https://cert-portal.siemens.com/productcert/pdf/ssa-632562.pdf
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0009
https://support2.windriver.com/index.php?page=security-notices
http://www.nessus.org/u?acd12d21
https://security.netapp.com/advisory/ntap-20190802-0001/
http://www.nessus.org/u?c7d3d59d
https://support.f5.com/csp/article/K41190253
https://cert-portal.siemens.com/productcert/pdf/ssa-189842.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-352504.pdf
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.cisa.gov/news-events/ics-advisories/icsa-19-211-0
Severity: Critical
ID: 502260
Version: 1.4
Type: remote
Family: Tenable.ot
Published: 6/10/2024
Updated: 6/24/2024
Supported Sensors: Tenable OT Security
Risk Factor: Medium
Score: 5.9
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2019-12260
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/h:belden:hirschmann_rsp20, cpe:/h:belden:hirschmann_rail_switch_power_lite, cpe:/h:belden:hirschmann_rspe37, cpe:/h:belden:hirschmann_rsp25, cpe:/h:belden:hirschmann_rsp35, cpe:/h:belden:hirschmann_rspe30, cpe:/h:belden:hirschmann_rail_switch_power_smart, cpe:/h:belden:hirschmann_rspe35, cpe:/h:belden:hirschmann_dragon_mach4500, cpe:/h:belden:hirschmann_dragon_mach4000, cpe:/h:belden:hirschmann_eagle_one, cpe:/h:belden:hirschmann_eagle20, cpe:/h:belden:hirschmann_eagle30, cpe:/h:belden:hirschmann_rsp30, cpe:/h:belden:hirschmann_rspe32
Required KB Items: Tenable.ot/Hirschmann
Exploit Ease: No known exploits are available
Patch Publication Date: 8/9/2019
Vulnerability Publication Date: 8/9/2019
CVE: CVE-2019-12260
CWE: 120