All the vulnerabilites related to Siemens - SCALANCE XR500
cve-2021-25667
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf | x_refsource_MISC | |
https://us-cert.cisa.gov/ics/advisories/icsa-21-068-03 | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | RUGGEDCOM RM1224 |
Version: All versions >= V4.3 and < V6.4 |
||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:11:27.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "RUGGEDCOM RM1224", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V4.3 and \u003c V6.4" } ] }, { "product": "SCALANCE M-800", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V4.3 and \u003c V6.4" } ] }, { "product": "SCALANCE S615", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V4.3 and \u003c V6.4" } ] }, { "product": "SCALANCE SC-600 Family", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003e= V2.0 and \u003c V2.1.3" } ] }, { "product": "SCALANCE XB-200", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XC-200", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XF-200BA", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XM400", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.2" } ] }, { "product": "SCALANCE XP-200", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XR-300WG", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V4.1" } ] }, { "product": "SCALANCE XR500", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions \u003c V6.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 (All versions \u003e= V4.3 and \u003c V6.4), SCALANCE M-800 (All versions \u003e= V4.3 and \u003c V6.4), SCALANCE S615 (All versions \u003e= V4.3 and \u003c V6.4), SCALANCE SC-600 Family (All versions \u003e= V2.0 and \u003c V2.1.3), SCALANCE XB-200 (All versions \u003c V4.1), SCALANCE XC-200 (All versions \u003c V4.1), SCALANCE XF-200BA (All versions \u003c V4.1), SCALANCE XM400 (All versions \u003c V6.2), SCALANCE XP-200 (All versions \u003c V4.1), SCALANCE XR-300WG (All versions \u003c V4.1), SCALANCE XR500 (All versions \u003c V6.2). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution. Successful exploitation requires the passive listening feature of the device to be active." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T20:42:20", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "productcert@siemens.com", "ID": "CVE-2021-25667", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "RUGGEDCOM RM1224", "version": { "version_data": [ { "version_value": "All versions \u003e= V4.3 and \u003c V6.4" } ] } }, { "product_name": "SCALANCE M-800", "version": { "version_data": [ { "version_value": "All versions \u003e= V4.3 and \u003c V6.4" } ] } }, { "product_name": "SCALANCE S615", "version": { "version_data": [ { "version_value": "All versions \u003e= V4.3 and \u003c V6.4" } ] } }, { "product_name": "SCALANCE SC-600 Family", "version": { "version_data": [ { "version_value": "All versions \u003e= V2.0 and \u003c V2.1.3" } ] } }, { "product_name": "SCALANCE XB-200", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XC-200", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XF-200BA", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XM400", "version": { "version_data": [ { "version_value": "All versions \u003c V6.2" } ] } }, { "product_name": "SCALANCE XP-200", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XR-300WG", "version": { "version_data": [ { "version_value": "All versions \u003c V4.1" } ] } }, { "product_name": "SCALANCE XR500", "version": { "version_data": [ { "version_value": "All versions \u003c V6.2" } ] } } ] }, "vendor_name": "Siemens" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been identified in RUGGEDCOM RM1224 (All versions \u003e= V4.3 and \u003c V6.4), SCALANCE M-800 (All versions \u003e= V4.3 and \u003c V6.4), SCALANCE S615 (All versions \u003e= V4.3 and \u003c V6.4), SCALANCE SC-600 Family (All versions \u003e= V2.0 and \u003c V2.1.3), SCALANCE XB-200 (All versions \u003c V4.1), SCALANCE XC-200 (All versions \u003c V4.1), SCALANCE XF-200BA (All versions \u003c V4.1), SCALANCE XM400 (All versions \u003c V6.2), SCALANCE XP-200 (All versions \u003c V4.1), SCALANCE XR-300WG (All versions \u003c V4.1), SCALANCE XR500 (All versions \u003c V6.2). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution. Successful exploitation requires the passive listening feature of the device to be active." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-121: Stack-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-03", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2021-25667", "datePublished": "2021-03-15T17:03:31", "dateReserved": "2021-01-21T00:00:00", "dateUpdated": "2024-08-03T20:11:27.468Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202103-0982
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3 and < V6.4), SCALANCE M-800 (All versions >= V4.3 and < V6.4), SCALANCE S615 (All versions >= V4.3 and < V6.4), SCALANCE SC-600 Family (All versions >= V2.0 and < V2.1.3), SCALANCE XB-200 (All versions < V4.1), SCALANCE XC-200 (All versions < V4.1), SCALANCE XF-200BA (All versions < V4.1), SCALANCE XM400 (All versions < V6.2), SCALANCE XP-200 (All versions < V4.1), SCALANCE XR-300WG (All versions < V4.1), SCALANCE XR500 (All versions < V6.2). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution. Successful exploitation requires the passive listening feature of the device to be active. plural Siemens The product contains a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SCALANCE SC-600 devices (SC622-2C, SC632-2C, SC636-2C, SC642-2C, SC646-2C) are used to protect trusted industrial networks from attacks from untrusted networks. SCALANCE M-800/S615 industrial routers are used for secure remote access to the factory through mobilenetworks (such as GPRS or UMTS). It has an integrated security function of firewall to prevent unauthorized access, and VPN can protect data transmission. SCALANCE X switches are used to connect industrial components, such as programmable logic controllers (PLC) or human machine interfaces (HMI). RUGGEDCOM RM1224 is a 4G router for wireless IP communication from Ethernet-based devices via LTE (4G)-mobile radio.
Siemens SCALANCE and RuggedCmd devices have stack overflow vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0982", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance m-800", "scope": "gte", "trust": 1.6, "vendor": "siemens", "version": "4.3" }, { "model": "scalance s615", "scope": "gte", "trust": 1.6, "vendor": "siemens", "version": "4.3" }, { "model": "scalance xm400", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "6.2" }, { "model": "scalance xr500", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "6.2" }, { "model": "ruggedcom rm1224", "scope": "gte", "trust": 1.6, "vendor": "siemens", "version": "4.3" }, { "model": "scalance x300wg", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "4.1" }, { "model": "scalance sc642-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.3" }, { "model": "scalance sc622-2c", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "2.1" }, { "model": "scalance sc636-2c", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "2.0" }, { "model": "scalance xc-200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1" }, { "model": "scalance sc646-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.3" }, { "model": "scalance sc642-2c", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "2.0" }, { "model": "scalance sc632-2c", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "2.1" }, { "model": "scalance sc642-2c", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "2.1" }, { "model": "scalance sc632-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.3" }, { "model": "scalance xf-200ba", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1" }, { "model": "scalance xp-200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1" }, { "model": "scalance sc646-2c", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "2.0" }, { "model": "scalance sc636-2c", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "2.1" }, { "model": "ruggedcom rm1224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.4" }, { "model": "scalance m-800", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.4" }, { "model": "scalance xb-200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1" }, { "model": "scalance sc622-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.3" }, { "model": "scalance sc646-2c", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "2.1" }, { "model": "scalance sc632-2c", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "2.0" }, { "model": "scalance sc622-2c", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "2.0" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.4" }, { "model": "scalance sc636-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.3" }, { "model": "scalance sc-646-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-622-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xm400", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance s615", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-642-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-632-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xr500", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-636-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-600 family", "scope": "gte", "trust": 0.6, "vendor": "siemens", "version": "2.0,\u003c2.1.3" }, { "model": "scalance family", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "xx200\u003c4.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16434" }, { "db": "JVNDB", "id": "JVNDB-2021-004470" }, { "db": "NVD", "id": "CVE-2021-25667" } ] }, "cve": "CVE-2021-25667", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CVE-2021-25667", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CNVD-2021-16434", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-25667", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-25667", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-25667", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-25667", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2021-16434", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202103-683", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-25667", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16434" }, { "db": "VULMON", "id": "CVE-2021-25667" }, { "db": "JVNDB", "id": "JVNDB-2021-004470" }, { "db": "CNNVD", "id": "CNNVD-202103-683" }, { "db": "NVD", "id": "CVE-2021-25667" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM RM1224 (All versions \u003e= V4.3 and \u003c V6.4), SCALANCE M-800 (All versions \u003e= V4.3 and \u003c V6.4), SCALANCE S615 (All versions \u003e= V4.3 and \u003c V6.4), SCALANCE SC-600 Family (All versions \u003e= V2.0 and \u003c V2.1.3), SCALANCE XB-200 (All versions \u003c V4.1), SCALANCE XC-200 (All versions \u003c V4.1), SCALANCE XF-200BA (All versions \u003c V4.1), SCALANCE XM400 (All versions \u003c V6.2), SCALANCE XP-200 (All versions \u003c V4.1), SCALANCE XR-300WG (All versions \u003c V4.1), SCALANCE XR500 (All versions \u003c V6.2). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution. Successful exploitation requires the passive listening feature of the device to be active. plural Siemens The product contains a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. SCALANCE SC-600 devices (SC622-2C, SC632-2C, SC636-2C, SC642-2C, SC646-2C) are used to protect trusted industrial networks from attacks from untrusted networks. SCALANCE M-800/S615 industrial routers are used for secure remote access to the factory through mobilenetworks (such as GPRS or UMTS). It has an integrated security function of firewall to prevent unauthorized access, and VPN can protect data transmission. SCALANCE X switches are used to connect industrial components, such as programmable logic controllers (PLC) or human machine interfaces (HMI). RUGGEDCOM RM1224 is a 4G router for wireless IP communication from Ethernet-based devices via LTE (4G)-mobile radio. \n\r\n\r\nSiemens SCALANCE and RuggedCmd devices have stack overflow vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-25667" }, { "db": "JVNDB", "id": "JVNDB-2021-004470" }, { "db": "CNVD", "id": "CNVD-2021-16434" }, { "db": "VULMON", "id": "CVE-2021-25667" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-25667", "trust": 3.1 }, { "db": "ICS CERT", "id": "ICSA-21-068-03", "trust": 2.5 }, { "db": "SIEMENS", "id": "SSA-979775", "trust": 2.3 }, { "db": "JVN", "id": "JVNVU93441670", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-004470", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-16434", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0846", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202103-683", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2021-25667", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16434" }, { "db": "VULMON", "id": "CVE-2021-25667" }, { "db": "JVNDB", "id": "JVNDB-2021-004470" }, { "db": "CNNVD", "id": "CNNVD-202103-683" }, { "db": "NVD", "id": "CVE-2021-25667" } ] }, "id": "VAR-202103-0982", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-16434" } ], "trust": 1.1865065119999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16434" } ] }, "last_update_date": "2024-11-23T21:12:41.416000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-979775", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf" }, { "title": "Siemens RUGGEDCOM RM1224 Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=144543" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=02a3bef451a548084110a18d27dea153" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2021-25667 " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/namewreck-bugs-businesses/165385/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-25667" }, { "db": "JVNDB", "id": "JVNDB-2021-004470" }, { "db": "CNNVD", "id": "CNNVD-202103-683" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-004470" }, { "db": "NVD", "id": "CVE-2021-25667" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-068-03" }, { "trust": 2.3, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25667" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93441670/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/siemens-ruggedcom-rm1224-buffer-overflow-via-stp-bpdu-frames-34782" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0846" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/121.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2021-25667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://threatpost.com/namewreck-bugs-businesses/165385/" }, { "trust": 0.1, "url": "https://cert-portal.siemens.com/productcert/txt/ssa-979775.txt" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-16434" }, { "db": "VULMON", "id": "CVE-2021-25667" }, { "db": "JVNDB", "id": "JVNDB-2021-004470" }, { "db": "CNNVD", "id": "CNNVD-202103-683" }, { "db": "NVD", "id": "CVE-2021-25667" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-16434" }, { "db": "VULMON", "id": "CVE-2021-25667" }, { "db": "JVNDB", "id": "JVNDB-2021-004470" }, { "db": "CNNVD", "id": "CNNVD-202103-683" }, { "db": "NVD", "id": "CVE-2021-25667" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-11T00:00:00", "db": "CNVD", "id": "CNVD-2021-16434" }, { "date": "2021-03-15T00:00:00", "db": "VULMON", "id": "CVE-2021-25667" }, { "date": "2021-11-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-004470" }, { "date": "2021-03-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-683" }, { "date": "2021-03-15T17:15:21.690000", "db": "NVD", "id": "CVE-2021-25667" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-23T00:00:00", "db": "CNVD", "id": "CNVD-2021-16434" }, { "date": "2022-10-19T00:00:00", "db": "VULMON", "id": "CVE-2021-25667" }, { "date": "2021-11-22T09:03:00", "db": "JVNDB", "id": "JVNDB-2021-004470" }, { "date": "2021-04-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202103-683" }, { "date": "2024-11-21T05:55:15.360000", "db": "NVD", "id": "CVE-2021-25667" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-683" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Siemens\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-004470" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202103-683" } ], "trust": 0.6 } }
var-202107-1608
Vulnerability from variot
Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large amount of DCP reset packets are sent to the device. Multiple Siemens products contain vulnerabilities in resource allocation without restrictions or throttling.Service operation interruption (DoS) It may be in a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Siemens SCALANCE S602是德国西门子(Siemens)公司的一款工业安全设备. Siemens多款产品 存在安全漏洞,该漏洞允许攻击者执行拒绝服务攻击。以下产品和版本受到影响:Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions), RUGGEDCOM RM1224 (All Versions < 6.4), SCALANCE M-800 (All Versions < 6.4), SCALANCE S615 (All Versions < 6.4), SCALANCE W1700 IEEE 802.11ac (All versions), SCALANCE W700 IEEE 802.11n (All versions), SCALANCE X200-4 P IRT (All Versions < V5.5.0), SCALANCE X201-3P IRT (All Versions < V5.5.0), SCALANCE X201-3P IRT PRO (All Versions < V5.5.0), SCALANCE X202-2 IRT (All Versions < V5.5.0), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All Versions < V5.5.0), SCALANCE X202-2P IRT PRO (All Versions < V5.5.0), SCALANCE X204 IRT (All Versions < V5.5.0), SCALANCE X204 IRT PRO (All Versions < V5.5.0), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions), SCALANCE X204-2FM (All versions), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions), SCALANCE X204-2LD TS (All versions), SCALANCE X204-2TS (All versions), SCALANCE X206-1 (All versions), SCALANCE X206-1LD (incl. SIPLUS NET variant) (All versions), SCALANCE X208 (incl. SIPLUS NET variant) (All versions), SCALANCE X208PRO (All versions), SCALANCE X212-2 (All versions), SCALANCE X212-2LD (All versions), SCALANCE X216 (All versions), SCALANCE X224 (All versions), SCALANCE X302-7EEC (All versions), SCALANCE X304-2FE (All versions), SCALANCE X306-1LDFE (All versions), SCALANCE X307-2EEC (All versions), SCALANCE X307-3 (All versions), SCALANCE X307-3LD (All versions), SCALANCE X308-2 (incl. SIPLUS NET variant) (All versions), SCALANCE X308-2LD (All versions), SCALANCE X308-2LH (All versions), SCALANCE X308-2LH+ (All versions), SCALANCE X308-2M (All versions), SCALANCE X308-2M POE (All versions), SCALANCE X308-2M TS (All versions), SCALANCE X310 (All versions), SCALANCE X310FE (All versions), SCALANCE X320-1FE (All versions), SCALANCE X320-3LDFE (All versions), SCALANCE XB-200 (All versions), SCALANCE XC-200 (All versions), SCALANCE XF-200BA (All versions), SCALANCE XF201-3P IRT (All Versions < V5.5.0), SCALANCE XF202-2P IRT (All Versions < V5.5.0), SCALANCE XF204 (All versions), SCALANCE XF204 IRT (All Versions < V5.5.0), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions), SCALANCE XF204-2BA IRT (All Versions < V5.5.0), SCALANCE XF206-1 (All versions), SCALANCE XF208 (All versions), SCALANCE XM400 (All versions < V6.3.1), SCALANCE XP-200 (All versions), SCALANCE XR-300WG (All versions), SCALANCE XR324-12M (All versions), SCALANCE XR324-12M TS (All versions), SCALANCE XR324-4M EEC (All versions), SCALANCE XR324-4M POE (All versions), SCALANCE XR324-4M POE TS (All versions), SCALANCE XR500 (All versions < V6.3.1), SIMATIC CFU PA (All versions), SIMATIC IE/PB-LINK V3 (All versions), SIMATIC MV500 family (All versions < V3.0), SIMATIC NET CM 1542-1 (All versions), SIMATIC NET CP1616/CP1604 (All Versions >= V2.7), SIMATIC NET CP1626 (All versions), SIMATIC NET DK-16xx PN IO (All Versions >= V2.7), SIMATIC PROFINET Driver (All versions), SIMATIC Power Line Booster PLB, Base Module (MLFB: 6ES7972-5AA10-0AB0) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All Versions < V4.5), SIMOCODE proV Ethernet/IP (All versions < V1.1.3), SIMOCODE proV PROFINET (All versions < V2.1.3), SOFTNET-IE PNIO (All versions)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1608", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance x206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x201-3p irt pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "softnet-ie pnio", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x310fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic net cp1604", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "2.7" }, { "model": "scalance xr324-12m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x306-1ldfe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x304-2fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simocode prov profinet", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.3" }, { "model": "simatic net cm 1542-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w1700", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x206-1ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2m poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x202-2p irt pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x310", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m poe ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simocode prov ethernet\\/ip", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.1.3" }, { "model": "scalance x204 irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "dk standard ethernet controller evaluation kit", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x308-2lh\\+", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x308-2m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x204-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xf204", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x307-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf206-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x204 irt pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "simatic ie\\/pb-link v3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x308-2lh", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x308-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x307-2eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "ek-ertec 200 evaulation kit", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance x320-1fe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-12m ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic power line booster plb", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic profinet driver", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "scalance x201-3p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance m-800", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.4" }, { "model": "scalance x308-2ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic mv500", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "scalance x212-2", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xb-200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.3" }, { "model": "scalance xf-200ba", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.3" }, { "model": "scalance x208pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x204-2ts", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x308-2m ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204 irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance w700", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic net dk-16xx pn io", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "2.7" }, { "model": "scalance xf202-2p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x307-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic s7-1200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.5" }, { "model": "simatic cfu pa", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr500", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.3.1" }, { "model": "scalance x302-7eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "ek-ertec 200p evaluation kit", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "scalance xf201-3p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance xc-200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.3" }, { "model": "scalance x200-4 p irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x204-2ld ts", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x204-2ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance xr-300wg", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.3" }, { "model": "scalance xp-200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.3" }, { "model": "scalance x320-3ldfe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.4" }, { "model": "scalance x224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "simatic net cp1626", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf208", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x216", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x212-2ld", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "simatic net cp1616", "scope": "lte", "trust": 1.0, "vendor": "siemens", "version": "2.7" }, { "model": "scalance xm400", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.3.1" }, { "model": "ruggedcom rm1224", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.4" }, { "model": "scalance x202-2 irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.5.0" }, { "model": "scalance x204-2fm", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.5" }, { "model": "scalance x200-4p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "dk standard ethernet controller evaluation kit", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance w1700", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance s615", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ek-ertec 200p evaluation kit", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance x201-3p irt", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ek-ertec 200 evaluation kit", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance w700", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "ruggedcom rm1224", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010133" }, { "db": "NVD", "id": "CVE-2020-28400" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported this vulnerability to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-901" } ], "trust": 0.6 }, "cve": "CVE-2020-28400", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-28400", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-28400", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-28400", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-28400", "trust": 1.0, "value": "HIGH" }, { "author": "productcert@siemens.com", "id": "CVE-2020-28400", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-28400", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202107-901", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010133" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202107-901" }, { "db": "NVD", "id": "CVE-2020-28400" }, { "db": "NVD", "id": "CVE-2020-28400" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large amount of DCP reset packets are sent to the device. Multiple Siemens products contain vulnerabilities in resource allocation without restrictions or throttling.Service operation interruption (DoS) It may be in a state. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Siemens SCALANCE S602\u662f\u5fb7\u56fd\u897f\u95e8\u5b50\uff08Siemens\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5de5\u4e1a\u5b89\u5168\u8bbe\u5907. \nSiemens\u591a\u6b3e\u4ea7\u54c1 \u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u5141\u8bb8\u653b\u51fb\u8005\u6267\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002\u4ee5\u4e0b\u4ea7\u54c1\u548c\u7248\u672c\u53d7\u5230\u5f71\u54cd\uff1aDevelopment/Evaluation Kits for PROFINET IO\uff1a DK Standard Ethernet Controller (All versions), Development/Evaluation Kits for PROFINET IO\uff1a EK-ERTEC 200 (All versions), Development/Evaluation Kits for PROFINET IO\uff1a EK-ERTEC 200P (All versions), RUGGEDCOM RM1224 (All Versions \uff1c 6.4), SCALANCE M-800 (All Versions \uff1c 6.4), SCALANCE S615 (All Versions \uff1c 6.4), SCALANCE W1700 IEEE 802.11ac (All versions), SCALANCE W700 IEEE 802.11n (All versions), SCALANCE X200-4 P IRT (All Versions \uff1c V5.5.0), SCALANCE X201-3P IRT (All Versions \uff1c V5.5.0), SCALANCE X201-3P IRT PRO (All Versions \uff1c V5.5.0), SCALANCE X202-2 IRT (All Versions \uff1c V5.5.0), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All Versions \uff1c V5.5.0), SCALANCE X202-2P IRT PRO (All Versions \uff1c V5.5.0), SCALANCE X204 IRT (All Versions \uff1c V5.5.0), SCALANCE X204 IRT PRO (All Versions \uff1c V5.5.0), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions), SCALANCE X204-2FM (All versions), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions), SCALANCE X204-2LD TS (All versions), SCALANCE X204-2TS (All versions), SCALANCE X206-1 (All versions), SCALANCE X206-1LD (incl. SIPLUS NET variant) (All versions), SCALANCE X208 (incl. SIPLUS NET variant) (All versions), SCALANCE X208PRO (All versions), SCALANCE X212-2 (All versions), SCALANCE X212-2LD (All versions), SCALANCE X216 (All versions), SCALANCE X224 (All versions), SCALANCE X302-7EEC (All versions), SCALANCE X304-2FE (All versions), SCALANCE X306-1LDFE (All versions), SCALANCE X307-2EEC (All versions), SCALANCE X307-3 (All versions), SCALANCE X307-3LD (All versions), SCALANCE X308-2 (incl. SIPLUS NET variant) (All versions), SCALANCE X308-2LD (All versions), SCALANCE X308-2LH (All versions), SCALANCE X308-2LH+ (All versions), SCALANCE X308-2M (All versions), SCALANCE X308-2M POE (All versions), SCALANCE X308-2M TS (All versions), SCALANCE X310 (All versions), SCALANCE X310FE (All versions), SCALANCE X320-1FE (All versions), SCALANCE X320-3LDFE (All versions), SCALANCE XB-200 (All versions), SCALANCE XC-200 (All versions), SCALANCE XF-200BA (All versions), SCALANCE XF201-3P IRT (All Versions \uff1c V5.5.0), SCALANCE XF202-2P IRT (All Versions \uff1c V5.5.0), SCALANCE XF204 (All versions), SCALANCE XF204 IRT (All Versions \uff1c V5.5.0), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions), SCALANCE XF204-2BA IRT (All Versions \uff1c V5.5.0), SCALANCE XF206-1 (All versions), SCALANCE XF208 (All versions), SCALANCE XM400 (All versions \uff1c V6.3.1), SCALANCE XP-200 (All versions), SCALANCE XR-300WG (All versions), SCALANCE XR324-12M (All versions), SCALANCE XR324-12M TS (All versions), SCALANCE XR324-4M EEC (All versions), SCALANCE XR324-4M POE (All versions), SCALANCE XR324-4M POE TS (All versions), SCALANCE XR500 (All versions \uff1c V6.3.1), SIMATIC CFU PA (All versions), SIMATIC IE/PB-LINK V3 (All versions), SIMATIC MV500 family (All versions \uff1c V3.0), SIMATIC NET CM 1542-1 (All versions), SIMATIC NET CP1616/CP1604 (All Versions \uff1e= V2.7), SIMATIC NET CP1626 (All versions), SIMATIC NET DK-16xx PN IO (All Versions \uff1e= V2.7), SIMATIC PROFINET Driver (All versions), SIMATIC Power Line Booster PLB, Base Module (MLFB\uff1a 6ES7972-5AA10-0AB0) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All Versions \uff1c V4.5), SIMOCODE proV Ethernet/IP (All versions \uff1c V1.1.3), SIMOCODE proV PROFINET (All versions \uff1c V2.1.3), SOFTNET-IE PNIO (All versions)", "sources": [ { "db": "NVD", "id": "CVE-2020-28400" }, { "db": "JVNDB", "id": "JVNDB-2021-010133" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202107-901" }, { "db": "VULMON", "id": "CVE-2020-28400" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-28400", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-21-194-03", "trust": 2.4 }, { "db": "SIEMENS", "id": "SSA-599968", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2021-010133", "trust": 0.8 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2401", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021071416", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202107-901", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-28400", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-28400" }, { "db": "JVNDB", "id": "JVNDB-2021-010133" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202107-901" }, { "db": "NVD", "id": "CVE-2020-28400" } ] }, "id": "VAR-202107-1608", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5447269509677419 }, "last_update_date": "2024-08-14T12:06:49.974000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-599968", "trust": 0.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf" }, { "title": "Siemens Various product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=156594" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=77fc0ba2dcd8966c9a1f7eb47b8603ca" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-28400" }, { "db": "JVNDB", "id": "JVNDB-2021-010133" }, { "db": "CNNVD", "id": "CNNVD-202107-901" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-770", "trust": 1.0 }, { "problemtype": "Allocation of resources without limits or throttling (CWE-770) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010133" }, { "db": "NVD", "id": "CVE-2020-28400" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-03" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28400" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-194-03" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/siemens-ruggedcom-simatic-denial-of-service-via-profinet-dcp-reset-35890" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021071416" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2401" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/770.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://cert-portal.siemens.com/productcert/txt/ssa-599968.txt" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-28400" }, { "db": "JVNDB", "id": "JVNDB-2021-010133" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202107-901" }, { "db": "NVD", "id": "CVE-2020-28400" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2020-28400" }, { "db": "JVNDB", "id": "JVNDB-2021-010133" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202107-901" }, { "db": "NVD", "id": "CVE-2020-28400" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-13T00:00:00", "db": "VULMON", "id": "CVE-2020-28400" }, { "date": "2022-06-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010133" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-901" }, { "date": "2021-07-13T11:15:08.960000", "db": "NVD", "id": "CVE-2020-28400" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-13T00:00:00", "db": "VULMON", "id": "CVE-2020-28400" }, { "date": "2022-06-22T02:38:00", "db": "JVNDB", "id": "JVNDB-2021-010133" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2022-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-901" }, { "date": "2024-06-11T09:15:09.487000", "db": "NVD", "id": "CVE-2020-28400" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-901" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability in limiting or non-slotting resource allocation in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010133" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202107-901" } ], "trust": 1.2 } }
var-201705-3220
Vulnerability from variot
Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected. SIMATIC CP, SIMATIC RF600, SCALANCE W700, etc. are all industrial automation products from Siemens AG. A denial of service vulnerability exists in several industrial devices from Siemens. Multiple Siemens Products is prone to multiple denial-of-service vulnerabilities. Attackers can exploit these issues to cause a denial-of-service condition. Manual restart of the server is required to resume normal operation. SIEMENS SIMATIC CP 343-1 Std, CP 343-1 Lean (All versions), SIMATIC CP 343-1 Adv (All versions), SIMATIC CP 443-1 Std, CP 443-1 Adv (All versions before V3.2.17), SIMATIC CP 443-1 OPC-UA (All versions), SIMATIC CP 1243-1 (All versions before V2.1.82), SIMATIC CP 1243-1 IRC (All versions before V2.1.82), SIMATIC CP 1243-1 IEC (All versions), SIMATIC CP 1243-1 DNP3 (All versions), SIMATIC CM 1542-1 (All versions before V2.0), SIMATIC CP 1542SP-1, CP 1542SP-1 IRC, and CP 1543SP-1 (All versions before to V1.0.15), SIMATIC CP 1543-1 (All versions before V2.1), SIMATIC RF650R, RF680R, RF685R (All versions before V3.0), SIMATIC CP 1616, CP 1604, DK-16xx PN IO (All versions before V2.7), SCALANCE X-200 (All versions before V5.2.2), SCALANCE X200 IRT (All versions before V5.4.0), SCALANCE X-300/X408 (All versions before V4.1.0), SCALANCE X414 (All versions before V3.10.2), SCALANCE XM400, XR500 (All versions before V6.1), SCALANCE W700 (All versions before V6.1), SCALANCE M-800, S615 (All versions before V04.03), Softnet PROFINET IO for PC-based Windows systems (All versions before V14 SP1), IE/PB-Link (All versions before V3.0), IE/AS-i Link PN IO (All versions), SIMATIC Teleservice Adapter Standard Modem, IE Basic, IE Advanced (All versions), SITOP PSU8600 PROFINET (All versions before V1.2.0), SITOP UPS1600 PROFINET (All versions before V2.2.0), SIMATIC ET 200AL (All versions before V1.0.2), SIMATIC ET 200ecoPN (All versions), SIMATIC ET 200M (All versions), SIMATIC ET 200MP (All versions before V4.0.1), SIMATIC ET 200pro (All versions), SIMATIC ET 200S (All versions), SIMATIC ET 200SP (All versions before V4.1.0), SIMATIC PN/PN Coupler (All versions before V4.0), DK Standard Ethernet Controller (All versions before V4.1.1 Patch04), EK-ERTEC 200P PN IO (All versions before V4.4.0 Patch01), EK-ERTEC 200 PN IO (All versions before V4.2.1 Patch03), SIMATIC S7-200 SMART (All versions before V2.3), SIMATIC S7-300 incl. F and T (All versions before V3.X.14), SIMATIC S7-400 PN/DP V6 Incl. F (All versions before V6.0.6), SIMATIC S7-400-H V6 (All versions before V6.0.7), SIMATIC S7-400 PN/DP V7 incl. F (All versions), SIMATIC S7-CPU 410 (All versions before V8.2), SIMATIC S7-1200 incl. F (All versions before V4.2.1), SIMATIC S7-1500 incl. F, T, and TF (All versions before V2.1), SIMATIC S7-1500 Software Controller incl. F (All versions before V2.1), SIMATIC WinAC RTX 2010 incl. F (All versions), SIRIUS ACT 3SU1 interface module PROFINET (All versions), SIRIUS Soft starter 3RW44 PN (All versions), SIRIUS Motor starter M200D PROFINET (All versions), SIMOCODE pro V PROFINET (All versions), SINAMICS DCM (All versions before V1.4 SP1 HF5), SINAMICS DCP (All versions), SINAMICS G110M / G120(C/P/D) w. PN (All versions before V4.7 SP6 HF3), SINAMICS G130 and G150 (All versions before V4.7 HF27 and V4.8 before HF4), SINAMICS S110 w. PN (All versions before V4.4 SP1 HF5), SINAMICS S120 (All versions before V4.7 HF27 and V4.8 before HF4), SINAMICS S150 (All versions before V4.7 HF27 and V4.8 before HF4), SINAMICS V90 w. PN (All versions before V1.1), SIMOTION (All versions before V4.5 HF1), SINUMERIK 828D (All versions before V4.5 SP6 HF2 and V4.7 before SP6 HF8), SINUMERIK 840D sl (All versions before V4.5 SP6 HF8 and V4.7 before SP4 HF1), SIMATIC HMI Comfort Panels, HMI Multi Panels, HMI Mobile Panels (All versions) could be affected by a Denial-of-Service condition induced by a specially crafted PROFINET DCP broadcast (Layer 2 - Ethernet) packet. Siemens SIMATIC S7-200 Smart, etc. Siemens SIMATIC S7-200 Smart is a programmable logic controller (PLC) used in small and medium-sized automation systems. Siemens SIMATIC CP 343-1 Advanced is an Ethernet communication module used to support PROFINET (a new generation of automation bus standard based on industrial Ethernet technology). SIRIUS Motor starter M200D PROFINET is a motor starter. The following products and versions are affected: Siemens Extension Unit 12\" PROFINET prior to V01.01.01; Extension Unit 15\" PROFINET prior to V01.01.01; Extension Unit 19\" PROFINET prior to V01.01.01; Extension Unit 22\" PROFINET SIMATIC CP 1242-7 GPRS V2 prior to V2.1.82; SIMATIC CP 1243-7 LTE/US prior to V2.1.82; SIMATIC CP 1243-8 prior to V2.1.82; SIMATIC CP 1626 V1.1 previous version
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201705-3220", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "simatic dk-16xx pn io", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "simatic rf685r", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "simatic rf650r", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "simatic rf680r", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "simatic cp 1543sp-1", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "simatic cp 1542sp-1 irc", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "simatic cp 1542sp-1", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "scalance xr500", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "scalance s615", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "scalance m-800", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "scalance xm400", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "scalance w700", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sinamics gm150", "scope": "eq", "trust": 1.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics gh150", "scope": "eq", "trust": 1.3, "vendor": "siemens", "version": "4.7" }, { "model": "simatic cp 1543-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1" }, { "model": "sinamics s110 pn", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.4" }, { "model": "simatic rf650r", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "dk standard ethernet controller", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1.1" }, { "model": "simatic cp 1626", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.1" }, { "model": "scalance x414", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10.2" }, { "model": "scalance x200 irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.4.0" }, { "model": "simatic cp 1243-1 dnp3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic cp 1242-7 gprs", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.82" }, { "model": "sinamics gl150", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.8" }, { "model": "sinamics gm150", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic cp 1616", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.7" }, { "model": "sinamics g150", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics g130", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics s120", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic cp 1604", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.7" }, { "model": "simatic s7-1200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.2.1" }, { "model": "extension unit 22 profinet", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "01.01.01" }, { "model": "ek-ertec 200p pn io", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.4.0" }, { "model": "ie\\/pb-link", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "simatic cm 1542-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.0" }, { "model": "sirius motor starter m200d profinet", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic rf680r", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "sinamics s110 pn", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.4" }, { "model": "extension unit 19 profinet", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "01.01.01" }, { "model": "simatic cp 1243-1 irc", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.82" }, { "model": "sinamics dcp", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "1.2" }, { "model": "simatic cp 1542sp-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.0.15" }, { "model": "simatic cp 343-1 adv", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simotion", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.5" }, { "model": "simatic teleservice adapter ie standard", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic cp 443-1 opc-ua", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic et 200s", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "dk standard ethernet controller", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.1.1" }, { "model": "sinumerik 840d sl", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.5" }, { "model": "simatic tdc cpu555", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.1.1" }, { "model": "simatic et 200al", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.0.2" }, { "model": "sinamics g150", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics g110m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics gh150", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic cp 1543sp-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.0.15" }, { "model": "scalance xr500", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.1" }, { "model": "simatic et 200ecopn", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "ek-ertec 200 pn io", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.2.1" }, { "model": "softnet profinet io", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "14" }, { "model": "scalance m-800", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.03" }, { "model": "simatic hmi multi panels", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.1" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.03" }, { "model": "simatic cp 443-1 adv", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.2.17" }, { "model": "sinamics sl150", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.8" }, { "model": "sinamics dcp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.2" }, { "model": "simotion", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.5" }, { "model": "sitop psu8600", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.2.0" }, { "model": "sinumerik 840d sl", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.5" }, { "model": "simatic hmi mobile panels", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.1" }, { "model": "scalance x200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.2" }, { "model": "simatic s7-1500", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1" }, { "model": "simatic cp 343-1 std", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1.3" }, { "model": "simatic cp 1243-1 iec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic et 200pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "sinamics g110m", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "scalance xm400", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.1" }, { "model": "sinamics sm120", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.8" }, { "model": "scalance x408", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1.0" }, { "model": "simatic cp 343-1 lean", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1.3" }, { "model": "simatic dk-1604 pn io", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.7" }, { "model": "sirius act 3su1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.1.0" }, { "model": "ek-ertec 200 pn io", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.2.1" }, { "model": "simatic s7-300", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "softnet profinet io", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "14" }, { "model": "simatic tdc cp51m1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.1.8" }, { "model": "simatic dk-1616 pn io", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.7" }, { "model": "simatic et 200mp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.0.1" }, { "model": "sinamics dcm", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.4" }, { "model": "sinamics sl150", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.8" }, { "model": "simatic s7-200 smart", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "sinamics sm120", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.8" }, { "model": "scalance w700", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.1" }, { "model": "simatic et 200m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "extension unit 12 profinet", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "01.01.01" }, { "model": "simatic winac rtx", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "2010" }, { "model": "extension unit 15 profinet", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "01.01.01" }, { "model": "simatic s7-1500 software controller", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1" }, { "model": "sinamics g120\\ w. pn", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics s150", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic cp 1542sp-1 irc", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.0.15" }, { "model": "simatic cp 443-1 std", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.2.17" }, { "model": "sinumerik 828d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.5" }, { "model": "simatic s7-400", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.0.6" }, { "model": "simatic et 200sp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1.0" }, { "model": "sirius soft starter 3rw44 pn", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic teleservice adapter ie basic", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simocode pro v profinet", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.0.0" }, { "model": "simatic hmi comfort panels", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.1" }, { "model": "ups1600 profinet", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.2.0" }, { "model": "sinamics dcm", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "1.4" }, { "model": "simatic cp 1243-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.82" }, { "model": "ie\\/as-i link pn io", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "sinamics gl150", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.8" }, { "model": "simatic cp 1243-8", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.82" }, { "model": "sinamics v90 pn", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.01" }, { "model": "scalance x300", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1.0" }, { "model": "simatic winac rtx", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2010" }, { "model": "sinamics g130", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics s120", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic rf685r", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "ek-ertec 200p pn io", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.4.0" }, { "model": "sinamics s150", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics g120\\ w. pn", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic cp 1243-7 lte\\/us", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.82" }, { "model": "pn\\/pn coupler", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.0" }, { "model": "sinumerik 828d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.5" }, { "model": "simatic teleservice adapter ie advanced", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "dk standard ethernet controller", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ek-ertec 200 pn io", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ek-ertec 200p pn io", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ie/as-i link pn io", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ie/pb-link", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "pn/pn coupler", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x200 irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x300", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x408", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x414", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cm 1542-1", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 1243-1", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 1543-1", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 1604", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 1616", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 343-1 adv", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 343-1 lean", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 343-1 std", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 443-1 adv", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 443-1 opc-ua", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 443-1 std", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200al", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200ecopn", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200m", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200mp", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200pro", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200s", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200sp", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic hmi comfort panels", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic hmi mobile panels", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic hmi multi panels", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-1200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-1500 software controller", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-1500", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-200 smart", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-300", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-400", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic teleservice adapter ie advanced", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic teleservice adapter ie basic", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic teleservice adapter standard modem", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic winac rtx 2010", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simocode pro v profinet", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simotion", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics dcm", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics dcp", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics g110m", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics g120 w. pn", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics g130", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics g150", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics s110 w. pn", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics s120", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics s150", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics v90 w. pn", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinumerik 828d", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinumerik 840d sl", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sirius act 3su1 interface module profinet", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sirius motor starter m200d profinet", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sirius soft starter 3rw44 pn", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sitop psu8600", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sitop ups1600 profinet", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "softnet profinet io", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "for pc-based windows systems firmware" }, { "model": "simatic cp", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "1616" }, { "model": "simatic cp", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "1604" }, { "model": "simatic cp", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "1543-1" }, { "model": "simatic cm", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "1542-1" }, { "model": "simatic cp", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "1243-1" }, { "model": "simatic cp opc-ua", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "443-1" }, { "model": "simatic cp adv", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "443-1" }, { "model": "simatic cp std", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "443-1" }, { "model": "simatic cp std", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "343-1" }, { "model": "simatic cp lean", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "343-1" }, { "model": "simatic cp adv", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "343-1" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x408" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x414" }, { "model": "scalance irt", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x200" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x200" }, { "model": "scalance", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "x300" }, { "model": "simatic rf650r", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic cp 443-1 opc-ua", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic cm 1542-1", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic cp 1542sp-1 irc", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic cp 443-1 adv", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic cp 343-1 std", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic cp 1543-1", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic cp 1543sp-1", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic cp 1542sp-1", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic rf680r", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "sinumerik 828d", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "sinumerik 840d sl", "version": "*" }, { "model": "ups1600 profinet", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "softnet profinet io", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sitop psu8600", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sirius soft starter 3rw44 pn", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sirius act 3su1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sinumerik 840d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sinumerik 828d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sinamics sm150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics sm120", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics sl150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7.5" }, { "model": "sinamics sl150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7.4" }, { "model": "sinamics sl150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics gl150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simotion", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic winac rtx", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "20100" }, { "model": "simatic teleservice adapter standard modem", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic s7-400", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic s7-300", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic s7-200 smart", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic s7-1500", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic rf685r", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic rf680r", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic rf650r", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic et", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2000" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "443-10" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "343-10" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "16260" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "16160" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "16040" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1543-12.0.28" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1543-10" }, { "model": "simatic cp 1542sp-1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic cp irc", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1243-80" }, { "model": "simatic cp lte eu/us", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1243-70" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1243-10" }, { "model": "simatic cp gprs", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1242-7v20" }, { "model": "scalance xr500", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance xm400", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x4140" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x4084.0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x4083.0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x3000" }, { "model": "scalance irt", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x2000" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x2000" }, { "model": "scalance w700 series", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.4" }, { "model": "scalance w700 series", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.5.4" }, { "model": "scalance s615", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance m-800", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.02" }, { "model": "scalance m-800", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "ie/as-i link pn io", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "extension unit profinet", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "22?0" }, { "model": "extension unit profinet", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "19?0" }, { "model": "extension unit profinet", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "15?0" }, { "model": "extension unit profinet", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "12?0" }, { "model": "e/pb-link", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sinumerik 840d sl", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinumerik 828d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics sm120 sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.8" }, { "model": "sinamics sl150 sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.8" }, { "model": "sinamics gm150 sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.8" }, { "model": "sinamics gl150 sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.8" }, { "model": "sinamics gh150 sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.8" }, { "model": "simatic rf685r", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "simatic rf680r", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "simatic cp", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "16162.7" }, { "model": "simatic cp 1604d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "2.7" }, { "model": "simatic cp irc", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "1243-82.1.82" }, { "model": "simatic cp lte eu/us", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "1243-72.1.82" }, { "model": "simatic cp gprs", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "1242-7v22.1.82" }, { "model": "simatic rf650r", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "simatic cp", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "443-13.2.17" }, { "model": "simatic cp", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "15431.2.1" }, { "model": "simatic cm1542", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "1.2" }, { "model": "scalance w700", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "6.1" }, { "model": "extension unit profinet", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "22?1.1.1" }, { "model": "extension unit profinet", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "19?1.1.1" }, { "model": "extension unit profinet", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "15?1.1.1" }, { "model": "extension unit profinet", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "12?1.1.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 343 1 std", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1542sp 1 irc", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1543sp 1", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1543 1", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic rf650r", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic rf680r", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic rf685r", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1616", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1604", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic dk 16xx pn io", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x200", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 343 1 lean", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x200 irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x300", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x408", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x414", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xm400", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xr500", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance w700", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance m 800", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance s615", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "softnet profinet io", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 343 1 adv", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ie pb link", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ie as i link pn io", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic teleservice adapter standard modem", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic teleservice adapter ie basic modem", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic teleservice adapter ie advanced modem", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sitop psu8600", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ups1600 profinet", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200al", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200ecopn", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200m", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 443 1 std", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200mp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200pro", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200s", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200sp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pn pn coupler", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "dk standard ethernet controller", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ek ertec 200p pn io", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ek ertec 200 pn io", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 200 smart", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 300", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 443 1 adv", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 400", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 1200", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 1500", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 1500 controller", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic winac rtx 2010", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sirius act 3su1", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sirius soft starter 3rw44 pn", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sirius motor starter m200d profinet", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simocode pro v profinet", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics dcm", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 443 1 opc ua", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics dcp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics g110m", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics g120 c p d w pn", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics g130", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics g150", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics s110 w pn", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics s120", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics s150", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics v90 w pn", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simotion", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1243 1", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic hmi comfort panels", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic hmi multi panels", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic hmi mobile panels", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cm 1542 1", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1542sp 1", "version": null } ], "sources": [ { "db": "IVD", "id": "296c9514-b30d-4fa5-bcdc-9d8b2e9620c4" }, { "db": "CNVD", "id": "CNVD-2017-06151" }, { "db": "BID", "id": "98369" }, { "db": "JVNDB", "id": "JVNDB-2017-004134" }, { "db": "CNNVD", "id": "CNNVD-201705-574" }, { "db": "NVD", "id": "CVE-2017-2680" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:dk_standard_ethernet_controller_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ek-ertec_200_pn_io_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ek-ertec_200p_pn_io_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ie%2Fpb-link_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ie%2Fas-i_link_pn_io_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:pn%2Fpn_coupler_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_m-800_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_s615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_w700_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_x200irt_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_x200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_x300_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_x408_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_x414_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_xm400_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_xr500_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cm_1542-1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1243-1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1542sp-1_irc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1542sp-1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1543-1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1543sp-1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1616_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_343-1_lean_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_343-1_adv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_343-1_std_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_443-1_adv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_443-1_std_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_443-1_opc-ua_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_dk-16xx_pn_io_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200al_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200ecopn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200m_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200mp_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200pro_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200s_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200sp_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_hmi_comfort_panels", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_hmi_mobile_panels", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_hmi_multi_panels", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_rf650r_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_rf680r_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_rf685r_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-1200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-1500_software_controller_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-1500_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-200_smart_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-300_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-400_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_teleservice_adapter_ie_advanced_modem_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_teleservice_adapter_ie_basic_modem_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_teleservice_adapter_standard_modem_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_winac_rtx_2010_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simocode_pro_v_profinet_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simotion_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_dcm_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_dcp_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_g110m_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_g120%28c%2Fp%2Fd%29_w._pn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_g130_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_g150_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics__s110_w._pn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_s120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_s150_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_v90_w._pn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinumerik_828d_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinumerik_840d_sl_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sirius_act_3su1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sirius_motor_starter_m200d_profinet_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sirius_soft_starter_3rw44_pn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sitop_psu8600_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ups1600_profinet_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:softnet_profinet_io_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004134" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Duan JinTong, Ma ShaoShuai, and Cheng Lei from NSFOCUS Security Team.", "sources": [ { "db": "BID", "id": "98369" } ], "trust": 0.3 }, "cve": "CVE-2017-2680", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2017-2680", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2017-06151", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "296c9514-b30d-4fa5-bcdc-9d8b2e9620c4", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-110883", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2017-2680", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-2680", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-2680", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2017-2680", "trust": 1.0, "value": "High" }, { "author": "NVD", "id": "CVE-2017-2680", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2017-06151", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201705-574", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "296c9514-b30d-4fa5-bcdc-9d8b2e9620c4", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-110883", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "296c9514-b30d-4fa5-bcdc-9d8b2e9620c4" }, { "db": "CNVD", "id": "CNVD-2017-06151" }, { "db": "VULHUB", "id": "VHN-110883" }, { "db": "JVNDB", "id": "JVNDB-2017-004134" }, { "db": "CNNVD", "id": "CNNVD-201705-574" }, { "db": "NVD", "id": "CVE-2017-2680" }, { "db": "NVD", "id": "CVE-2017-2680" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected. SIMATIC CP, SIMATIC RF600, SCALANCE W700, etc. are all industrial automation products from Siemens AG. A denial of service vulnerability exists in several industrial devices from Siemens. Multiple Siemens Products is prone to multiple denial-of-service vulnerabilities. \nAttackers can exploit these issues to cause a denial-of-service condition. Manual restart of the server is required to resume normal operation. SIEMENS SIMATIC CP 343-1 Std, CP 343-1 Lean (All versions), SIMATIC CP 343-1 Adv (All versions), SIMATIC CP 443-1 Std, CP 443-1 Adv (All versions before V3.2.17), SIMATIC CP 443-1 OPC-UA (All versions), SIMATIC CP 1243-1 (All versions before V2.1.82), SIMATIC CP 1243-1 IRC (All versions before V2.1.82), SIMATIC CP 1243-1 IEC (All versions), SIMATIC CP 1243-1 DNP3 (All versions), SIMATIC CM 1542-1 (All versions before V2.0), SIMATIC CP 1542SP-1, CP 1542SP-1 IRC, and CP 1543SP-1 (All versions before to V1.0.15), SIMATIC CP 1543-1 (All versions before V2.1), SIMATIC RF650R, RF680R, RF685R (All versions before V3.0), SIMATIC CP 1616, CP 1604, DK-16xx PN IO (All versions before V2.7), SCALANCE X-200 (All versions before V5.2.2), SCALANCE X200 IRT (All versions before V5.4.0), SCALANCE X-300/X408 (All versions before V4.1.0), SCALANCE X414 (All versions before V3.10.2), SCALANCE XM400, XR500 (All versions before V6.1), SCALANCE W700 (All versions before V6.1), SCALANCE M-800, S615 (All versions before V04.03), Softnet PROFINET IO for PC-based Windows systems (All versions before V14 SP1), IE/PB-Link (All versions before V3.0), IE/AS-i Link PN IO (All versions), SIMATIC Teleservice Adapter Standard Modem, IE Basic, IE Advanced (All versions), SITOP PSU8600 PROFINET (All versions before V1.2.0), SITOP UPS1600 PROFINET (All versions before V2.2.0), SIMATIC ET 200AL (All versions before V1.0.2), SIMATIC ET 200ecoPN (All versions), SIMATIC ET 200M (All versions), SIMATIC ET 200MP (All versions before V4.0.1), SIMATIC ET 200pro (All versions), SIMATIC ET 200S (All versions), SIMATIC ET 200SP (All versions before V4.1.0), SIMATIC PN/PN Coupler (All versions before V4.0), DK Standard Ethernet Controller (All versions before V4.1.1 Patch04), EK-ERTEC 200P PN IO (All versions before V4.4.0 Patch01), EK-ERTEC 200 PN IO (All versions before V4.2.1 Patch03), SIMATIC S7-200 SMART (All versions before V2.3), SIMATIC S7-300 incl. F and T (All versions before V3.X.14), SIMATIC S7-400 PN/DP V6 Incl. F (All versions before V6.0.6), SIMATIC S7-400-H V6 (All versions before V6.0.7), SIMATIC S7-400 PN/DP V7 incl. F (All versions), SIMATIC S7-CPU 410 (All versions before V8.2), SIMATIC S7-1200 incl. F (All versions before V4.2.1), SIMATIC S7-1500 incl. F, T, and TF (All versions before V2.1), SIMATIC S7-1500 Software Controller incl. F (All versions before V2.1), SIMATIC WinAC RTX 2010 incl. F (All versions), SIRIUS ACT 3SU1 interface module PROFINET (All versions), SIRIUS Soft starter 3RW44 PN (All versions), SIRIUS Motor starter M200D PROFINET (All versions), SIMOCODE pro V PROFINET (All versions), SINAMICS DCM (All versions before V1.4 SP1 HF5), SINAMICS DCP (All versions), SINAMICS G110M / G120(C/P/D) w. PN (All versions before V4.7 SP6 HF3), SINAMICS G130 and G150 (All versions before V4.7 HF27 and V4.8 before HF4), SINAMICS S110 w. PN (All versions before V4.4 SP1 HF5), SINAMICS S120 (All versions before V4.7 HF27 and V4.8 before HF4), SINAMICS S150 (All versions before V4.7 HF27 and V4.8 before HF4), SINAMICS V90 w. PN (All versions before V1.1), SIMOTION (All versions before V4.5 HF1), SINUMERIK 828D (All versions before V4.5 SP6 HF2 and V4.7 before SP6 HF8), SINUMERIK 840D sl (All versions before V4.5 SP6 HF8 and V4.7 before SP4 HF1), SIMATIC HMI Comfort Panels, HMI Multi Panels, HMI Mobile Panels (All versions) could be affected by a Denial-of-Service condition induced by a specially crafted PROFINET DCP broadcast (Layer 2 - Ethernet) packet. Siemens SIMATIC S7-200 Smart, etc. Siemens SIMATIC S7-200 Smart is a programmable logic controller (PLC) used in small and medium-sized automation systems. Siemens SIMATIC CP 343-1 Advanced is an Ethernet communication module used to support PROFINET (a new generation of automation bus standard based on industrial Ethernet technology). SIRIUS Motor starter M200D PROFINET is a motor starter. The following products and versions are affected: Siemens Extension Unit 12\\\" PROFINET prior to V01.01.01; Extension Unit 15\\\" PROFINET prior to V01.01.01; Extension Unit 19\\\" PROFINET prior to V01.01.01; Extension Unit 22\\\" PROFINET SIMATIC CP 1242-7 GPRS V2 prior to V2.1.82; SIMATIC CP 1243-7 LTE/US prior to V2.1.82; SIMATIC CP 1243-8 prior to V2.1.82; SIMATIC CP 1626 V1.1 previous version", "sources": [ { "db": "NVD", "id": "CVE-2017-2680" }, { "db": "JVNDB", "id": "JVNDB-2017-004134" }, { "db": "CNVD", "id": "CNVD-2017-06151" }, { "db": "BID", "id": "98369" }, { "db": "IVD", "id": "296c9514-b30d-4fa5-bcdc-9d8b2e9620c4" }, { "db": "VULHUB", "id": "VHN-110883" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-2680", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-18-023-02", "trust": 2.8 }, { "db": "SIEMENS", "id": "SSA-293562", "trust": 2.6 }, { "db": "SIEMENS", "id": "SSA-284673", "trust": 2.0 }, { "db": "BID", "id": "98369", "trust": 2.0 }, { "db": "SIEMENS", "id": "SSA-546832", "trust": 1.7 }, { "db": "SECTRACK", "id": "1038463", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-17-129-02", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-201705-574", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2017-06151", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-18-128-01", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-004134", "trust": 0.8 }, { "db": "IVD", "id": "296C9514-B30D-4FA5-BCDC-9D8B2E9620C4", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-99023", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-110883", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "296c9514-b30d-4fa5-bcdc-9d8b2e9620c4" }, { "db": "CNVD", "id": "CNVD-2017-06151" }, { "db": "VULHUB", "id": "VHN-110883" }, { "db": "BID", "id": "98369" }, { "db": "JVNDB", "id": "JVNDB-2017-004134" }, { "db": "CNNVD", "id": "CNNVD-201705-574" }, { "db": "NVD", "id": "CVE-2017-2680" } ] }, "id": "VAR-201705-3220", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "296c9514-b30d-4fa5-bcdc-9d8b2e9620c4" }, { "db": "CNVD", "id": "CNVD-2017-06151" }, { "db": "VULHUB", "id": "VHN-110883" } ], "trust": 1.5467968472 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "296c9514-b30d-4fa5-bcdc-9d8b2e9620c4" }, { "db": "CNVD", "id": "CNVD-2017-06151" } ] }, "last_update_date": "2024-11-23T22:56:02.371000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-293562", "trust": 0.8, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdf" }, { "title": "Patch for a number of Siemens products with a denial of service vulnerability (CNVD-2017-06151)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/93364" }, { "title": "Multiple Siemens Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70052" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-06151" }, { "db": "JVNDB", "id": "JVNDB-2017-004134" }, { "db": "CNNVD", "id": "CNNVD-201705-574" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110883" }, { "db": "JVNDB", "id": "JVNDB-2017-004134" }, { "db": "NVD", "id": "CVE-2017-2680" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-023-02" }, { "trust": 2.0, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-284673.pdf" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/98369" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdf" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-546832.pdf" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-284673.pdf" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1038463" }, { "trust": 1.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-129-02" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/html/ssa-546832.html" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/html/ssa-284673.html" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/html/ssa-293562.html" }, { "trust": 0.9, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2680" }, { "trust": 0.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-128-01" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2680" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-17-129-02" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-06151" }, { "db": "VULHUB", "id": "VHN-110883" }, { "db": "BID", "id": "98369" }, { "db": "JVNDB", "id": "JVNDB-2017-004134" }, { "db": "CNNVD", "id": "CNNVD-201705-574" }, { "db": "NVD", "id": "CVE-2017-2680" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "296c9514-b30d-4fa5-bcdc-9d8b2e9620c4" }, { "db": "CNVD", "id": "CNVD-2017-06151" }, { "db": "VULHUB", "id": "VHN-110883" }, { "db": "BID", "id": "98369" }, { "db": "JVNDB", "id": "JVNDB-2017-004134" }, { "db": "CNNVD", "id": "CNNVD-201705-574" }, { "db": "NVD", "id": "CVE-2017-2680" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-05-09T00:00:00", "db": "IVD", "id": "296c9514-b30d-4fa5-bcdc-9d8b2e9620c4" }, { "date": "2017-05-09T00:00:00", "db": "CNVD", "id": "CNVD-2017-06151" }, { "date": "2017-05-11T00:00:00", "db": "VULHUB", "id": "VHN-110883" }, { "date": "2017-05-08T00:00:00", "db": "BID", "id": "98369" }, { "date": "2017-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004134" }, { "date": "2017-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201705-574" }, { "date": "2017-05-11T01:29:05.400000", "db": "NVD", "id": "CVE-2017-2680" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-05-09T00:00:00", "db": "CNVD", "id": "CNVD-2017-06151" }, { "date": "2020-09-29T00:00:00", "db": "VULHUB", "id": "VHN-110883" }, { "date": "2018-05-09T14:00:00", "db": "BID", "id": "98369" }, { "date": "2018-05-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004134" }, { "date": "2022-02-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201705-574" }, { "date": "2024-11-21T03:23:57.563000", "db": "NVD", "id": "CVE-2017-2680" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201705-574" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Siemens Service disruption in products (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004134" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201705-574" } ], "trust": 0.6 } }
var-202208-0610
Vulnerability from variot
Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack. SCALANCE M-800 firmware, SCALANCE S615 firmware, scalance w700 ieee 802.11ax Multiple Siemens products, including firmware, contain vulnerabilities related to limited or unthrottled resource allocation.Service operation interruption (DoS) It may be in a state. The SCALANCE M-800, MUM-800 and S615 and RUGGEDCOM RM1224 industrial routers are used for secure remote access to plants via mobile networks (e.g. GPRS or UMTS) and have integrated security functions for firewalls to prevent unauthorized access, as well as VPN to Secure data transmission. SCALANCE SC-600 devices (SC622-2C, SC632-2C, SC636-2C, SC642-2C, SC646-2C) are used to protect trusted industrial networks from untrusted network attacks. They allow filtering incoming and outgoing network connections in different ways. The SCALANCE W-1700 product is a wireless communication device based on the IEEE 802.11ac standard. SCALANCE W-700 products are wireless communication devices based on the IEEE 802.11ax standard. SCALANCE X switches are used to connect industrial components such as programmable logic controllers (PLC) or human machine interfaces (HMI). A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0610", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xc206-2sfp g", "scope": null, "trust": 1.6, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xr552-12m 2hr2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224-4c g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w700 ieee 802.11ac", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb205-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m poe ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524-8c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-12m ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm400", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr500", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208 \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w700 ieee 802.11n", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb213-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-8c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552-12m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm416-4c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr328-4c wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr526-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb205-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216 \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba dna", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf-200ba", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m 2hr2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552-12m 2hr2 l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w700 ieee 802.11ax", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb213-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-4c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr326-2c poe wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552-12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-12m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance s615", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m 2hr2 l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance m-800", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm416-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr526-8c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr526", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb205-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xc206-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb-200", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb216", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance w700 ieee 802.11ax", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xc-200", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xc206-2sfp g eec", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb213-3ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb213-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xc206-2g poe eec", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance w700 ieee 802.11n", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance w700 ieee 802.11ac", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb205-3ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance s615", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xc206-2sfp eec", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb208", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xc206-2g poe", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 s615", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "/" }, { "model": "scalance w-700 ieee 802.11ax family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance w-700 ieee 802.11n family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance w-1700 ieee 802.11ac family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xb-200 switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xc-200 switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xf-200ba switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xm-400 family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xp-200 switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xr-300wg switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xr-500 family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56475" }, { "db": "JVNDB", "id": "JVNDB-2022-014932" }, { "db": "NVD", "id": "CVE-2022-36324" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens has reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2714" } ], "trust": 0.6 }, "cve": "CVE-2022-36324", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-56475", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-36324", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-36324", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-36324", "trust": 1.0, "value": "HIGH" }, { "author": "productcert@siemens.com", "id": "CVE-2022-36324", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-36324", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-56475", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2714", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56475" }, { "db": "JVNDB", "id": "JVNDB-2022-014932" }, { "db": "CNNVD", "id": "CNNVD-202208-2714" }, { "db": "NVD", "id": "CVE-2022-36324" }, { "db": "NVD", "id": "CVE-2022-36324" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Affected devices do not properly handle the renegotiation of SSL/TLS parameters. This could allow an unauthenticated remote attacker to bypass the TCP brute force prevention and lead to a denial of service condition for the duration of the attack. SCALANCE M-800 firmware, SCALANCE S615 firmware, scalance w700 ieee 802.11ax Multiple Siemens products, including firmware, contain vulnerabilities related to limited or unthrottled resource allocation.Service operation interruption (DoS) It may be in a state. The SCALANCE M-800, MUM-800 and S615 and RUGGEDCOM RM1224 industrial routers are used for secure remote access to plants via mobile networks (e.g. GPRS or UMTS) and have integrated security functions for firewalls to prevent unauthorized access, as well as VPN to Secure data transmission. SCALANCE SC-600 devices (SC622-2C, SC632-2C, SC636-2C, SC642-2C, SC646-2C) are used to protect trusted industrial networks from untrusted network attacks. They allow filtering incoming and outgoing network connections in different ways. The SCALANCE W-1700 product is a wireless communication device based on the IEEE 802.11ac standard. SCALANCE W-700 products are wireless communication devices based on the IEEE 802.11ax standard. SCALANCE X switches are used to connect industrial components such as programmable logic controllers (PLC) or human machine interfaces (HMI). A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions)", "sources": [ { "db": "NVD", "id": "CVE-2022-36324" }, { "db": "JVNDB", "id": "JVNDB-2022-014932" }, { "db": "CNVD", "id": "CNVD-2022-56475" }, { "db": "VULMON", "id": "CVE-2022-36324" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-36324", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-710008", "trust": 3.1 }, { "db": "ICS CERT", "id": "ICSA-22-223-07", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU90767165", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-014932", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-56475", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.4032", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202208-2714", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-36324", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56475" }, { "db": "VULMON", "id": "CVE-2022-36324" }, { "db": "JVNDB", "id": "JVNDB-2022-014932" }, { "db": "CNNVD", "id": "CNNVD-202208-2714" }, { "db": "NVD", "id": "CVE-2022-36324" } ] }, "id": "VAR-202208-0610", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-56475" } ], "trust": 1.2363483332142855 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56475" } ] }, "last_update_date": "2024-08-14T14:17:48.847000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Unknown Vulnerability in Siemens SCALANCE Products", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/343621" }, { "title": "Multiple Siemens SCALANCE Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=207453" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56475" }, { "db": "CNNVD", "id": "CNNVD-202208-2714" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-770", "trust": 1.0 }, { "problemtype": "Allocation of resources without limits or throttling (CWE-770) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014932" }, { "db": "NVD", "id": "CVE-2022-36324" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90767165/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-36324" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-223-07" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-710008.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.4032" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-36324/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-223-07" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/770.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-223-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56475" }, { "db": "VULMON", "id": "CVE-2022-36324" }, { "db": "JVNDB", "id": "JVNDB-2022-014932" }, { "db": "CNNVD", "id": "CNNVD-202208-2714" }, { "db": "NVD", "id": "CVE-2022-36324" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-56475" }, { "db": "VULMON", "id": "CVE-2022-36324" }, { "db": "JVNDB", "id": "JVNDB-2022-014932" }, { "db": "CNNVD", "id": "CNNVD-202208-2714" }, { "db": "NVD", "id": "CVE-2022-36324" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "CNVD", "id": "CNVD-2022-56475" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-36324" }, { "date": "2023-09-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014932" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2714" }, { "date": "2022-08-10T12:15:12.930000", "db": "NVD", "id": "CVE-2022-36324" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "CNVD", "id": "CNVD-2022-56475" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-36324" }, { "date": "2023-09-22T08:25:00", "db": "JVNDB", "id": "JVNDB-2022-014932" }, { "date": "2022-09-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2714" }, { "date": "2023-02-23T16:19:42.137000", "db": "NVD", "id": "CVE-2022-36324" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2714" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability in limiting or non-slotting resource allocation in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014932" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2714" } ], "trust": 0.6 } }
var-202208-0611
Vulnerability from variot
Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. SCALANCE M-800 firmware, SCALANCE S615 firmware, SCALANCE SC-600 Multiple Siemens products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 and RUGGEDCOM RM1224 industrial routers are used for secure remote access to plants via mobile networks (e.g. GPRS or UMTS) and have integrated security functions of firewalls to prevent unauthorized access, as well as VPNs to Secure data transmission. SCALANCE SC-600 devices (SC622-2C, SC632-2C, SC636-2C, SC642-2C, SC646-2C) are used to protect trusted industrial networks from untrusted network attacks. They allow filtering incoming and outgoing network connections in different ways. The SCALANCE W-1700 product is a wireless communication device based on the IEEE 802.11ac standard. SCALANCE W-700 products are wireless communication devices based on the IEEE 802.11ax standard. SCALANCE X switches are used to connect industrial components such as programmable logic controllers (PLC) or human machine interfaces (HMI).
A command injection vulnerability exists in Siemens SCALANCE products, which results from an affected device failing to properly filter input fields. A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions < V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0611", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xr552-12m 2hr2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224-4c g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w700 ieee 802.11ac", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb205-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc-600", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance xb208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m poe ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524-8c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc642-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance sc632-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance xr324-12m ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm400", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr500", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208 \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w700 ieee 802.11n", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb213-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-8c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552-12m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm416-4c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr328-4c wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr526-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb205-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc636-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance xc206-2sfp eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216 \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba dna", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf-200ba", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m 2hr2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552-12m 2hr2 l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w700 ieee 802.11ax", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb213-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-4c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr326-2c poe wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552-12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-12m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance s615", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m 2hr2 l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc622-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance xc208g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc646-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance xc216-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance m-800", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm416-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr526-8c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr526", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc-646-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb205-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-600", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xc206-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb-200", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance w700 ieee 802.11ax", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb216", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-622-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xc-200", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb213-3ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-632-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb213-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-642-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance w700 ieee 802.11ac", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance w700 ieee 802.11n", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb205-3ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-636-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance s615", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb208", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 s615", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "/" }, { "model": "scalance sc-600 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v2.3.1" }, { "model": "scalance w-700 ieee 802.11ax family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance w-700 ieee 802.11n family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance w-1700 ieee 802.11ac family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xb-200 switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xc-200 switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xf-200ba switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xm-400 family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xp-200 switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xr-300wg switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xr-500 family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56476" }, { "db": "JVNDB", "id": "JVNDB-2022-014933" }, { "db": "NVD", "id": "CVE-2022-36323" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens has reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2715" } ], "trust": 0.6 }, "cve": "CVE-2022-36323", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2022-56476", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.3, "id": "CVE-2022-36323", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2022-36323", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-014933", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "productcert@siemens.com", "id": "CVE-2022-36323", "trust": 1.0, "value": "CRITICAL" }, { "author": "nvd@nist.gov", "id": "CVE-2022-36323", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2022-014933", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2022-56476", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2715", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56476" }, { "db": "JVNDB", "id": "JVNDB-2022-014933" }, { "db": "CNNVD", "id": "CNNVD-202208-2715" }, { "db": "NVD", "id": "CVE-2022-36323" }, { "db": "NVD", "id": "CVE-2022-36323" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. SCALANCE M-800 firmware, SCALANCE S615 firmware, SCALANCE SC-600 Multiple Siemens products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. SCALANCE M-800, MUM-800 and S615 and RUGGEDCOM RM1224 industrial routers are used for secure remote access to plants via mobile networks (e.g. GPRS or UMTS) and have integrated security functions of firewalls to prevent unauthorized access, as well as VPNs to Secure data transmission. SCALANCE SC-600 devices (SC622-2C, SC632-2C, SC636-2C, SC642-2C, SC646-2C) are used to protect trusted industrial networks from untrusted network attacks. They allow filtering incoming and outgoing network connections in different ways. The SCALANCE W-1700 product is a wireless communication device based on the IEEE 802.11ac standard. SCALANCE W-700 products are wireless communication devices based on the IEEE 802.11ax standard. SCALANCE X switches are used to connect industrial components such as programmable logic controllers (PLC) or human machine interfaces (HMI). \n\r\n\r\nA command injection vulnerability exists in Siemens SCALANCE products, which results from an affected device failing to properly filter input fields. A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions \u003c V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions)", "sources": [ { "db": "NVD", "id": "CVE-2022-36323" }, { "db": "JVNDB", "id": "JVNDB-2022-014933" }, { "db": "CNVD", "id": "CNVD-2022-56476" }, { "db": "VULMON", "id": "CVE-2022-36323" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-36323", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-710008", "trust": 3.1 }, { "db": "ICS CERT", "id": "ICSA-22-223-07", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU90767165", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-014933", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-56476", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.4032", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202208-2715", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-36323", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56476" }, { "db": "VULMON", "id": "CVE-2022-36323" }, { "db": "JVNDB", "id": "JVNDB-2022-014933" }, { "db": "CNNVD", "id": "CNNVD-202208-2715" }, { "db": "NVD", "id": "CVE-2022-36323" } ] }, "id": "VAR-202208-0611", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-56476" } ], "trust": 1.2477712656666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56476" } ] }, "last_update_date": "2024-08-14T14:17:45.411000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Siemens SCALANCE product command injection vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/343616" }, { "title": "Siemens SCALANCE Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=243185" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56476" }, { "db": "CNNVD", "id": "CNNVD-202208-2715" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-74", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014933" }, { "db": "NVD", "id": "CVE-2022-36323" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90767165/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-36323" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-223-07" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-710008.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.4032" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-36323/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-223-07" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/74.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-223-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56476" }, { "db": "VULMON", "id": "CVE-2022-36323" }, { "db": "JVNDB", "id": "JVNDB-2022-014933" }, { "db": "CNNVD", "id": "CNNVD-202208-2715" }, { "db": "NVD", "id": "CVE-2022-36323" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-56476" }, { "db": "VULMON", "id": "CVE-2022-36323" }, { "db": "JVNDB", "id": "JVNDB-2022-014933" }, { "db": "CNNVD", "id": "CNNVD-202208-2715" }, { "db": "NVD", "id": "CVE-2022-36323" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "CNVD", "id": "CNVD-2022-56476" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-36323" }, { "date": "2023-09-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014933" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2715" }, { "date": "2022-08-10T12:15:12.863000", "db": "NVD", "id": "CVE-2022-36323" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "CNVD", "id": "CNVD-2022-56476" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-36323" }, { "date": "2023-09-22T08:25:00", "db": "JVNDB", "id": "JVNDB-2022-014933" }, { "date": "2023-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2715" }, { "date": "2023-06-27T19:43:45.920000", "db": "NVD", "id": "CVE-2022-36323" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2715" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerabilities in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014933" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2715" } ], "trust": 0.6 } }
var-201712-0701
Vulnerability from variot
A vulnerability has been identified in RUGGEDCOM ROS for RSL910 devices (All versions < ROS V5.0.1), RUGGEDCOM ROS for all other devices (All versions < ROS V4.3.4), SCALANCE XB-200/XC-200/XP-200/XR300-WG (All versions between V3.0 (including) and V3.0.2 (excluding)), SCALANCE XR-500/XM-400 (All versions between V6.1 (including) and V6.1.1 (excluding)). After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to writeto the device under certain conditions, potentially allowing users located in the adjacentnetwork of the targeted device to perform unauthorized administrative actions. plural Siemens The product contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Siemens RuggedCom ROS is a ROX-based device for connecting devices in harsh environments, such as substations, traffic management chassis, etc. The SCALANCE XB-200 is an industrial Ethernet switch. Siemens Ruggedcom ROS and SCALANCE are not authorized to exploit the vulnerability. Multiple Siemens Products are prone to a remote security bypass vulnerability. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. RUGGEDCOM ROS prior to 4.3.4 for all other devices. SCALANCE XB-200/XC-200/XP-200/XR300-WG 3.0 and later. SCALANCE XR-500/XM-400 6.1 and later
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201712-0701", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ruggedcom ros", "scope": "lt", "trust": 1.6, "vendor": "siemens", "version": "4.3.4" }, { "model": "scalance xb-200", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "scalance xp-200", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "ruggedcom ros", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.0.1" }, { "model": "scalance xr300-wg", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "scalance xm-400", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "6.1" }, { "model": "scalance xr-500", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "6.1" }, { "model": "scalance xc-200", "scope": "gte", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "ruggedcom ros", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance xb-200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance xc-200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance xm400", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance xp-200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance xr-300-wg", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance xr500", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ruggedcom ros for rsl910", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "5.0.1" }, { "model": "scalance xb-200", "scope": "gt", "trust": 0.6, "vendor": "siemens", "version": "3.0" }, { "model": "scalance xc-200", "scope": "gt", "trust": 0.6, "vendor": "siemens", "version": "3.0" }, { "model": "scalance xp-200", "scope": "gt", "trust": 0.6, "vendor": "siemens", "version": "3.0" }, { "model": "scalance xr300-wg", "scope": "gt", "trust": 0.6, "vendor": "siemens", "version": "3.0" }, { "model": "scalance xr-500", "scope": "gt", "trust": 0.6, "vendor": "siemens", "version": "6.1" }, { "model": "scalance xm-400", "scope": "gt", "trust": 0.6, "vendor": "siemens", "version": "6.1" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "ruggedcom ros", "version": "*" }, { "model": "scalance xr300-wg", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "scalance xr-500", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "6.1" }, { "model": "scalance xp-200", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "scalance xm-400", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "6.1" }, { "model": "scalance xc-200", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "scalance xb-200", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "ruggedcom ros", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.2.1" }, { "model": "ruggedcom ros", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "5.0.0" }, { "model": "ruggedcom ros", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.3.3" }, { "model": "ruggedcom ros", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.2.0" }, { "model": "ruggedcom ros", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.1.0" }, { "model": "rsl910", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "ruggedcom ros", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "5.0.1" }, { "model": "ruggedcom ros", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.3.4" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xb 200", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xc 200", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xp 200", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xr300 wg", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xr 500", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xm 400", "version": "*" } ], "sources": [ { "db": "IVD", "id": "8e5e8cb8-d4ee-4ad5-9084-3bf21bbbdb6b" }, { "db": "CNVD", "id": "CNVD-2017-28656" }, { "db": "BID", "id": "101041" }, { "db": "JVNDB", "id": "JVNDB-2017-011797" }, { "db": "NVD", "id": "CVE-2017-12736" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:ruggedcom_ros", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_xb-200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_xc-200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_xm400_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_xp-200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_xr300-wg_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_xr500_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011797" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens", "sources": [ { "db": "BID", "id": "101041" }, { "db": "CNNVD", "id": "CNNVD-201709-1396" } ], "trust": 0.9 }, "cve": "CVE-2017-12736", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CVE-2017-12736", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2017-28656", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "8e5e8cb8-d4ee-4ad5-9084-3bf21bbbdb6b", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2017-12736", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-12736", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-12736", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-28656", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201709-1396", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "8e5e8cb8-d4ee-4ad5-9084-3bf21bbbdb6b", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "8e5e8cb8-d4ee-4ad5-9084-3bf21bbbdb6b" }, { "db": "CNVD", "id": "CNVD-2017-28656" }, { "db": "JVNDB", "id": "JVNDB-2017-011797" }, { "db": "CNNVD", "id": "CNNVD-201709-1396" }, { "db": "NVD", "id": "CVE-2017-12736" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in RUGGEDCOM ROS for RSL910 devices (All versions \u003c ROS V5.0.1), RUGGEDCOM ROS for all other devices (All versions \u003c ROS V4.3.4), SCALANCE XB-200/XC-200/XP-200/XR300-WG (All versions between V3.0 (including) and V3.0.2 (excluding)), SCALANCE XR-500/XM-400 (All versions between V6.1 (including) and V6.1.1 (excluding)). After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to writeto the device under certain conditions, potentially allowing users located in the adjacentnetwork of the targeted device to perform unauthorized administrative actions. plural Siemens The product contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Siemens RuggedCom ROS is a ROX-based device for connecting devices in harsh environments, such as substations, traffic management chassis, etc. The SCALANCE XB-200 is an industrial Ethernet switch. Siemens Ruggedcom ROS and SCALANCE are not authorized to exploit the vulnerability. Multiple Siemens Products are prone to a remote security bypass vulnerability. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. \nRUGGEDCOM ROS prior to 4.3.4 for all other devices. \nSCALANCE XB-200/XC-200/XP-200/XR300-WG 3.0 and later. \nSCALANCE XR-500/XM-400 6.1 and later", "sources": [ { "db": "NVD", "id": "CVE-2017-12736" }, { "db": "JVNDB", "id": "JVNDB-2017-011797" }, { "db": "CNVD", "id": "CNVD-2017-28656" }, { "db": "BID", "id": "101041" }, { "db": "IVD", "id": "8e5e8cb8-d4ee-4ad5-9084-3bf21bbbdb6b" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-12736", "trust": 3.5 }, { "db": "SIEMENS", "id": "SSA-856721", "trust": 2.5 }, { "db": "BID", "id": "101041", "trust": 1.9 }, { "db": "SECTRACK", "id": "1039464", "trust": 1.6 }, { "db": "SECTRACK", "id": "1039463", "trust": 1.6 }, { "db": "CNVD", "id": "CNVD-2017-28656", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201709-1396", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-17-271-01B", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-011797", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-17-271-01", "trust": 0.6 }, { "db": "IVD", "id": "8E5E8CB8-D4EE-4AD5-9084-3BF21BBBDB6B", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "8e5e8cb8-d4ee-4ad5-9084-3bf21bbbdb6b" }, { "db": "CNVD", "id": "CNVD-2017-28656" }, { "db": "BID", "id": "101041" }, { "db": "JVNDB", "id": "JVNDB-2017-011797" }, { "db": "CNNVD", "id": "CNNVD-201709-1396" }, { "db": "NVD", "id": "CVE-2017-12736" } ] }, "id": "VAR-201712-0701", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "8e5e8cb8-d4ee-4ad5-9084-3bf21bbbdb6b" }, { "db": "CNVD", "id": "CNVD-2017-28656" } ], "trust": 1.4230392388888888 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "8e5e8cb8-d4ee-4ad5-9084-3bf21bbbdb6b" }, { "db": "CNVD", "id": "CNVD-2017-28656" } ] }, "last_update_date": "2024-11-23T22:26:34.864000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-856721", "trust": 0.8, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf" }, { "title": "Siemens Ruggedcom ROS and SCALANCE Unauthorized Patch for Operational Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/103044" }, { "title": "Multiple Siemens Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75254" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-28656" }, { "db": "JVNDB", "id": "JVNDB-2017-011797" }, { "db": "CNNVD", "id": "CNNVD-201709-1396" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "CWE-665", "trust": 1.0 }, { "problemtype": "CWE-264", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011797" }, { "db": "NVD", "id": "CVE-2017-12736" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/101041" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id/1039463" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id/1039464" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12736" }, { "trust": 0.8, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-271-01b" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12736" }, { "trust": 0.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-271-01" }, { "trust": 0.3, "url": "http://www.siemens.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-28656" }, { "db": "BID", "id": "101041" }, { "db": "JVNDB", "id": "JVNDB-2017-011797" }, { "db": "CNNVD", "id": "CNNVD-201709-1396" }, { "db": "NVD", "id": "CVE-2017-12736" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "8e5e8cb8-d4ee-4ad5-9084-3bf21bbbdb6b" }, { "db": "CNVD", "id": "CNVD-2017-28656" }, { "db": "BID", "id": "101041" }, { "db": "JVNDB", "id": "JVNDB-2017-011797" }, { "db": "CNNVD", "id": "CNNVD-201709-1396" }, { "db": "NVD", "id": "CVE-2017-12736" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-29T00:00:00", "db": "IVD", "id": "8e5e8cb8-d4ee-4ad5-9084-3bf21bbbdb6b" }, { "date": "2017-09-29T00:00:00", "db": "CNVD", "id": "CNVD-2017-28656" }, { "date": "2017-09-28T00:00:00", "db": "BID", "id": "101041" }, { "date": "2018-01-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-011797" }, { "date": "2017-09-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-1396" }, { "date": "2017-12-26T04:29:13.643000", "db": "NVD", "id": "CVE-2017-12736" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-29T00:00:00", "db": "CNVD", "id": "CNVD-2017-28656" }, { "date": "2017-09-28T00:00:00", "db": "BID", "id": "101041" }, { "date": "2018-03-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-011797" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-1396" }, { "date": "2024-11-21T03:10:07.373000", "db": "NVD", "id": "CVE-2017-12736" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-1396" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Siemens Vulnerabilities related to authorization, authority, and access control in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011797" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-1396" } ], "trust": 0.6 } }
var-201705-3221
Vulnerability from variot
Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected. SIMATIC HMI is an industrial device from Siemens AG, Germany. The SIMATIC HMI panels are used for operator control and monitoring of machines and equipment. Multiple Siemens Products is prone to multiple denial-of-service vulnerabilities. Attackers can exploit these issues to cause a denial-of-service condition. Manual restart of the server is required to resume normal operation. A vulnerability has been identified in SIMATIC CP 343-1 Std (All versions), SIMATIC CP 343-1 Lean (All versions), SIMATIC CP 343-1 Adv (All versions), SIMATIC CP 443-1 Std (All versions < V3.2.17), SIMATIC CP 443-1 Adv (All versions < V3.2.17), SIMATIC CP 443-1 OPC-UA (All versions), SIMATIC CP 1243-1 (All versions < V2.1.82), SIMATIC CP 1243-1 IRC (All versions < V2.1.82), SIMATIC CP 1243-1 IEC (All versions), SIMATIC CP 1243-1 DNP3 (All versions), SIMATIC CM 1542-1 (All versions < V2.0), SIMATIC CM 1542SP-1 (All versions < V1.0.15), SIMATIC CP 1542SP-1 IRC (All versions < V1.0.15), SIMATIC CP 1543SP-1 (All versions < V1.0.15), SIMATIC CP 1543-1 (All versions < V2.1), SIMATIC RF650R (All versions < V3.0), SIMATIC RF680R (All versions < V3.0), SIMATIC RF685R (All versions < V3.0), SIMATIC CP 1616 (All versions < V2.7), SIMATIC CP 1604 (All versions < V2.7), SIMATIC DK-16xx PN IO (All versions < V2.7), SCALANCE X-200 (All versions < V5.2.2), SCALANCE X-200 IRT (All versions), SCALANCE X-300/X408 (All versions < V4.1.0), SCALANCE X414 (All versions < V3.10.2), SCALANCE XM400 (All versions < V6.1), SCALANCE XR500 (All versions < V6.1), SCALANCE W700 (All versions < V6.1), SCALANCE M-800, S615 (All versions < V4.03), Softnet PROFINET IO for PC-based Windows systems (All versions < V14 SP1), IE/PB-Link (All versions < V3.0), IE/AS-i Link PN IO (All versions), SIMATIC Teleservice Adapter Standard Modem, IE Basic, IE Advanced (All versions), SITOP PSU8600 PROFINET (All versions < V1.2.0), SITOP UPS1600 PROFINET (All versions < V2.2.0), SIMATIC ET 200AL (All versions < V1.0.2), SIMATIC ET 200ecoPN (All versions), SIMATIC ET 200M (All versions), SIMATIC ET 200MP IM155-5 PN BA (All versions < V4.0.1), SIMATIC ET 200MP IM155-5 PN ST (All versions < V4.1), SIMATIC ET 200MP (except IM155-5 PN BA and IM155-5 PN ST) (All versions), SIMATIC ET 200pro (All versions), SIMATIC ET 200S (All versions), SIMATIC ET 200SP IM155-6 PN ST (All versions < V4.1.0), SIMATIC ET 200SP (except IM155-6 PN ST) (All versions), SIMATIC PN/PN Coupler (All versions < V4.0), Development/Evaluation Kit DK Standard Ethernet Controller (All versions < V4.1.1 Patch04), Development/Evaluation Kit EK-ERTEC 200P (All versions < V4.4.0 Patch01), Development/Evaluation Kit EK-ERTEC 200 (All versions < V4.2.1 Patch03), SIMATIC S7-200 SMART (All versions < V2.3), SIMATIC S7-300 incl. F and T (All versions < V3.X.14), SIMATIC S7-400 PN/DP V6 Incl. F (All versions < V6.0.6), SIMATIC S7-400-H V6 (All versions < V6.0.7), SIMATIC S7-400 PN/DP V7 Incl. F (All versions < V7.0.2), SIMATIC S7-410 (All versions < V8.2), SIMATIC S7-1200 incl. F (All versions < V4.2.1), SIMATIC S7-1500 incl. F, T, and TF (All versions < V2.1), SIMATIC S7-1500 Software Controller incl. F (All versions < V2.1), SIMATIC WinAC RTX 2010 incl. F (All versions), SIRIUS ACT 3SU1 interface module PROFINET (All versions), SIRIUS Soft Starter 3RW44 PN (All versions), SIRIUS Motor Starter M200D PROFINET (All versions), SIMOCODE pro V PROFINET (All versions < V2.0.0), SINAMICS DCM w. PN (All versions < V1.4 SP1 HF5), SINAMICS DCP w. PN (All versions < V1.2 HF 1), SINAMICS G110M w. PN (All versions < V4.7 SP6 HF3), SINAMICS G120(C/P/D) w. PN (All versions < V4.7 SP6 HF3), SINAMICS G130 V4.7 w. PN (All versions < V4.7 HF27), SINAMICS G150 V4.7 w. PN (V4.7: All versions < V4.7 HF27), SINAMICS G130 V4.8 w. PN (All versions < V4.8 HF4), SINAMICS G150 V4.8 w. PN (All versions < V4.8 HF4), SINAMICS S110 w. PN (All versions < V4.4 SP3 HF5), SINAMICS S120 V4.7 w. PN (All versions < V4.7 HF27), and others. This vulnerability affects only SIMATIC HMI Multi Panels and HMI Mobile Panels, and S7-300/S7-400 devices. Siemens SIMATIC S7-300 F, etc. Siemens SIMATIC S7-300 F is a process controller. SIMATIC HMI Comfort Panels are touch screens
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201705-3221", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sinumerik 840d sl", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "4.7" }, { "model": "sinumerik 840d sl", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "4.5" }, { "model": "sinumerik 828d", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "4.7" }, { "model": "sinumerik 828d", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "4.5" }, { "model": "simatic hmi comfort panels", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "simatic hmi mobile panels", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "simatic rf650r", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "dk standard ethernet controller", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1.1" }, { "model": "sinamics s110 pn", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.4" }, { "model": "scalance x414", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.10.2" }, { "model": "simatic et 200sp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.2.0" }, { "model": "scalance x200 irt", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.4.0" }, { "model": "simatic cp 1243-1 dnp3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic cp 1616", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.7" }, { "model": "sinamics g150", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic cm 1542sp-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.0.15" }, { "model": "sinamics g130", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics s120", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic cp 1604", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.7" }, { "model": "sinamics s110 pn", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.4" }, { "model": "simatic s7-1200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.2.1" }, { "model": "ek-ertec 200p pn io", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.4.0" }, { "model": "ie\\/pb-link", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "simatic cm 1542-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.0" }, { "model": "sirius motor starter m200d profinet", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "sinumerik 840d sl", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic rf680r", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "simatic cp 1243-1 irc", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.82" }, { "model": "sinamics dcp", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "1.2" }, { "model": "simotion", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.5" }, { "model": "simatic cp 343-1 adv", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic cp 443-1 opc-ua", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic et 200s", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "dk standard ethernet controller", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.1.1" }, { "model": "simatic teleservice adapter ie advanced modem", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic tdc cpu555", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.1.1" }, { "model": "simatic et 200al", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.0.2" }, { "model": "simatic dk-16xx pn io", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.7" }, { "model": "sinamics g150", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics g110m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic s7-300", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.3.17" }, { "model": "simatic cp 1543sp-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.0.15" }, { "model": "scalance xr500", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.1" }, { "model": "simatic et 200ecopn", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "ek-ertec 200 pn io", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.2.1" }, { "model": "softnet profinet io", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "14" }, { "model": "scalance m-800", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.03" }, { "model": "simatic hmi multi panels", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.1" }, { "model": "scalance s615", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.03" }, { "model": "simatic cp 443-1 adv", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.2.17" }, { "model": "sinamics dcp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.2" }, { "model": "simatic teleservice adapter ie basic modem", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simotion", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.5" }, { "model": "sitop psu8600", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.2.0" }, { "model": "sinumerik 840d sl", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.5" }, { "model": "simatic hmi mobile panels", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.1" }, { "model": "scalance x200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "5.2.2" }, { "model": "simatic s7-1500", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1" }, { "model": "simatic cp 343-1 std", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1.3" }, { "model": "simatic cp 1243-1 iec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic et 200pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "sinamics g110m", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "scalance xm400", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.1" }, { "model": "scalance x408", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1.0" }, { "model": "simatic cp 343-1 lean", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1.3" }, { "model": "sirius act 3su1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.1.0" }, { "model": "ek-ertec 200 pn io", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.2.1" }, { "model": "simatic tdc cp51m1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.1.8" }, { "model": "softnet profinet io", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "14" }, { "model": "simatic et 200mp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.0.1" }, { "model": "sinamics dcm", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.4" }, { "model": "simatic s7-200 smart", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3" }, { "model": "simatic cp 1543-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.0.15" }, { "model": "scalance w700", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.1" }, { "model": "simatic et 200m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "sinumerik 828d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic winac rtx", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "2010" }, { "model": "simatic cp 1543sp-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1" }, { "model": "sinamics s150", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic cp 1542sp-1 irc", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.0.15" }, { "model": "simatic cp 443-1 std", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.2.17" }, { "model": "simatic s7-400", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.0.6" }, { "model": "sirius soft starter 3rw44 pn", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simocode pro v profinet", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.0.0" }, { "model": "simatic hmi comfort panels", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.1" }, { "model": "ups1600 profinet", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.2.0" }, { "model": "sinamics dcm", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "1.4" }, { "model": "simatic cp 1243-1", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1.82" }, { "model": "ie\\/as-i link pn io", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "simatic s7-1500 software controller", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.1" }, { "model": "sinamics v90 pn", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.01" }, { "model": "scalance x300", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.1.0" }, { "model": "simatic winac rtx", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2010" }, { "model": "sinamics g130", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics s120", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic rf685r", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.0" }, { "model": "ek-ertec 200p pn io", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "4.4.0" }, { "model": "sinamics s150", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "simatic teleservice adapter standard modem", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "pn\\/pn coupler", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.0" }, { "model": "sinumerik 828d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.5" }, { "model": "sinamics g120\\ pn", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "4.7" }, { "model": "dk standard ethernet controller", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ek-ertec 200 pn io", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ek-ertec 200p pn io", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ie/as-i link pn io", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "ie/pb-link", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "pn/pn coupler", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance m-800", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance s615", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance w700", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x200 irt", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x300", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x408", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance x414", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance xm400", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "scalance xr500", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cm 1542-1", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 1243-1", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 1542sp-1 irc", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 1542sp-1", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 1543-1", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 1543sp-1", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 1604", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 1616", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 343-1 adv", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 343-1 lean", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 343-1 std", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 443-1 adv", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 443-1 opc-ua", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic cp 443-1 std", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic dk-16xx pn io", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200al", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200ecopn", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200m", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200mp", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200pro", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200s", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic et 200sp", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic hmi multi panels", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic rf650r", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic rf680r", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic rf685r", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-1200", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-1500 software controller", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-1500", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-200 smart", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-300", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic s7-400", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic teleservice adapter ie advanced", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic teleservice adapter ie basic", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic teleservice adapter standard modem", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic winac rtx 2010", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simocode pro v profinet", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simotion", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics dcm", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics dcp", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics g110m", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics g120 w. pn", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics g130", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics g150", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics s110 w. pn", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics s120", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics s150", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinamics v90 w. pn", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinumerik 828d", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinumerik 840d sl", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sirius act 3su1 interface module profinet", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sirius motor starter m200d profinet", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sirius soft starter 3rw44 pn", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sitop psu8600", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sitop ups1600 profinet", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "softnet profinet io", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "for pc-based windows systems firmware" }, { "model": "simatic hmi multi panels", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "sinamics g150", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "4.8" }, { "model": "simatic hmi mobile panels", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "sinamics s120", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "4.8" }, { "model": "simatic hmi comfort panels", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "sinamics s110 w. pn", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": null }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "sinumerik 828d", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "sinumerik 840d sl", "version": "*" }, { "model": "ups1600 profinet", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "softnet profinet io", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sitop psu8600", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sirius soft starter 3rw44 pn", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sirius act 3su1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sinumerik 840d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sinumerik 828d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sinamics sm150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics sm120", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics sl150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7.5" }, { "model": "sinamics sl150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7.4" }, { "model": "sinamics sl150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics gm150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics gl150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics gh150", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simotion", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic winac rtx", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "20100" }, { "model": "simatic teleservice adapter standard modem", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic s7-400", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic s7-300", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic s7-200 smart", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic s7-1500", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic rf685r", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic rf680r", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic rf650r", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic et", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2000" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "443-10" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "343-10" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "16260" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "16160" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "16040" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1543-12.0.28" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1543-10" }, { "model": "simatic cp 1542sp-1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic cp irc", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1243-80" }, { "model": "simatic cp lte eu/us", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1243-70" }, { "model": "simatic cp", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1243-10" }, { "model": "simatic cp gprs", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1242-7v20" }, { "model": "scalance xr500", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance xm400", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x4140" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x4084.0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x4083.0" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x3000" }, { "model": "scalance irt", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x2000" }, { "model": "scalance", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "x2000" }, { "model": "scalance w700 series", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.4" }, { "model": "scalance w700 series", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.5.4" }, { "model": "scalance s615", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "scalance m-800", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "4.02" }, { "model": "scalance m-800", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "ie/as-i link pn io", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "extension unit profinet", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "22?0" }, { "model": "extension unit profinet", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "19?0" }, { "model": "extension unit profinet", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "15?0" }, { "model": "extension unit profinet", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "12?0" }, { "model": "e/pb-link", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sinumerik 840d sl", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinumerik 828d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.7" }, { "model": "sinamics sm120 sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.8" }, { "model": "sinamics sl150 sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.8" }, { "model": "sinamics gm150 sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.8" }, { "model": "sinamics gl150 sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.8" }, { "model": "sinamics gh150 sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "4.8" }, { "model": "simatic rf685r", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "simatic rf680r", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "simatic cp", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "16162.7" }, { "model": "simatic cp 1604d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "2.7" }, { "model": "simatic cp irc", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "1243-82.1.82" }, { "model": "simatic cp lte eu/us", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "1243-72.1.82" }, { "model": "simatic cp gprs", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "1242-7v22.1.82" }, { "model": "simatic rf650r", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "3.0" }, { "model": "simatic cp", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "443-13.2.17" }, { "model": "simatic cp", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "15431.2.1" }, { "model": "simatic cm1542", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "1.2" }, { "model": "scalance w700", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "6.1" }, { "model": "extension unit profinet", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "22?1.1.1" }, { "model": "extension unit profinet", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "19?1.1.1" }, { "model": "extension unit profinet", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "15?1.1.1" }, { "model": "extension unit profinet", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "12?1.1.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 343 1 std", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1542sp 1 irc", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1543sp 1", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1543 1", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic rf650r", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic rf680r", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic rf685r", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1616", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1604", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic dk 16xx pn io", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x200", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 343 1 lean", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x200 irt", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x300", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x408", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance x414", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xm400", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance xr500", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance w700", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance m 800", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "scalance s615", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "softnet profinet io", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 343 1 adv", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ie pb link", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ie as i link pn io", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic teleservice adapter standard modem", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic teleservice adapter ie basic modem", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic teleservice adapter ie advanced modem", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sitop psu8600", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ups1600 profinet", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200al", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200ecopn", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200m", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 443 1 std", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200mp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200pro", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200s", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic et 200sp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pn pn coupler", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "dk standard ethernet controller", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ek ertec 200p pn io", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "ek ertec 200 pn io", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 200 smart", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 300", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 443 1 adv", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 400", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 1200", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 1500", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic s7 1500 controller", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic winac rtx 2010", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sirius act 3su1", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sirius soft starter 3rw44 pn", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sirius motor starter m200d profinet", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simocode pro v profinet", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics dcm", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 443 1 opc ua", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics dcp", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics g110m", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics g120 c p d w pn", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics g130", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics g150", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics s110 w pn", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics s120", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics s150", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinamics v90 w pn", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simotion", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1243 1", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic hmi comfort panels", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic hmi multi panels", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic hmi mobile panels", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cm 1542 1", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic cp 1542sp 1", "version": null } ], "sources": [ { "db": "IVD", "id": "33467505-7492-4ae1-b978-12f61201709a" }, { "db": "CNVD", "id": "CNVD-2017-06153" }, { "db": "BID", "id": "98369" }, { "db": "JVNDB", "id": "JVNDB-2017-004135" }, { "db": "CNNVD", "id": "CNNVD-201705-639" }, { "db": "NVD", "id": "CVE-2017-2681" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:siemens:dk_standard_ethernet_controller_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ek-ertec_200_pn_io_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ek-ertec_200p_pn_io_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ie%2Fpb-link_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ie%2Fas-i_link_pn_io_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:pn%2Fpn_coupler_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_m-800_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_s615_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_w700_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_x200irt_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_x200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_x300_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_x408_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_x414_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_xm400_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:scalance_xr500_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cm_1542-1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1243-1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1542sp-1_irc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1542sp-1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1543-1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1543sp-1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1604_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_1616_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_343-1_lean_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_343-1_adv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_343-1_std_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_443-1_adv_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_443-1_std_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_cp_443-1_opc-ua_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_dk-16xx_pn_io_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200al_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200ecopn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200m_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200mp_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200pro_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200s_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_et_200sp_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_hmi_comfort_panels", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_hmi_mobile_panels", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_hmi_multi_panels", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_rf650r_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_rf680r_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_rf685r_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-1200_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-1500_software_controller_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-1500_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-200_smart_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-300_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_s7-400_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_teleservice_adapter_ie_advanced_modem_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_teleservice_adapter_ie_basic_modem_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_teleservice_adapter_standard_modem_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simatic_winac_rtx_2010_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simocode_pro_v_profinet_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:simotion_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_dcm_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_dcp_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_g110m_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_g120%28c%2Fp%2Fd%29_w._pn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_g130_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_g150_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics__s110_w._pn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_s120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_s150_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinamics_v90_w._pn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinumerik_828d_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sinumerik_840d_sl_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sirius_act_3su1_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sirius_motor_starter_m200d_profinet_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sirius_soft_starter_3rw44_pn_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:sitop_psu8600_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:ups1600_profinet_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:siemens:softnet_profinet_io_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004135" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Duan JinTong, Ma ShaoShuai, and Cheng Lei from NSFOCUS Security Team.", "sources": [ { "db": "BID", "id": "98369" } ], "trust": 0.3 }, "cve": "CVE-2017-2681", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2017-2681", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2017-06153", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "33467505-7492-4ae1-b978-12f61201709a", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-110884", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2017-2681", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-2681", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-2681", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2017-2681", "trust": 1.0, "value": "High" }, { "author": "NVD", "id": "CVE-2017-2681", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2017-06153", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201705-639", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "33467505-7492-4ae1-b978-12f61201709a", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-110884", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "33467505-7492-4ae1-b978-12f61201709a" }, { "db": "CNVD", "id": "CNVD-2017-06153" }, { "db": "VULHUB", "id": "VHN-110884" }, { "db": "JVNDB", "id": "JVNDB-2017-004135" }, { "db": "CNNVD", "id": "CNNVD-201705-639" }, { "db": "NVD", "id": "CVE-2017-2681" }, { "db": "NVD", "id": "CVE-2017-2681" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected. SIMATIC HMI is an industrial device from Siemens AG, Germany. The SIMATIC HMI panels are used for operator control and monitoring of machines and equipment. Multiple Siemens Products is prone to multiple denial-of-service vulnerabilities. \nAttackers can exploit these issues to cause a denial-of-service condition. Manual restart of the server is required to resume normal operation. A vulnerability has been identified in SIMATIC CP 343-1 Std (All versions), SIMATIC CP 343-1 Lean (All versions), SIMATIC CP 343-1 Adv (All versions), SIMATIC CP 443-1 Std (All versions \u003c V3.2.17), SIMATIC CP 443-1 Adv (All versions \u003c V3.2.17), SIMATIC CP 443-1 OPC-UA (All versions), SIMATIC CP 1243-1 (All versions \u003c V2.1.82), SIMATIC CP 1243-1 IRC (All versions \u003c V2.1.82), SIMATIC CP 1243-1 IEC (All versions), SIMATIC CP 1243-1 DNP3 (All versions), SIMATIC CM 1542-1 (All versions \u003c V2.0), SIMATIC CM 1542SP-1 (All versions \u003c V1.0.15), SIMATIC CP 1542SP-1 IRC (All versions \u003c V1.0.15), SIMATIC CP 1543SP-1 (All versions \u003c V1.0.15), SIMATIC CP 1543-1 (All versions \u003c V2.1), SIMATIC RF650R (All versions \u003c V3.0), SIMATIC RF680R (All versions \u003c V3.0), SIMATIC RF685R (All versions \u003c V3.0), SIMATIC CP 1616 (All versions \u003c V2.7), SIMATIC CP 1604 (All versions \u003c V2.7), SIMATIC DK-16xx PN IO (All versions \u003c V2.7), SCALANCE X-200 (All versions \u003c V5.2.2), SCALANCE X-200 IRT (All versions), SCALANCE X-300/X408 (All versions \u003c V4.1.0), SCALANCE X414 (All versions \u003c V3.10.2), SCALANCE XM400 (All versions \u003c V6.1), SCALANCE XR500 (All versions \u003c V6.1), SCALANCE W700 (All versions \u003c V6.1), SCALANCE M-800, S615 (All versions \u003c V4.03), Softnet PROFINET IO for PC-based Windows systems (All versions \u003c V14 SP1), IE/PB-Link (All versions \u003c V3.0), IE/AS-i Link PN IO (All versions), SIMATIC Teleservice Adapter Standard Modem, IE Basic, IE Advanced (All versions), SITOP PSU8600 PROFINET (All versions \u003c V1.2.0), SITOP UPS1600 PROFINET (All versions \u003c V2.2.0), SIMATIC ET 200AL (All versions \u003c V1.0.2), SIMATIC ET 200ecoPN (All versions), SIMATIC ET 200M (All versions), SIMATIC ET 200MP IM155-5 PN BA (All versions \u003c V4.0.1), SIMATIC ET 200MP IM155-5 PN ST (All versions \u003c V4.1), SIMATIC ET 200MP (except IM155-5 PN BA and IM155-5 PN ST) (All versions), SIMATIC ET 200pro (All versions), SIMATIC ET 200S (All versions), SIMATIC ET 200SP IM155-6 PN ST (All versions \u003c V4.1.0), SIMATIC ET 200SP (except IM155-6 PN ST) (All versions), SIMATIC PN/PN Coupler (All versions \u003c V4.0), Development/Evaluation Kit DK Standard Ethernet Controller (All versions \u003c V4.1.1 Patch04), Development/Evaluation Kit EK-ERTEC 200P (All versions \u003c V4.4.0 Patch01), Development/Evaluation Kit EK-ERTEC 200 (All versions \u003c V4.2.1 Patch03), SIMATIC S7-200 SMART (All versions \u003c V2.3), SIMATIC S7-300 incl. F and T (All versions \u003c V3.X.14), SIMATIC S7-400 PN/DP V6 Incl. F (All versions \u003c V6.0.6), SIMATIC S7-400-H V6 (All versions \u003c V6.0.7), SIMATIC S7-400 PN/DP V7 Incl. F (All versions \u003c V7.0.2), SIMATIC S7-410 (All versions \u003c V8.2), SIMATIC S7-1200 incl. F (All versions \u003c V4.2.1), SIMATIC S7-1500 incl. F, T, and TF (All versions \u003c V2.1), SIMATIC S7-1500 Software Controller incl. F (All versions \u003c V2.1), SIMATIC WinAC RTX 2010 incl. F (All versions), SIRIUS ACT 3SU1 interface module PROFINET (All versions), SIRIUS Soft Starter 3RW44 PN (All versions), SIRIUS Motor Starter M200D PROFINET (All versions), SIMOCODE pro V PROFINET (All versions \u003c V2.0.0), SINAMICS DCM w. PN (All versions \u003c V1.4 SP1 HF5), SINAMICS DCP w. PN (All versions \u003c V1.2 HF 1), SINAMICS G110M w. PN (All versions \u003c V4.7 SP6 HF3), SINAMICS G120(C/P/D) w. PN (All versions \u003c V4.7 SP6 HF3), SINAMICS G130 V4.7 w. PN (All versions \u003c V4.7 HF27), SINAMICS G150 V4.7 w. PN (V4.7: All versions \u003c V4.7 HF27), SINAMICS G130 V4.8 w. PN (All versions \u003c V4.8 HF4), SINAMICS G150 V4.8 w. PN (All versions \u003c V4.8 HF4), SINAMICS S110 w. PN (All versions \u003c V4.4 SP3 HF5), SINAMICS S120 V4.7 w. PN (All versions \u003c V4.7 HF27), and others. This vulnerability affects only SIMATIC HMI Multi Panels and HMI Mobile Panels, and S7-300/S7-400 devices. Siemens SIMATIC S7-300 F, etc. Siemens SIMATIC S7-300 F is a process controller. SIMATIC HMI Comfort Panels are touch screens", "sources": [ { "db": "NVD", "id": "CVE-2017-2681" }, { "db": "JVNDB", "id": "JVNDB-2017-004135" }, { "db": "CNVD", "id": "CNVD-2017-06153" }, { "db": "BID", "id": "98369" }, { "db": "IVD", "id": "33467505-7492-4ae1-b978-12f61201709a" }, { "db": "VULHUB", "id": "VHN-110884" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-2681", "trust": 3.6 }, { "db": "SIEMENS", "id": "SSA-293562", "trust": 2.6 }, { "db": "BID", "id": "98369", "trust": 2.0 }, { "db": "SECTRACK", "id": "1038463", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-17-129-02", "trust": 1.7 }, { "db": "CNVD", "id": "CNVD-2017-06153", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201705-639", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-004135", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-18-023-02", "trust": 0.3 }, { "db": "SIEMENS", "id": "SSA-284673", "trust": 0.3 }, { "db": "IVD", "id": "33467505-7492-4AE1-B978-12F61201709A", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-110884", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "33467505-7492-4ae1-b978-12f61201709a" }, { "db": "CNVD", "id": "CNVD-2017-06153" }, { "db": "VULHUB", "id": "VHN-110884" }, { "db": "BID", "id": "98369" }, { "db": "JVNDB", "id": "JVNDB-2017-004135" }, { "db": "CNNVD", "id": "CNNVD-201705-639" }, { "db": "NVD", "id": "CVE-2017-2681" } ] }, "id": "VAR-201705-3221", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "33467505-7492-4ae1-b978-12f61201709a" }, { "db": "CNVD", "id": "CNVD-2017-06153" }, { "db": "VULHUB", "id": "VHN-110884" } ], "trust": 1.5075520524444446 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "33467505-7492-4ae1-b978-12f61201709a" }, { "db": "CNVD", "id": "CNVD-2017-06153" } ] }, "last_update_date": "2024-11-23T22:56:02.322000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-293562", "trust": 0.8, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdf" }, { "title": "Patch for Siemens SIMATIC HMI Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/93365" }, { "title": "Multiple Siemens Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70109" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-06153" }, { "db": "JVNDB", "id": "JVNDB-2017-004135" }, { "db": "CNNVD", "id": "CNNVD-201705-639" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110884" }, { "db": "JVNDB", "id": "JVNDB-2017-004135" }, { "db": "NVD", "id": "CVE-2017-2681" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-293562.pdf" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/98369" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdf" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1038463" }, { "trust": 1.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-129-02" }, { "trust": 1.0, "url": "https://cert-portal.siemens.com/productcert/html/ssa-293562.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2681" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2681" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-17-129-02" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-023-02" }, { "trust": 0.3, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-284673.pdf" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-06153" }, { "db": "VULHUB", "id": "VHN-110884" }, { "db": "BID", "id": "98369" }, { "db": "JVNDB", "id": "JVNDB-2017-004135" }, { "db": "CNNVD", "id": "CNNVD-201705-639" }, { "db": "NVD", "id": "CVE-2017-2681" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "33467505-7492-4ae1-b978-12f61201709a" }, { "db": "CNVD", "id": "CNVD-2017-06153" }, { "db": "VULHUB", "id": "VHN-110884" }, { "db": "BID", "id": "98369" }, { "db": "JVNDB", "id": "JVNDB-2017-004135" }, { "db": "CNNVD", "id": "CNNVD-201705-639" }, { "db": "NVD", "id": "CVE-2017-2681" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-05-09T00:00:00", "db": "IVD", "id": "33467505-7492-4ae1-b978-12f61201709a" }, { "date": "2017-05-09T00:00:00", "db": "CNVD", "id": "CNVD-2017-06153" }, { "date": "2017-05-11T00:00:00", "db": "VULHUB", "id": "VHN-110884" }, { "date": "2017-05-08T00:00:00", "db": "BID", "id": "98369" }, { "date": "2017-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004135" }, { "date": "2017-05-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201705-639" }, { "date": "2017-05-11T10:29:00.180000", "db": "NVD", "id": "CVE-2017-2681" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-05-09T00:00:00", "db": "CNVD", "id": "CNVD-2017-06153" }, { "date": "2020-09-29T00:00:00", "db": "VULHUB", "id": "VHN-110884" }, { "date": "2018-05-09T14:00:00", "db": "BID", "id": "98369" }, { "date": "2017-09-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004135" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201705-639" }, { "date": "2024-11-21T03:23:57.917000", "db": "NVD", "id": "CVE-2017-2681" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201705-639" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens SIMATIC HMI Denial of service vulnerability", "sources": [ { "db": "IVD", "id": "33467505-7492-4ae1-b978-12f61201709a" }, { "db": "CNVD", "id": "CNVD-2017-06153" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201705-639" } ], "trust": 0.6 } }
var-202208-0612
Vulnerability from variot
Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS. SCALANCE M-800 firmware, SCALANCE S615 firmware, SCALANCE SC-600 Multiple Siemens products such as firmware have unspecified vulnerabilities.Information may be obtained and information may be tampered with. SCALANCE M-800, MUM-800 and S615 and RUGGEDCOM RM1224 industrial routers are used for secure remote access to plants via mobile networks (e.g. GPRS or UMTS) and have integrated security functions of firewalls to prevent unauthorized access, as well as VPNs to Secure data transmission. SCALANCE SC-600 devices (SC622-2C, SC632-2C, SC636-2C, SC642-2C, SC646-2C) are used to protect trusted industrial networks from untrusted network attacks. They allow filtering incoming and outgoing network connections in different ways. The SCALANCE W-1700 product is a wireless communication device based on the IEEE 802.11ac standard. SCALANCE W-700 products are wireless communication devices based on the IEEE 802.11ax standard. SCALANCE X switches are used to connect industrial components such as programmable logic controllers (PLC) or human machine interfaces (HMI). A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions < V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0612", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "scalance xr552-12m 2hr2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224-4c g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w700 ieee 802.11ac", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb205-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc-600", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance xb208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m poe ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524-8c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc642-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance sc632-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance xr324-12m ts", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba irt", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm400", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr500", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208 \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w700 ieee 802.11n", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb213-3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-8c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552-12m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm416-4c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc224-4c g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr328-4c wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2sfp g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208poe eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr526-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc216-4c g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb205-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc636-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance xc206-2sfp eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216 \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf204-2ba dna", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xf-200ba", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m 2hr2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-8c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552-12m 2hr2 l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g poe", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance w700 ieee 802.11ax", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xb213-3ld", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc206-2", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm408-4c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr326-2c poe wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr552-12", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp208eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-12m", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr524", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp-200", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance s615", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xc208g eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528-6m 2hr2 l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xp216eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr324-4m eec", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr528", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc622-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance xc208g", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc646-2c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.3.1" }, { "model": "scalance xc216-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance m-800", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xm416-4c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr526-8c l3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr526", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance xr-300wg", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "scalance sc-646-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb205-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-600", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xc206-2", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb-200", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance w700 ieee 802.11ax", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb216", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-622-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xc-200", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb213-3ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-632-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb213-3", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-642-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance w700 ieee 802.11ac", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance w700 ieee 802.11n", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb205-3ld", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance sc-636-2c", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance s615", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance xb208", "scope": null, "trust": 0.8, "vendor": "\u30b7\u30fc\u30e1\u30f3\u30b9", "version": null }, { "model": "scalance m-800 s615", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "/" }, { "model": "scalance sc-600 family", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v2.3.1" }, { "model": "scalance w-700 ieee 802.11ax family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance w-700 ieee 802.11n family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance w-1700 ieee 802.11ac family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xb-200 switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xc-200 switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xf-200ba switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xm-400 family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xp-200 switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xr-300wg switch family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "scalance xr-500 family", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56474" }, { "db": "JVNDB", "id": "JVNDB-2022-014931" }, { "db": "NVD", "id": "CVE-2022-36325" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens has reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2711" } ], "trust": 0.6 }, "cve": "CVE-2022-36325", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2022-56474", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.7, "id": "CVE-2022-36325", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "productcert@siemens.com", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "id": "CVE-2022-36325", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.8, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2022-36325", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "High", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-36325", "trust": 1.0, "value": "MEDIUM" }, { "author": "productcert@siemens.com", "id": "CVE-2022-36325", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2022-36325", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2022-56474", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2711", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56474" }, { "db": "JVNDB", "id": "JVNDB-2022-014931" }, { "db": "CNNVD", "id": "CNNVD-202208-2711" }, { "db": "NVD", "id": "CVE-2022-36325" }, { "db": "NVD", "id": "CVE-2022-36325" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Affected devices do not properly sanitize data introduced by an user when rendering the web interface. This could allow an authenticated remote attacker with administrative privileges to inject code and lead to a DOM-based XSS. SCALANCE M-800 firmware, SCALANCE S615 firmware, SCALANCE SC-600 Multiple Siemens products such as firmware have unspecified vulnerabilities.Information may be obtained and information may be tampered with. SCALANCE M-800, MUM-800 and S615 and RUGGEDCOM RM1224 industrial routers are used for secure remote access to plants via mobile networks (e.g. GPRS or UMTS) and have integrated security functions of firewalls to prevent unauthorized access, as well as VPNs to Secure data transmission. SCALANCE SC-600 devices (SC622-2C, SC632-2C, SC636-2C, SC642-2C, SC646-2C) are used to protect trusted industrial networks from untrusted network attacks. They allow filtering incoming and outgoing network connections in different ways. The SCALANCE W-1700 product is a wireless communication device based on the IEEE 802.11ac standard. SCALANCE W-700 products are wireless communication devices based on the IEEE 802.11ax standard. SCALANCE X switches are used to connect industrial components such as programmable logic controllers (PLC) or human machine interfaces (HMI). A vulnerability has been identified in SCALANCE M-800 / S615 (All versions), SCALANCE SC-600 family (All versions \u003c V2.3.1), SCALANCE W-1700 IEEE 802.11ac family (All versions), SCALANCE W-700 IEEE 802.11ax family (All versions), SCALANCE W-700 IEEE 802.11n family (All versions), SCALANCE XB-200 switch family (All versions), SCALANCE XC-200 switch family (All versions), SCALANCE XF-200BA switch family (All versions), SCALANCE XM-400 Family (All versions), SCALANCE XP-200 switch family (All versions), SCALANCE XR-300WG switch family (All versions), SCALANCE XR-500 Family (All versions)", "sources": [ { "db": "NVD", "id": "CVE-2022-36325" }, { "db": "JVNDB", "id": "JVNDB-2022-014931" }, { "db": "CNVD", "id": "CNVD-2022-56474" }, { "db": "VULMON", "id": "CVE-2022-36325" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-36325", "trust": 3.9 }, { "db": "SIEMENS", "id": "SSA-710008", "trust": 3.1 }, { "db": "ICS CERT", "id": "ICSA-22-223-07", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU90767165", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-014931", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-56474", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.4032", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202208-2711", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-36325", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56474" }, { "db": "VULMON", "id": "CVE-2022-36325" }, { "db": "JVNDB", "id": "JVNDB-2022-014931" }, { "db": "CNNVD", "id": "CNNVD-202208-2711" }, { "db": "NVD", "id": "CVE-2022-36325" } ] }, "id": "VAR-202208-0612", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-56474" } ], "trust": 1.2477712656666666 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56474" } ] }, "last_update_date": "2024-08-14T14:17:48.938000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Unknown Vulnerability in Siemens SCALANCE Products (CNVD-2022-56474)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/343626" }, { "title": "Siemens SCALANCE Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=243184" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56474" }, { "db": "CNNVD", "id": "CNNVD-202208-2711" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-80", "trust": 1.0 }, { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014931" }, { "db": "NVD", "id": "CVE-2022-36325" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-710008.pdf" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90767165/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-36325" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-223-07" }, { "trust": 0.6, "url": "https://cert-portal.siemens.com/productcert/html/ssa-710008.html" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-36325/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.4032" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-223-07" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/80.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-223-07" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-56474" }, { "db": "VULMON", "id": "CVE-2022-36325" }, { "db": "JVNDB", "id": "JVNDB-2022-014931" }, { "db": "CNNVD", "id": "CNNVD-202208-2711" }, { "db": "NVD", "id": "CVE-2022-36325" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-56474" }, { "db": "VULMON", "id": "CVE-2022-36325" }, { "db": "JVNDB", "id": "JVNDB-2022-014931" }, { "db": "CNNVD", "id": "CNNVD-202208-2711" }, { "db": "NVD", "id": "CVE-2022-36325" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "CNVD", "id": "CNVD-2022-56474" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-36325" }, { "date": "2023-09-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014931" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2711" }, { "date": "2022-08-10T12:15:12.997000", "db": "NVD", "id": "CVE-2022-36325" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "CNVD", "id": "CNVD-2022-56474" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-36325" }, { "date": "2023-09-22T08:25:00", "db": "JVNDB", "id": "JVNDB-2022-014931" }, { "date": "2023-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2711" }, { "date": "2023-06-27T19:51:47.307000", "db": "NVD", "id": "CVE-2022-36325" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2711" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerabilities in multiple Siemens products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014931" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2711" } ], "trust": 0.6 } }