Denial-of-Service Vulnerability in SICLOCK Time Synchronization Products
CVE-2018-4851

8.2HIGH

Key Information:

Vendor
Siemens
Vendor
CVE Published:
3 July 2018

Summary

A vulnerability exists in SICLOCK TC100 and TC400 time synchronization products that allows an attacker with network access to induce a Denial-of-Service condition. By sending specific packets to the device, the attacker can cause the device to reboot, disrupting its core functionalities. Time services are restored automatically once synchronization with GPS or other NTP servers is re-established, but persistent attacks could hinder overall device performance and reliability.

Affected Version(s)

SICLOCK TC100, SICLOCK TC400 SICLOCK TC100 : All versions

SICLOCK TC100, SICLOCK TC400 SICLOCK TC400 : All versions

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.