A vulnerability has been identified in SICAM TOOLBOX II (All versions < V07.11). During establishment of a https connection to the TLS server of a managed device, the affected application doesn't check the extended key usage attribute of that device's certificate.
This could allow an attacker to execute an on-path network (MitM) attack.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-183963.html | Vendor Advisory |
Configurations
History
20 Aug 2025, 16:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Siemens
Siemens sicam Toolbox Ii |
|
References | () https://cert-portal.siemens.com/productcert/html/ssa-183963.html - Vendor Advisory | |
CPE | cpe:2.3:a:siemens:sicam_toolbox_ii:*:*:*:*:*:*:*:* |
08 Jul 2025, 16:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Jul 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-08 11:15
Updated : 2025-08-20 16:19
NVD link : CVE-2024-31853
Mitre link : CVE-2024-31853
CVE.ORG link : CVE-2024-31853
JSON object : View
Products Affected
siemens
- sicam_toolbox_ii
CWE
CWE-295
Improper Certificate Validation