Siemens (CVE-2014-0224) - Nessus
High Plugin ID: 500473This page contains detailed information about the Siemens (CVE-2014-0224) Nessus plugin including available exploits and PoCs found on GitHub, in Metasploit or Exploit-DB for verifying of this vulnerability.
Plugin Overview
ID: 500473
Name: Siemens (CVE-2014-0224)
Filename: tenable_ot_siemens_CVE-2014-0224.nasl
Vulnerability Published: 2014-06-05
This Plugin Published: 2022-02-07
Last Modification Time: 2022-02-07
Plugin Version: 1.1
Plugin Type: remote
Plugin Family: Tenable.ot
Dependencies:
tenable_ot_api_integration.nasl
Required KB Items [?]: Tenable.ot/Siemens
Vulnerability Information
Severity: High
Vulnerability Published: 2014-06-05
Patch Published: 2014-06-05
CVE [?]: CVE-2014-0224
CPE [?]: cpe:/o:siemens:s7-1500_firmware
Synopsis
The remote OT asset is affected by a vulnerability.
Description
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the CCS Injection vulnerability.
This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.
Solution
Refer to the vendor advisory.
Public Exploits
Target Network Port(s): N/A
Target Asset(s): N/A
Exploit Available: True (GitHub)
Exploit Ease: Exploits (PoCs) are available
Here's the list of publicly known exploits and PoCs for verifying the Siemens (CVE-2014-0224) vulnerability:
- GitHub: https://github.com/84KaliPleXon3/a2sv
[CVE-2014-0224] - GitHub: https://github.com/Artem-Salnikov/devops-netology
[CVE-2014-0224] - GitHub: https://github.com/F4RM0X/script_a2sv
[CVE-2014-0224] - GitHub: https://github.com/H4CK3RT3CH/a2sv
[CVE-2014-0224] - GitHub: https://github.com/Mre11i0t/a2sv
[CVE-2014-0224] - GitHub: https://github.com/SSLyze410-SSLGrader-wCipherSuite-info/ssl-grader
[CVE-2014-0224] - GitHub: https://github.com/SSLyze410-SSLGrader-wCipherSuite-info/ssl-wrapping-grader
[CVE-2014-0224] - GitHub: https://github.com/Tripwire/OpenSSL-CCS-Inject-Test
[CVE-2014-0224: This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a ...] - GitHub: https://github.com/Vladislav-Pugachev/netology-DevOps-dz_-14
[CVE-2014-0224] - GitHub: https://github.com/WiktorMysz/devops-netology
[CVE-2014-0224] - GitHub: https://github.com/alexandrburyakov/Rep2
[CVE-2014-0224] - GitHub: https://github.com/bysart/devops-netology
[CVE-2014-0224] - GitHub: https://github.com/droptables/ccs-eval
[CVE-2014-0224: Used for evaluating hosts for CVE-2014-0224] - GitHub: https://github.com/fireorb/sslscanner
[CVE-2014-0224] - GitHub: https://github.com/giusepperuggiero96/Network-Security-2021
[CVE-2014-0224] - GitHub: https://github.com/ilya-starchikov/devops-netology
[CVE-2014-0224] - GitHub: https://github.com/iph0n3/CVE-2014-0224
[CVE-2014-0224] - GitHub: https://github.com/korotkov-dmitry/03-sysadmin-09-security
[CVE-2014-0224] - GitHub: https://github.com/krabelize/openbsd-httpd-tls-perfect-ssllabs-score
[CVE-2014-0224] - GitHub: https://github.com/nkiselyov/devops-netology
[CVE-2014-0224] - GitHub: https://github.com/nyc-tophile/A2SV--SSL-VUL-Scan
[CVE-2014-0224: A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, ...] - GitHub: https://github.com/pashicop/3.9_1
[CVE-2014-0224] - GitHub: https://github.com/secretnonempty/CVE-2014-0224
[CVE-2014-0224] - GitHub: https://github.com/ssllabs/openssl-ccs-cve-2014-0224
[CVE-2014-0224] - GitHub: https://github.com/takuzoo3868/laputa
[CVE-2014-0224] - GitHub: https://github.com/vshaliii/Hacklab-Vulnix
[CVE-2014-0224] - GitHub: https://github.com/yellownine/netology-DevOps
[CVE-2014-0224]
Before running any exploit against any system, make sure you are authorized by the owner of the target system(s) to perform such activity. In any other case, this would be considered as an illegal activity.
WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. These exploits and PoCs could contain malware. For more information, see how to use exploits safely.
Risk Information
CVSS Score Source [?]: CVE-2014-0224
CVSS V2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSS Base Score: | 5.8 (Medium) |
Impact Subscore: | 4.9 |
Exploitability Subscore: | 8.6 |
CVSS Temporal Score: | NA (None) |
CVSS Environmental Score: | NA (None) |
Modified Impact Subscore: | NA |
Overall CVSS Score: | 5.8 (Medium) |
CVSS Base Score: | 7.4 (High) |
Impact Subscore: | 5.2 |
Exploitability Subscore: | 2.2 |
CVSS Temporal Score: | NA (None) |
CVSS Environmental Score: | NA (None) |
Modified Impact Subscore: | NA |
Overall CVSS Score: | 7.4 (High) |
Go back to menu.
Plugin Source
This is the tenable_ot_siemens_CVE-2014-0224.nasl nessus plugin source code. This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(500473);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/02/07");
script_cve_id("CVE-2014-0224");
script_xref(name:"SECUNIA", value:"59191");
script_xref(name:"SECUNIA", value:"58579");
script_xref(name:"SECUNIA", value:"59438");
script_xref(name:"SECUNIA", value:"59301");
script_xref(name:"SECUNIA", value:"59721");
script_xref(name:"SECUNIA", value:"59491");
script_xref(name:"SECUNIA", value:"59450");
script_xref(name:"SECUNIA", value:"59655");
script_xref(name:"SECUNIA", value:"59659");
script_xref(name:"SECUNIA", value:"58639");
script_xref(name:"SECUNIA", value:"58759");
script_xref(name:"SECUNIA", value:"59043");
script_xref(name:"SECUNIA", value:"59666");
script_xref(name:"SECUNIA", value:"59126");
script_xref(name:"HP", value:"HPSBMU03070");
script_xref(name:"SECUNIA", value:"59055");
script_xref(name:"SECUNIA", value:"59490");
script_xref(name:"SECUNIA", value:"59514");
script_xref(name:"SECUNIA", value:"59602");
script_xref(name:"SECUNIA", value:"59495");
script_xref(name:"SECUNIA", value:"58930");
script_xref(name:"SECUNIA", value:"59370");
script_xref(name:"SECUNIA", value:"59012");
script_xref(name:"SECUNIA", value:"58385");
script_xref(name:"SECUNIA", value:"59120");
script_xref(name:"SECUNIA", value:"59162");
script_xref(name:"SECUNIA", value:"58939");
script_xref(name:"SECUNIA", value:"59528");
script_xref(name:"SECUNIA", value:"59063");
script_xref(name:"SECUNIA", value:"58128");
script_xref(name:"SECUNIA", value:"59442");
script_xref(name:"SECUNIA", value:"59824");
script_xref(name:"SECUNIA", value:"59827");
script_xref(name:"SECUNIA", value:"59669");
script_xref(name:"SECUNIA", value:"59413");
script_xref(name:"SECUNIA", value:"59300");
script_xref(name:"SECUNIA", value:"59383");
script_xref(name:"SECUNIA", value:"59885");
script_xref(name:"SECUNIA", value:"59459");
script_xref(name:"SECUNIA", value:"58745");
script_xref(name:"SECUNIA", value:"59530");
script_xref(name:"SECUNIA", value:"59589");
script_xref(name:"SECUNIA", value:"59451");
script_xref(name:"SECUNIA", value:"59506");
script_xref(name:"SECUNIA", value:"59894");
script_xref(name:"SECUNIA", value:"60049");
script_xref(name:"SECUNIA", value:"58743");
script_xref(name:"SECUNIA", value:"59342");
script_xref(name:"SECUNIA", value:"59325");
script_xref(name:"SECUNIA", value:"59354");
script_xref(name:"SECUNIA", value:"59916");
script_xref(name:"RHSA", value:"RHSA-2014:0624");
script_xref(name:"HP", value:"HPSBMU03058");
script_xref(name:"RHSA", value:"RHSA-2014:0631");
script_xref(name:"RHSA", value:"RHSA-2014:0632");
script_xref(name:"RHSA", value:"RHSA-2014:0630");
script_xref(name:"RHSA", value:"RHSA-2014:0627");
script_xref(name:"HP", value:"HPSBMU03053");
script_xref(name:"RHSA", value:"RHSA-2014:0680");
script_xref(name:"RHSA", value:"RHSA-2014:0633");
script_xref(name:"RHSA", value:"RHSA-2014:0626");
script_xref(name:"SECUNIA", value:"60066");
script_xref(name:"SECUNIA", value:"59990");
script_xref(name:"SECUNIA", value:"60522");
script_xref(name:"SECUNIA", value:"60577");
script_xref(name:"SECUNIA", value:"59784");
script_xref(name:"SECUNIA", value:"59878");
script_xref(name:"SECUNIA", value:"60176");
script_xref(name:"SECUNIA", value:"60567");
script_xref(name:"SECUNIA", value:"60571");
script_xref(name:"SECUNIA", value:"60819");
script_xref(name:"HP", value:"HPSBST03103");
script_xref(name:"HP", value:"HPSBHF03145");
script_xref(name:"HP", value:"HPSBST03106");
script_xref(name:"HP", value:"HPSBST03097");
script_xref(name:"HP", value:"HPSBPI03107");
script_xref(name:"HP", value:"HPSBMU03083");
script_xref(name:"SECUNIA", value:"61815");
script_xref(name:"HP", value:"HPSBST03265");
script_xref(name:"HP", value:"SSRT101818");
script_xref(name:"SuSE", value:"openSUSE-SU-2015:0229");
script_xref(name:"SuSE", value:"SUSE-SU-2015:0578");
script_xref(name:"HP", value:"HPSBST03195");
script_xref(name:"HP", value:"HPSBHF03052");
script_xref(name:"HP", value:"HPSBMU03051");
script_xref(name:"HP", value:"HPSBMU03065");
script_xref(name:"HP", value:"HPSBMU03074");
script_xref(name:"HP", value:"HPSBGN03050");
script_xref(name:"HP", value:"HPSBST03098");
script_xref(name:"HP", value:"HPSBMU03089");
script_xref(name:"HP", value:"HPSBMU03101");
script_xref(name:"HP", value:"HPSBMU03071");
script_xref(name:"HP", value:"HPSBMU03055");
script_xref(name:"HP", value:"HPSBUX03046");
script_xref(name:"HP", value:"HPSBMU03094");
script_xref(name:"HP", value:"HPSBGN03068");
script_xref(name:"HP", value:"HPSBMU03057");
script_xref(name:"HP", value:"HPSBMU03078");
script_xref(name:"HP", value:"HPSBOV03047");
script_xref(name:"HP", value:"HPSBMU03076");
script_xref(name:"HP", value:"HPSBMU03056");
script_xref(name:"HP", value:"HPSBMU03062");
script_xref(name:"HP", value:"HPSBHF03088");
script_xref(name:"SuSE", value:"openSUSE-SU-2016:0640");
script_xref(name:"SuSE", value:"SUSE-SU-2015:0743");
script_xref(name:"GLSA", value:"GLSA-201407-05");
script_xref(name:"SECUNIA", value:"61254");
script_xref(name:"SECUNIA", value:"59677");
script_xref(name:"SECUNIA", value:"59661");
script_xref(name:"SECUNIA", value:"59529");
script_xref(name:"SECUNIA", value:"59525");
script_xref(name:"SECUNIA", value:"59518");
script_xref(name:"SECUNIA", value:"59502");
script_xref(name:"SECUNIA", value:"59483");
script_xref(name:"SECUNIA", value:"59460");
script_xref(name:"SECUNIA", value:"59454");
script_xref(name:"SECUNIA", value:"59449");
script_xref(name:"SECUNIA", value:"59448");
script_xref(name:"SECUNIA", value:"59447");
script_xref(name:"SECUNIA", value:"59446");
script_xref(name:"SECUNIA", value:"59445");
script_xref(name:"SECUNIA", value:"59444");
script_xref(name:"SECUNIA", value:"59441");
script_xref(name:"SECUNIA", value:"59440");
script_xref(name:"SECUNIA", value:"59437");
script_xref(name:"SECUNIA", value:"59435");
script_xref(name:"SECUNIA", value:"59429");
script_xref(name:"SECUNIA", value:"59389");
script_xref(name:"SECUNIA", value:"59380");
script_xref(name:"SECUNIA", value:"59375");
script_xref(name:"SECUNIA", value:"59374");
script_xref(name:"SECUNIA", value:"59368");
script_xref(name:"SECUNIA", value:"59365");
script_xref(name:"SECUNIA", value:"59364");
script_xref(name:"SECUNIA", value:"59362");
script_xref(name:"SECUNIA", value:"59347");
script_xref(name:"SECUNIA", value:"59338");
script_xref(name:"SECUNIA", value:"59310");
script_xref(name:"SECUNIA", value:"59306");
script_xref(name:"SECUNIA", value:"59305");
script_xref(name:"SECUNIA", value:"59287");
script_xref(name:"SECUNIA", value:"59284");
script_xref(name:"SECUNIA", value:"59282");
script_xref(name:"SECUNIA", value:"59264");
script_xref(name:"SECUNIA", value:"59231");
script_xref(name:"SECUNIA", value:"59223");
script_xref(name:"SECUNIA", value:"59215");
script_xref(name:"SECUNIA", value:"59214");
script_xref(name:"SECUNIA", value:"59211");
script_xref(name:"SECUNIA", value:"59202");
script_xref(name:"SECUNIA", value:"59192");
script_xref(name:"SECUNIA", value:"59190");
script_xref(name:"SECUNIA", value:"59189");
script_xref(name:"SECUNIA", value:"59188");
script_xref(name:"SECUNIA", value:"59186");
script_xref(name:"SECUNIA", value:"59175");
script_xref(name:"SECUNIA", value:"59167");
script_xref(name:"SECUNIA", value:"59163");
script_xref(name:"SECUNIA", value:"59142");
script_xref(name:"SECUNIA", value:"59135");
script_xref(name:"SECUNIA", value:"59132");
script_xref(name:"SECUNIA", value:"59101");
script_xref(name:"SECUNIA", value:"59093");
script_xref(name:"SECUNIA", value:"59040");
script_xref(name:"SECUNIA", value:"59004");
script_xref(name:"SECUNIA", value:"58977");
script_xref(name:"SECUNIA", value:"58945");
script_xref(name:"SECUNIA", value:"58742");
script_xref(name:"SECUNIA", value:"58719");
script_xref(name:"SECUNIA", value:"58716");
script_xref(name:"SECUNIA", value:"58714");
script_xref(name:"SECUNIA", value:"58713");
script_xref(name:"SECUNIA", value:"58667");
script_xref(name:"SECUNIA", value:"58660");
script_xref(name:"SECUNIA", value:"58615");
script_xref(name:"SECUNIA", value:"58492");
script_xref(name:"SECUNIA", value:"58433");
script_xref(name:"SECUNIA", value:"58337");
script_xref(name:"FEDORA", value:"FEDORA-2014-9308");
script_xref(name:"FEDORA", value:"FEDORA-2014-9301");
script_name(english:"Siemens (CVE-2014-0224)");
script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
script_set_attribute(attribute:"description", value:
"OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of
ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in
certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a
crafted TLS handshake, aka the CCS Injection vulnerability.
This plugin only works with Tenable.ot. Please visit
https://www.tenable.com/products/tenable-ot for more information.");
script_set_attribute(attribute:"see_also", value:"http://www.openssl.org/news/secadv_20140605.txt");
script_set_attribute(attribute:"see_also", value:"http://ccsinjection.lepidum.co.jp");
script_set_attribute(attribute:"see_also", value:"http://www.kb.cert.org/vuls/id/978508");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1103586");
# https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c19c03e5");
script_set_attribute(attribute:"see_also", value:"https://www.imperialviolet.org/2014/06/05/earlyccs.html");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/site/blogs/766093/posts/908133");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59191");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58579");
script_set_attribute(attribute:"see_also", value:"https://kb.bluecoat.com/index?page=content&id=SA80");
# http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?5539aa9d");
script_set_attribute(attribute:"see_also", value:"http://www.kerio.com/support/kerio-control/release-history");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59438");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676035");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59301");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59721");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59491");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59450");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676845");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59655");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21677695");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59659");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58639");
# http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d68c75da");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58759");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21678289");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59043");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59666");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59126");
# http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?25e3d768");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140499864129699&w=2");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21677567");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59055");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59490");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676419");
# https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?23273edc");
script_set_attribute(attribute:"see_also", value:"http://www.novell.com/support/kb/doc.php?id=7015300");
# http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2115f75f");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21673137");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59514");
script_set_attribute(attribute:"see_also", value:"http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59602");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59495");
script_set_attribute(attribute:"see_also", value:"http://www.novell.com/support/kb/doc.php?id=7015264");
script_set_attribute(attribute:"see_also", value:"http://esupport.trendmicro.com/solution/en-US/1103813.aspx");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58930");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59370");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59012");
script_set_attribute(attribute:"see_also", value:"http://www.blackberry.com/btsc/KB36051");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58385");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676655");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59120");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59162");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58939");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59528");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59063");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21677828");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58128");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676062");
script_set_attribute(attribute:"see_also", value:"https://kc.mcafee.com/corporate/index?page=content&id=SB10075");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676496");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21678167");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59442");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59824");
# http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2a8d3d74");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21677527");
# https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d8f6abfb");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59827");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59669");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59413");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24037761");
# http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6b98b564");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21677390");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59300");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59383");
script_set_attribute(attribute:"see_also", value:"http://www.splunk.com/view/SP-CAAAM2D");
script_set_attribute(attribute:"see_also", value:"https://discussions.nessus.org/thread/7517");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59885");
# http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?46b88aa1");
# http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?7de2f8eb");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59459");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58745");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59530");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59589");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59451");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=isg400001843");
script_set_attribute(attribute:"see_also", value:"http://www.fortiguard.com/advisory/FG-IR-14-018/");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59506");
script_set_attribute(attribute:"see_also", value:"https://filezilla-project.org/versions.php?type=server");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=isg400001841");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59894");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/60049");
# https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3014ab34");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58743");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59342");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59325");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59354");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59916");
script_set_attribute(attribute:"see_also", value:"http://rhn.redhat.com/errata/RHSA-2014-0624.html");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140386311427810&w=2");
script_set_attribute(attribute:"see_also", value:"http://rhn.redhat.com/errata/RHSA-2014-0631.html");
script_set_attribute(attribute:"see_also", value:"http://rhn.redhat.com/errata/RHSA-2014-0632.html");
script_set_attribute(attribute:"see_also", value:"http://rhn.redhat.com/errata/RHSA-2014-0630.html");
script_set_attribute(attribute:"see_also", value:"http://rhn.redhat.com/errata/RHSA-2014-0627.html");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140369637402535&w=2");
script_set_attribute(attribute:"see_also", value:"http://rhn.redhat.com/errata/RHSA-2014-0680.html");
script_set_attribute(attribute:"see_also", value:"http://rhn.redhat.com/errata/RHSA-2014-0633.html");
script_set_attribute(attribute:"see_also", value:"http://rhn.redhat.com/errata/RHSA-2014-0626.html");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/60066");
script_set_attribute(attribute:"see_also", value:"http://puppetlabs.com/security/cve/cve-2014-0224");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59990");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/60522");
script_set_attribute(attribute:"see_also", value:"http://linux.oracle.com/errata/ELSA-2014-1053.html");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/60577");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59784");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59878");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/60176");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/60567");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/60571");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/60819");
script_set_attribute(attribute:"see_also", value:"http://support.apple.com/kb/HT6443");
# http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6dcc7b47");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=141164638606214&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=141383465822787&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=141025641601169&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=141383410222440&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=141147110427269&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140983229106599&w=2");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/61815");
script_set_attribute(attribute:"see_also", value:"http://www.securitytracker.com/id/1031032");
script_set_attribute(attribute:"see_also", value:"http://www.vmware.com/security/advisories/VMSA-2014-0012.html");
script_set_attribute(attribute:"see_also", value:"http://seclists.org/fulldisclosure/2014/Dec/23");
# http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c02f1515");
script_set_attribute(attribute:"see_also", value:"http://www.securitytracker.com/id/1031594");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=142546741516006&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=142350350616251&w=2");
script_set_attribute(attribute:"see_also", value:"http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html");
# http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?acb4a410");
# http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c46d757d");
script_set_attribute(attribute:"see_also", value:"http://www.mandriva.com/security/advisories?name=MDVSA-2015:062");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=142805027510172&w=2");
# http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?453b5f8c");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=141658880509699&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140448122410568&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140491231331543&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140621259019789&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140482916501310&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140870499402361&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140784085708882&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140852826008699&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140604261522465&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140431828824371&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140266410314613&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140852757108392&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140544599631400&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140389274407904&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140672208601650&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140317760000786&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140904544427729&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140389355508263&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140752315422991&w=2");
script_set_attribute(attribute:"see_also", value:"http://marc.info/?l=bugtraq&m=140794476212181&w=2");
# https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3818101e");
# http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?bac902d5");
# http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e6ea11ce");
# http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e062d049");
script_set_attribute(attribute:"see_also", value:"https://www.novell.com/support/kb/doc.php?id=7015271");
script_set_attribute(attribute:"see_also", value:"https://www.ibm.com/support/docview.wss?uid=ssg1S1004671");
script_set_attribute(attribute:"see_also", value:"https://www.ibm.com/support/docview.wss?uid=ssg1S1004670");
# https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f997f6c0");
# http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?957ff7ff");
# http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?87b3d108");
# http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?eb9f4c47");
# http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c603c39c");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24037870");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24037732");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24037731");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24037730");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24037729");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24037727");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21683332");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21678233");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21677836");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21677131");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21677080");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676889");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676879");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676833");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676786");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676644");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676615");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676536");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676529");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676501");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676478");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676334");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676333");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21676071");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21675821");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21675626");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163");
script_set_attribute(attribute:"see_also", value:"http://www.vmware.com/security/advisories/VMSA-2014-0006.html");
script_set_attribute(attribute:"see_also", value:"http://www.mandriva.com/security/advisories?name=MDVSA-2014:106");
script_set_attribute(attribute:"see_also", value:"http://www.mandriva.com/security/advisories?name=MDVSA-2014:105");
# http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?bc543587");
script_set_attribute(attribute:"see_also", value:"http://www.ibm.com/support/docview.wss?uid=swg24037783");
script_set_attribute(attribute:"see_also", value:"http://www.ibm.com/support/docview.wss?uid=swg21676877");
script_set_attribute(attribute:"see_also", value:"http://www.ibm.com/support/docview.wss?uid=swg21676793");
script_set_attribute(attribute:"see_also", value:"http://www.ibm.com/support/docview.wss?uid=swg21676356");
script_set_attribute(attribute:"see_also", value:"http://www.ibm.com/support/docview.wss?uid=swg1IT02314");
script_set_attribute(attribute:"see_also", value:"http://www.ibm.com/support/docview.wss?uid=ssg1S1004678");
script_set_attribute(attribute:"see_also", value:"http://www.ibm.com/support/docview.wss?uid=isg3T1020948");
script_set_attribute(attribute:"see_also", value:"http://www.f-secure.com/en/web/labs_global/fsc-2014-6");
# http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?91a242c9");
script_set_attribute(attribute:"see_also", value:"http://support.citrix.com/article/CTX140876");
script_set_attribute(attribute:"see_also", value:"http://security.gentoo.org/glsa/glsa-201407-05.xml");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/61254");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59677");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59661");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59529");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59525");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59518");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59502");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59483");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59460");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59454");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59449");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59448");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59447");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59446");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59445");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59444");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59441");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59440");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59437");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59435");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59429");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59389");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59380");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59375");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59374");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59368");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59365");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59364");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59362");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59347");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59338");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59310");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59306");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59305");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59287");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59284");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59282");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59264");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59231");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59223");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59215");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59214");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59211");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59202");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59192");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59190");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59189");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59188");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59186");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59175");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59167");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59163");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59142");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59135");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59132");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59101");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59093");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59040");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/59004");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58977");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58945");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58742");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58719");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58716");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58714");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58713");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58667");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58660");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58615");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58492");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58433");
script_set_attribute(attribute:"see_also", value:"http://secunia.com/advisories/58337");
script_set_attribute(attribute:"see_also", value:"http://seclists.org/fulldisclosure/2014/Jun/38");
# http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f68d352b");
# http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c49877be");
script_set_attribute(attribute:"see_also", value:"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217");
script_set_attribute(attribute:"see_also", value:"http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195");
script_set_attribute(attribute:"see_also", value:"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629");
script_set_attribute(attribute:"see_also", value:"http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc");
# http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?76f5def7");
# http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1e07fa0e");
script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/archive/1/534161/100/0/threaded");
script_set_attribute(attribute:"see_also", value:"https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf");
# https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?245b0556");
script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0224");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_cwe_id(326);
script_set_attribute(attribute:"vuln_publication_date", value:"2014/06/05");
script_set_attribute(attribute:"patch_publication_date", value:"2014/06/05");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/02/07");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:s7-1500_firmware");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Tenable.ot");
script_copyright(english:"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("tenable_ot_api_integration.nasl");
script_require_keys("Tenable.ot/Siemens");
exit(0);
}
include('tenable_ot_cve_funcs.inc');
get_kb_item_or_exit('Tenable.ot/Siemens');
var asset = tenable_ot::assets::get(vendor:'Siemens');
var vuln_cpes = {
"cpe:/o:siemens:s7-1500_firmware" :
{"versionEndExcluding" : "1.6"}
};
tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);
The latest version of this script can be found in these locations depending on your platform:
- Linux / Unix:
/opt/nessus/lib/nessus/plugins/tenable_ot_siemens_CVE-2014-0224.nasl
- Windows:
C:\ProgramData\Tenable\Nessus\nessus\plugins\tenable_ot_siemens_CVE-2014-0224.nasl
- Mac OS X:
/Library/Nessus/run/lib/nessus/plugins/tenable_ot_siemens_CVE-2014-0224.nasl
Go back to menu.
How to Run
Here is how to run the Siemens (CVE-2014-0224) as a standalone plugin via the Nessus web user interface (https://localhost:8834/):
- Click to start a New Scan.
- Select Advanced Scan.
- Navigate to the Plugins tab.
- On the top right corner click to Disable All plugins.
- On the left side table select Tenable.ot plugin family.
- On the right side table select Siemens (CVE-2014-0224) plugin ID 500473.
- Specify the target on the Settings tab and click to Save the scan.
- Run the scan.
Here are a few examples of how to run the plugin in the command line. Note that the examples below demonstrate the usage on the Linux / Unix platform.
Basic usage:
/opt/nessus/bin/nasl tenable_ot_siemens_CVE-2014-0224.nasl -t <IP/HOST>
Run the plugin with audit trail message on the console:
/opt/nessus/bin/nasl -a tenable_ot_siemens_CVE-2014-0224.nasl -t <IP/HOST>
Run the plugin with trace script execution written to the console (useful for debugging):
/opt/nessus/bin/nasl -T - tenable_ot_siemens_CVE-2014-0224.nasl -t <IP/HOST>
Run the plugin with using a state file for the target and updating it (useful for running multiple plugins on the target):
/opt/nessus/bin/nasl -K /tmp/state tenable_ot_siemens_CVE-2014-0224.nasl -t <IP/HOST>
Go back to menu.
References
RHSA | Red Hat Security Advisory: Hewlett Packard Security:
- HPSBGN03050, HPSBGN03068, HPSBHF03052, HPSBHF03088, HPSBHF03145, HPSBMU03051, HPSBMU03053, HPSBMU03055, HPSBMU03056, HPSBMU03057, HPSBMU03058, HPSBMU03062, HPSBMU03065, HPSBMU03070, HPSBMU03071, HPSBMU03074, HPSBMU03076, HPSBMU03078, HPSBMU03083, HPSBMU03089, HPSBMU03094, HPSBMU03101, HPSBOV03047, HPSBPI03107, HPSBST03097, HPSBST03098, HPSBST03103, HPSBST03106, HPSBST03195, HPSBST03265, HPSBUX03046, SSRT101818
- 58128, 58337, 58385, 58433, 58492, 58579, 58615, 58639, 58660, 58667, 58713, 58714, 58716, 58719, 58742, 58743, 58745, 58759, 58930, 58939, 58945, 58977, 59004, 59012, 59040, 59043, 59055, 59063, 59093, 59101, 59120, 59126, 59132, 59135, 59142, 59162, 59163, 59167, 59175, 59186, 59188, 59189, 59190, 59191, 59192, 59202, 59211, 59214, 59215, 59223, 59231, 59264, 59282, 59284, 59287, 59300, 59301, 59305, 59306, 59310, 59325, 59338, 59342, 59347, 59354, 59362, 59364, 59365, 59368, 59370, 59374, 59375, 59380, 59383, 59389, 59413, 59429, 59435, 59437, 59438, 59440, 59441, 59442, 59444, 59445, 59446, 59447, 59448, 59449, 59450, 59451, 59454, 59459, 59460, 59483, 59490, 59491, 59495, 59502, 59506, 59514, 59518, 59525, 59528, 59529, 59530, 59589, 59602, 59655, 59659, 59661, 59666, 59669, 59677, 59721, 59784, 59824, 59827, 59878, 59885, 59894, 59916, 59990, 60049, 60066, 60176, 60522, 60567, 60571, 60577, 60819, 61254, 61815
- openSUSE-SU-2015:0229, openSUSE-SU-2016:0640, SUSE-SU-2015:0578, SUSE-SU-2015:0743
- CWE-326 (Weakness) Inadequate Encryption Strength
- https://www.tenable.com/plugins/nessus/500473
- https://access.redhat.com/site/blogs/766093/posts/908133
- https://bugzilla.redhat.com/show_bug.cgi?id=1103586
- https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
- https://discussions.nessus.org/thread/7517
- https://filezilla-project.org/versions.php?type=server
- https://kb.bluecoat.com/index?page=content&id=SA80
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004670
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004671
- https://www.imperialviolet.org/2014/06/05/earlyccs.html
- https://www.novell.com/support/kb/doc.php?id=7015271
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
- http://ccsinjection.lepidum.co.jp
- http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html
- http://esupport.trendmicro.com/solution/en-US/1103813.aspx
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217
- http://linux.oracle.com/errata/ELSA-2014-1053.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=140369637402535&w=2
- http://marc.info/?l=bugtraq&m=140386311427810&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://marc.info/?l=bugtraq&m=140431828824371&w=2
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://marc.info/?l=bugtraq&m=140491231331543&w=2
- http://marc.info/?l=bugtraq&m=140499864129699&w=2
- http://marc.info/?l=bugtraq&m=140544599631400&w=2
- http://marc.info/?l=bugtraq&m=140604261522465&w=2
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://marc.info/?l=bugtraq&m=140672208601650&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://marc.info/?l=bugtraq&m=140784085708882&w=2
- http://marc.info/?l=bugtraq&m=140794476212181&w=2
- http://marc.info/?l=bugtraq&m=140852757108392&w=2
- http://marc.info/?l=bugtraq&m=140852826008699&w=2
- http://marc.info/?l=bugtraq&m=140870499402361&w=2
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://marc.info/?l=bugtraq&m=140983229106599&w=2
- http://marc.info/?l=bugtraq&m=141025641601169&w=2
- http://marc.info/?l=bugtraq&m=141147110427269&w=2
- http://marc.info/?l=bugtraq&m=141164638606214&w=2
- http://marc.info/?l=bugtraq&m=141383410222440&w=2
- http://marc.info/?l=bugtraq&m=141383465822787&w=2
- http://marc.info/?l=bugtraq&m=141658880509699&w=2
- http://marc.info/?l=bugtraq&m=142350350616251&w=2
- http://marc.info/?l=bugtraq&m=142546741516006&w=2
- http://marc.info/?l=bugtraq&m=142805027510172&w=2
- http://puppetlabs.com/security/cve/cve-2014-0224
- http://rhn.redhat.com/errata/RHSA-2014-0624.html
- http://rhn.redhat.com/errata/RHSA-2014-0626.html
- http://rhn.redhat.com/errata/RHSA-2014-0627.html
- http://rhn.redhat.com/errata/RHSA-2014-0630.html
- http://rhn.redhat.com/errata/RHSA-2014-0631.html
- http://rhn.redhat.com/errata/RHSA-2014-0632.html
- http://rhn.redhat.com/errata/RHSA-2014-0633.html
- http://rhn.redhat.com/errata/RHSA-2014-0680.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://seclists.org/fulldisclosure/2014/Jun/38
- http://secunia.com/advisories/58128
- http://secunia.com/advisories/58337
- http://secunia.com/advisories/58385
- http://secunia.com/advisories/58433
- http://secunia.com/advisories/58492
- http://secunia.com/advisories/58579
- http://secunia.com/advisories/58615
- http://secunia.com/advisories/58639
- http://secunia.com/advisories/58660
- http://secunia.com/advisories/58667
- http://secunia.com/advisories/58713
- http://secunia.com/advisories/58714
- http://secunia.com/advisories/58716
- http://secunia.com/advisories/58719
- http://secunia.com/advisories/58742
- http://secunia.com/advisories/58743
- http://secunia.com/advisories/58745
- http://secunia.com/advisories/58759
- http://secunia.com/advisories/58930
- http://secunia.com/advisories/58939
- http://secunia.com/advisories/58945
- http://secunia.com/advisories/58977
- http://secunia.com/advisories/59004
- http://secunia.com/advisories/59012
- http://secunia.com/advisories/59040
- http://secunia.com/advisories/59043
- http://secunia.com/advisories/59055
- http://secunia.com/advisories/59063
- http://secunia.com/advisories/59093
- http://secunia.com/advisories/59101
- http://secunia.com/advisories/59120
- http://secunia.com/advisories/59126
- http://secunia.com/advisories/59132
- http://secunia.com/advisories/59135
- http://secunia.com/advisories/59142
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/59163
- http://secunia.com/advisories/59167
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/59186
- http://secunia.com/advisories/59188
- http://secunia.com/advisories/59189
- http://secunia.com/advisories/59190
- http://secunia.com/advisories/59191
- http://secunia.com/advisories/59192
- http://secunia.com/advisories/59202
- http://secunia.com/advisories/59211
- http://secunia.com/advisories/59214
- http://secunia.com/advisories/59215
- http://secunia.com/advisories/59223
- http://secunia.com/advisories/59231
- http://secunia.com/advisories/59264
- http://secunia.com/advisories/59282
- http://secunia.com/advisories/59284
- http://secunia.com/advisories/59287
- http://secunia.com/advisories/59300
- http://secunia.com/advisories/59301
- http://secunia.com/advisories/59305
- http://secunia.com/advisories/59306
- http://secunia.com/advisories/59310
- http://secunia.com/advisories/59325
- http://secunia.com/advisories/59338
- http://secunia.com/advisories/59342
- http://secunia.com/advisories/59347
- http://secunia.com/advisories/59354
- http://secunia.com/advisories/59362
- http://secunia.com/advisories/59364
- http://secunia.com/advisories/59365
- http://secunia.com/advisories/59368
- http://secunia.com/advisories/59370
- http://secunia.com/advisories/59374
- http://secunia.com/advisories/59375
- http://secunia.com/advisories/59380
- http://secunia.com/advisories/59383
- http://secunia.com/advisories/59389
- http://secunia.com/advisories/59413
- http://secunia.com/advisories/59429
- http://secunia.com/advisories/59435
- http://secunia.com/advisories/59437
- http://secunia.com/advisories/59438
- http://secunia.com/advisories/59440
- http://secunia.com/advisories/59441
- http://secunia.com/advisories/59442
- http://secunia.com/advisories/59444
- http://secunia.com/advisories/59445
- http://secunia.com/advisories/59446
- http://secunia.com/advisories/59447
- http://secunia.com/advisories/59448
- http://secunia.com/advisories/59449
- http://secunia.com/advisories/59450
- http://secunia.com/advisories/59451
- http://secunia.com/advisories/59454
- http://secunia.com/advisories/59459
- http://secunia.com/advisories/59460
- http://secunia.com/advisories/59483
- http://secunia.com/advisories/59490
- http://secunia.com/advisories/59491
- http://secunia.com/advisories/59495
- http://secunia.com/advisories/59502
- http://secunia.com/advisories/59506
- http://secunia.com/advisories/59514
- http://secunia.com/advisories/59518
- http://secunia.com/advisories/59525
- http://secunia.com/advisories/59528
- http://secunia.com/advisories/59529
- http://secunia.com/advisories/59530
- http://secunia.com/advisories/59589
- http://secunia.com/advisories/59602
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59659
- http://secunia.com/advisories/59661
- http://secunia.com/advisories/59666
- http://secunia.com/advisories/59669
- http://secunia.com/advisories/59677
- http://secunia.com/advisories/59721
- http://secunia.com/advisories/59784
- http://secunia.com/advisories/59824
- http://secunia.com/advisories/59827
- http://secunia.com/advisories/59878
- http://secunia.com/advisories/59885
- http://secunia.com/advisories/59894
- http://secunia.com/advisories/59916
- http://secunia.com/advisories/59990
- http://secunia.com/advisories/60049
- http://secunia.com/advisories/60066
- http://secunia.com/advisories/60176
- http://secunia.com/advisories/60522
- http://secunia.com/advisories/60567
- http://secunia.com/advisories/60571
- http://secunia.com/advisories/60577
- http://secunia.com/advisories/60819
- http://secunia.com/advisories/61254
- http://secunia.com/advisories/61815
- http://security.gentoo.org/glsa/glsa-201407-05.xml
- http://support.apple.com/kb/HT6443
- http://support.citrix.com/article/CTX140876
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www-01.ibm.com/support/docview.wss?uid=swg21675626
- http://www-01.ibm.com/support/docview.wss?uid=swg21675821
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676071
- http://www-01.ibm.com/support/docview.wss?uid=swg21676333
- http://www-01.ibm.com/support/docview.wss?uid=swg21676334
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21676478
- http://www-01.ibm.com/support/docview.wss?uid=swg21676496
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676529
- http://www-01.ibm.com/support/docview.wss?uid=swg21676536
- http://www-01.ibm.com/support/docview.wss?uid=swg21676615
- http://www-01.ibm.com/support/docview.wss?uid=swg21676644
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21676786
- http://www-01.ibm.com/support/docview.wss?uid=swg21676833
- http://www-01.ibm.com/support/docview.wss?uid=swg21676845
- http://www-01.ibm.com/support/docview.wss?uid=swg21676879
- http://www-01.ibm.com/support/docview.wss?uid=swg21676889
- http://www-01.ibm.com/support/docview.wss?uid=swg21677080
- http://www-01.ibm.com/support/docview.wss?uid=swg21677131
- http://www-01.ibm.com/support/docview.wss?uid=swg21677390
- http://www-01.ibm.com/support/docview.wss?uid=swg21677527
- http://www-01.ibm.com/support/docview.wss?uid=swg21677567
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www-01.ibm.com/support/docview.wss?uid=swg21677836
- http://www-01.ibm.com/support/docview.wss?uid=swg21678167
- http://www-01.ibm.com/support/docview.wss?uid=swg21678233
- http://www-01.ibm.com/support/docview.wss?uid=swg21678289
- http://www-01.ibm.com/support/docview.wss?uid=swg21683332
- http://www-01.ibm.com/support/docview.wss?uid=swg24037727
- http://www-01.ibm.com/support/docview.wss?uid=swg24037729
- http://www-01.ibm.com/support/docview.wss?uid=swg24037730
- http://www-01.ibm.com/support/docview.wss?uid=swg24037731
- http://www-01.ibm.com/support/docview.wss?uid=swg24037732
- http://www-01.ibm.com/support/docview.wss?uid=swg24037761
- http://www-01.ibm.com/support/docview.wss?uid=swg24037870
- http://www.blackberry.com/btsc/KB36051
- http://www.fortiguard.com/advisory/FG-IR-14-018/
- http://www.f-secure.com/en/web/labs_global/fsc-2014-6
- http://www.ibm.com/support/docview.wss?uid=isg3T1020948
- http://www.ibm.com/support/docview.wss?uid=ssg1S1004678
- http://www.ibm.com/support/docview.wss?uid=swg1IT02314
- http://www.ibm.com/support/docview.wss?uid=swg21676356
- http://www.ibm.com/support/docview.wss?uid=swg21676793
- http://www.ibm.com/support/docview.wss?uid=swg21676877
- http://www.ibm.com/support/docview.wss?uid=swg24037783
- http://www.kb.cert.org/vuls/id/978508
- http://www.kerio.com/support/kerio-control/release-history
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:105
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:106
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.nessus.org/u?1e07fa0e
- http://www.nessus.org/u?2a8d3d74
- http://www.nessus.org/u?6b98b564
- http://www.nessus.org/u?6dcc7b47
- http://www.nessus.org/u?7de2f8eb
- http://www.nessus.org/u?25e3d768
- http://www.nessus.org/u?46b88aa1
- http://www.nessus.org/u?76f5def7
- http://www.nessus.org/u?87b3d108
- http://www.nessus.org/u?91a242c9
- http://www.nessus.org/u?245b0556
- http://www.nessus.org/u?453b5f8c
- http://www.nessus.org/u?957ff7ff
- http://www.nessus.org/u?2115f75f
- http://www.nessus.org/u?3014ab34
- http://www.nessus.org/u?5539aa9d
- http://www.nessus.org/u?23273edc
- http://www.nessus.org/u?3818101e
- http://www.nessus.org/u?acb4a410
- http://www.nessus.org/u?bac902d5
- http://www.nessus.org/u?bc543587
- http://www.nessus.org/u?c02f1515
- http://www.nessus.org/u?c19c03e5
- http://www.nessus.org/u?c46d757d
- http://www.nessus.org/u?c603c39c
- http://www.nessus.org/u?c49877be
- http://www.nessus.org/u?d8f6abfb
- http://www.nessus.org/u?d68c75da
- http://www.nessus.org/u?e6ea11ce
- http://www.nessus.org/u?e062d049
- http://www.nessus.org/u?eb9f4c47
- http://www.nessus.org/u?f68d352b
- http://www.nessus.org/u?f997f6c0
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.openssl.org/news/secadv_20140605.txt
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securitytracker.com/id/1031032
- http://www.securitytracker.com/id/1031594
- http://www.splunk.com/view/SP-CAAAM2D
- http://www.vmware.com/security/advisories/VMSA-2014-0006.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://vulners.com/nessus/TENABLE_OT_SIEMENS_CVE-2014-0224.NASL
- 500424 - Siemens (CVE-2014-0160)
- 500128 - Siemens (CVE-2014-2908)
- 500045 - Siemens (CVE-2014-5074)
- 500088 - Siemens (CVE-2015-2177)
- 500264 - Siemens (CVE-2015-5374)
- 500035 - Siemens (CVE-2015-5698)
- 500121 - Siemens (CVE-2016-8672)
- 500153 - Siemens (CVE-2016-8673)
- 500248 - Siemens (CVE-2018-3639)
- 500055 - Siemens (CVE-2019-10943)
- 500065 - Siemens (CVE-2019-12255)
- 500279 - Siemens (CVE-2019-12256)
- 500067 - Siemens (CVE-2019-12258)
- 500292 - Siemens (CVE-2019-12260)
- 500355 - Siemens (CVE-2019-13945)
- 500484 - Siemens (CVE-2020-15782)
- 500504 - Siemens (CVE-2021-3449)
- 500615 - Siemens (CVE-2021-37185)
- 500614 - Siemens (CVE-2021-37204)
- 500616 - Siemens (CVE-2021-37205)
- 63428 - Siemens Automation License Manager Multiple Vulnerabilities
- 85842 - Siemens SIMATIC S7-1200 PLC < 4.1.3 XSRF
- 47759 - Siemens SIMATIC WinCC Default Password Authentication Bypass
- 66839 - Siemens Solid Edge SEListCtrlX ActiveX Control SetItemReadOnly Method Memory Address Write Arbitrary Code Execution
- 66840 - Siemens Solid Edge WPHelper ActiveX Control OpenInEditor Method Arbitrary Command Execution
Version
This page has been produced using Nessus Professional 10.1.2 (#68) LINUX, Plugin set 202205072148.
Plugin file tenable_ot_siemens_CVE-2014-0224.nasl version 1.1. For more plugins, visit the Nessus Plugin Library.
Go back to menu.