{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Les commutateurs de la famille SCALANCE X-200IRT (inclus les variants SIPLUSNET)","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"Les commutateurs de la famille SCALANCE X-300 (inclus les variants X408 et SIPLUS NET) versions ant\u00e9rieures \u00e0 V4.1.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"Solid Edge versions ant\u00e9rieures \u00e0 SE2021MP2","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"T2Go versions ant\u00e9rieures \u00e0 V13.1.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"Teamcenter Visualization versions ant\u00e9rieures \u00e0 V13.1.0 (cette version reste vuln\u00e9rable aux vuln\u00e9rabilit\u00e9s CVE-2020-26989, CVE-2020-26990 et CVE-2020-26991)","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"Les commutateurs de la famille SCALANCE X-200 (inclus les variants SIPLUSNET)","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2020-25226","url":"https://www.cve.org/CVERecord?id=CVE-2020-25226"},{"name":"CVE-2020-26996","url":"https://www.cve.org/CVERecord?id=CVE-2020-26996"},{"name":"CVE-2020-26984","url":"https://www.cve.org/CVERecord?id=CVE-2020-26984"},{"name":"CVE-2020-26983","url":"https://www.cve.org/CVERecord?id=CVE-2020-26983"},{"name":"CVE-2020-26989","url":"https://www.cve.org/CVERecord?id=CVE-2020-26989"},{"name":"CVE-2020-26988","url":"https://www.cve.org/CVERecord?id=CVE-2020-26988"},{"name":"CVE-2020-28381","url":"https://www.cve.org/CVERecord?id=CVE-2020-28381"},{"name":"CVE-2020-28382","url":"https://www.cve.org/CVERecord?id=CVE-2020-28382"},{"name":"CVE-2020-28383","url":"https://www.cve.org/CVERecord?id=CVE-2020-28383"},{"name":"CVE-2020-28384","url":"https://www.cve.org/CVERecord?id=CVE-2020-28384"},{"name":"CVE-2020-26994","url":"https://www.cve.org/CVERecord?id=CVE-2020-26994"},{"name":"CVE-2020-26987","url":"https://www.cve.org/CVERecord?id=CVE-2020-26987"},{"name":"CVE-2020-15800","url":"https://www.cve.org/CVERecord?id=CVE-2020-15800"},{"name":"CVE-2020-15799","url":"https://www.cve.org/CVERecord?id=CVE-2020-15799"},{"name":"CVE-2020-26985","url":"https://www.cve.org/CVERecord?id=CVE-2020-26985"},{"name":"CVE-2020-26991","url":"https://www.cve.org/CVERecord?id=CVE-2020-26991"},{"name":"CVE-2020-26986","url":"https://www.cve.org/CVERecord?id=CVE-2020-26986"},{"name":"CVE-2020-28395","url":"https://www.cve.org/CVERecord?id=CVE-2020-28395"},{"name":"CVE-2020-26982","url":"https://www.cve.org/CVERecord?id=CVE-2020-26982"},{"name":"CVE-2020-26981","url":"https://www.cve.org/CVERecord?id=CVE-2020-26981"},{"name":"CVE-2020-26995","url":"https://www.cve.org/CVERecord?id=CVE-2020-26995"},{"name":"CVE-2020-26992","url":"https://www.cve.org/CVERecord?id=CVE-2020-26992"},{"name":"CVE-2020-28391","url":"https://www.cve.org/CVERecord?id=CVE-2020-28391"},{"name":"CVE-2020-26990","url":"https://www.cve.org/CVERecord?id=CVE-2020-26990"},{"name":"CVE-2020-26993","url":"https://www.cve.org/CVERecord?id=CVE-2020-26993"},{"name":"CVE-2020-26980","url":"https://www.cve.org/CVERecord?id=CVE-2020-26980"},{"name":"CVE-2020-28386","url":"https://www.cve.org/CVERecord?id=CVE-2020-28386"}],"links":[],"reference":"CERTFR-2021-AVI-018","revisions":[{"description":"Version initiale","revision_date":"2021-01-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Ex\u00e9cution de code arbitraire"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Siemens ssa-274900 du 12 janvier 2021","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-274900.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Siemens ssa-622830 du 12 janvier 2021","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Siemens ssa-139628 du 12 janvier 2021","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-139628.pdf"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Siemens ssa-979834 du 12 janvier 2021","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-979834.pdf"}]}
