{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Relais SIPROTEC 5 avec processeurs variantes CP300 et CP100 versions ant\u00e9rieures \u00e0 V7.80 pour appareils de type 6MD85, 6MD86, 7SS85, 7KE85, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86 et 7UT87","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"Microgiciel variante IEC 61850 pour module Ethernet EN100 versions ant\u00e9rieures \u00e0 V4.33","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2018-11452","url":"https://www.cve.org/CVERecord?id=CVE-2018-11452"},{"name":"CVE-2018-11451","url":"https://www.cve.org/CVERecord?id=CVE-2018-11451"}],"links":[],"reference":"CERTFR-2018-AVI-340","revisions":[{"description":"Version initiale","revision_date":"2018-07-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans SCADA Siemens .\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans SCADA Siemens","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SCADA Siemens ssa-635129 du 11 juillet 2018","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-635129.pdf"}]}
