 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 6MD89 (CP300) (All versions >= V7.80 < V9.68), SIPROTEC 5 6MU85 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7KE85 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7SA82 (CP100) (All versions >= V7.80 < V8.90), SIPROTEC 5 7SA82 (CP150) (All versions < V9.80), SIPROTEC 5 7SA86 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7SA87 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7SD82 (CP100) (All versions >= V7.80 < V8.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.80), SIPROTEC 5 7SD86 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7SD87 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7SJ81 (CP100) (All versions >= V7.80 < V8.90), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.80), SIPROTEC 5 7SJ82 (CP100) (All versions >= V7.80 < V8.90), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.80), SIPROTEC 5 7SJ85 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7SJ86 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7SK82 (CP100) (All versions >= V7.80 < V8.90), SIPROTEC 5 7SK82 (CP150) (All versions < V9.80), SIPROTEC 5 7SK85 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7SL82 (CP100) (All versions >= V7.80 < V8.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.80), SIPROTEC 5 7SL86 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7SL87 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7SS85 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7ST85 (CP300) (All versions < V9.68), SIPROTEC 5 7ST86 (CP300) (All versions < V9.80), SIPROTEC 5 7SX82 (CP150) (All versions < V9.80), SIPROTEC 5 7SX85 (CP300) (All versions < V9.80), SIPROTEC 5 7SY82 (CP150) (All versions < V9.80), SIPROTEC 5 7UM85 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7UT82 (CP100) (All versions >= V7.80 < V8.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.80), SIPROTEC 5 7UT85 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7UT86 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7UT87 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7VE85 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7VK87 (CP300) (All versions >= V7.80 < V9.80), SIPROTEC 5 7VU85 (CP300) (All versions < V9.80), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.80). Affected devices do not properly limit the path accessible via their webserver. This could allow an authenticated remote attacker to read arbitrary files from the filesystem of affected devices. SIPROTEC 5 devices provide a range of integrated protection, control, measurement and automation functions for substations and other application areas.
Siemens SIPROTEC 5 has an improper file access restriction vulnerability
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202501-1355",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "siprotec compact 7sx800",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7sa82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7sd82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7sj81",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7sj82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7sk82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7sl82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7sx82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7sy82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7ut82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 6md84",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 6md85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 6md86",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 6md89",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80"
},
{
"model": "siprotec 6mu85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7ke85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7sa86",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7sa87",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7sd86",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7sd87",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7sj85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7sj86",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7sk85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7sl86",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7sl87",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7ss85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7st85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5"
},
{
"model": "siprotec 7st86",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7sx85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7um85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7ut85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7ut86",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7ut87",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7ve85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7vk87",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80,\u003cv9.80"
},
{
"model": "siprotec 7vu85",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003cv9.80"
},
{
"model": "siprotec 7sa82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80"
},
{
"model": "siprotec 7sd82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80"
},
{
"model": "siprotec 7sj81",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80"
},
{
"model": "siprotec 7sj82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80"
},
{
"model": "siprotec 7sl82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80"
},
{
"model": "siprotec 7ut82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80"
},
{
"model": "siprotec 7sk82",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "5\u003e=v7.80"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-01697"
}
]
},
"cve": "CVE-2024-53649",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2025-01697",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "productcert@siemens.com",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2024-53649",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
],
"severity": [
{
"author": "productcert@siemens.com",
"id": "CVE-2024-53649",
"trust": 1.0,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2025-01697",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-01697"
},
{
"db": "NVD",
"id": "CVE-2024-53649"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions \u003c V9.80), SIPROTEC 5 6MD85 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 6MD86 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 6MD89 (CP300) (All versions \u003e= V7.80 \u003c V9.68), SIPROTEC 5 6MU85 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7KE85 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7SA82 (CP100) (All versions \u003e= V7.80 \u003c V8.90), SIPROTEC 5 7SA82 (CP150) (All versions \u003c V9.80), SIPROTEC 5 7SA86 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7SA87 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7SD82 (CP100) (All versions \u003e= V7.80 \u003c V8.90), SIPROTEC 5 7SD82 (CP150) (All versions \u003c V9.80), SIPROTEC 5 7SD86 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7SD87 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7SJ81 (CP100) (All versions \u003e= V7.80 \u003c V8.90), SIPROTEC 5 7SJ81 (CP150) (All versions \u003c V9.80), SIPROTEC 5 7SJ82 (CP100) (All versions \u003e= V7.80 \u003c V8.90), SIPROTEC 5 7SJ82 (CP150) (All versions \u003c V9.80), SIPROTEC 5 7SJ85 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7SJ86 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7SK82 (CP100) (All versions \u003e= V7.80 \u003c V8.90), SIPROTEC 5 7SK82 (CP150) (All versions \u003c V9.80), SIPROTEC 5 7SK85 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7SL82 (CP100) (All versions \u003e= V7.80 \u003c V8.90), SIPROTEC 5 7SL82 (CP150) (All versions \u003c V9.80), SIPROTEC 5 7SL86 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7SL87 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7SS85 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7ST85 (CP300) (All versions \u003c V9.68), SIPROTEC 5 7ST86 (CP300) (All versions \u003c V9.80), SIPROTEC 5 7SX82 (CP150) (All versions \u003c V9.80), SIPROTEC 5 7SX85 (CP300) (All versions \u003c V9.80), SIPROTEC 5 7SY82 (CP150) (All versions \u003c V9.80), SIPROTEC 5 7UM85 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7UT82 (CP100) (All versions \u003e= V7.80 \u003c V8.90), SIPROTEC 5 7UT82 (CP150) (All versions \u003c V9.80), SIPROTEC 5 7UT85 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7UT86 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7UT87 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7VE85 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7VK87 (CP300) (All versions \u003e= V7.80 \u003c V9.80), SIPROTEC 5 7VU85 (CP300) (All versions \u003c V9.80), SIPROTEC 5 Compact 7SX800 (CP050) (All versions \u003c V9.80). Affected devices do not properly limit the path accessible via their webserver. This could allow an authenticated remote attacker to read arbitrary files from the filesystem of affected devices. SIPROTEC 5 devices provide a range of integrated protection, control, measurement and automation functions for substations and other application areas. \n\nSiemens SIPROTEC 5 has an improper file access restriction vulnerability",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-53649"
},
{
"db": "CNVD",
"id": "CNVD-2025-01697"
}
],
"trust": 1.44
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-53649",
"trust": 1.6
},
{
"db": "SIEMENS",
"id": "SSA-194557",
"trust": 1.6
},
{
"db": "CNVD",
"id": "CNVD-2025-01697",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-01697"
},
{
"db": "NVD",
"id": "CVE-2024-53649"
}
]
},
"id": "VAR-202501-1355",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-01697"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-01697"
}
]
},
"last_update_date": "2025-11-18T15:35:23.896000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-552",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2024-53649"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "https://cert-portal.siemens.com/productcert/html/ssa-194557.html"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-01697"
},
{
"db": "NVD",
"id": "CVE-2024-53649"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2025-01697"
},
{
"db": "NVD",
"id": "CVE-2024-53649"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-01-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-01697"
},
{
"date": "2025-01-14T11:15:16.820000",
"db": "NVD",
"id": "CVE-2024-53649"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-01-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-01697"
},
{
"date": "2025-11-11T21:15:36.383000",
"db": "NVD",
"id": "CVE-2024-53649"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens SIPROTEC 5 Improper File Access Restriction Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-01697"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.