Vulnerabilites related to siemens - simatic_s7-1500_cpu_firmware
Vulnerability from fkie_nvd
Published
2014-08-17 23:55
Modified
2024-11-21 02:11
Severity ?
Summary
Siemens SIMATIC S7-1500 CPU devices with firmware before 1.6 allow remote attackers to cause a denial of service (device restart and STOP transition) via crafted TCP packets.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "164F6569-C801-4790-9326-F3D56CF85903", versionEndIncluding: "1.5.1", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "00673095-ABE2-44E9-B032-3C0D9FD4DADC", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "B7034B3A-0E68-46CB-B481-A644CAF26855", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "ABE40AA5-31F1-42E7-9C96-EB0812EA699D", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.2:*:*:*:*:*:*:*", matchCriteriaId: "3E50C015-01AF-4CAB-AE69-84349DC133FB", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.5:*:*:*:*:*:*:*", matchCriteriaId: "814CB3FD-C9EA-4963-B705-BBB30AA8EE8A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1511-1_pn_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "668B8FDF-4D50-4E54-88CE-D9A2C483D460", vulnerable: true, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1513-1_pn_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "6F18327E-6C57-42F0-983C-F88F70C9FB6C", vulnerable: true, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1515-2_pn_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "A074A6C0-6D87-40C3-9031-E8582797A299", vulnerable: true, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1516-3_pn\\/dp_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "E3C8B2D4-9BC2-424E-ABE3-2095CE414255", vulnerable: true, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1516f-3_pn\\/dp_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "84C4C6FB-5D77-4A8B-9ABA-321353F6D1E2", vulnerable: true, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1518-4_pn\\/dp_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "59EFE215-70A4-4A85-AA84-360FED0B6D89", vulnerable: true, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1518f-4_pn\\/dp_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "9BE49E75-DC54-4AD5-923C-12F6603B9793", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU devices with firmware before 1.6 allow remote attackers to cause a denial of service (device restart and STOP transition) via crafted TCP packets.", }, { lang: "es", value: "Los dispositivos Siemens SIMATIC S7-1500 CPU con firmware anterior a 1.6 permiten a atacantes remotos causar una denegación de servicio (reinicio de dispositivos y transición STOP) a través de paquetes TCP manipulados.", }, ], id: "CVE-2014-5074", lastModified: "2024-11-21T02:11:22.020", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-08-17T23:55:07.650", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-310688.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-310688.pdf", }, { source: "cve@mitre.org", tags: [ "Patch", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-14-226-01", }, { source: "cve@mitre.org", url: "https://www.exploit-db.com/exploits/44693/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-310688.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-310688.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-14-226-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.exploit-db.com/exploits/44693/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2024-11-21 02:05
Severity ?
Summary
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted Profinet packets.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_s7-1500_cpu_firmware | * | |
siemens | simatic_s7-1500_cpu_firmware | 1.0.1 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.0 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F9DE401-8833-4BBC-A9F9-6275484C932C", versionEndIncluding: "1.1.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "00673095-ABE2-44E9-B032-3C0D9FD4DADC", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "B7034B3A-0E68-46CB-B481-A644CAF26855", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "ABE40AA5-31F1-42E7-9C96-EB0812EA699D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted Profinet packets.", }, { lang: "es", value: "Dispositivos de Siemens SIMATIC S7-1500 CPU PLC con firmware anterior a 1.5.0 permiten a atacantes remotos causar una denegación de servicio (transición de modo defecto) a través de paquetes Profinet manipulados.", }, ], evaluatorComment: "CWE-404: Improper Resource Shutdown or Release", id: "CVE-2014-2253", lastModified: "2024-11-21T02:05:56.380", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-03-16T14:06:45.897", references: [ { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-02-08 16:59
Modified
2024-11-21 02:48
Severity ?
Summary
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service (STOP mode transition) via crafted packets on TCP port 102.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1511-1_pn_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "169E4D54-859B-432E-8181-3FCBF0B87AF8", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1511c-1_pn_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "27D4D516-D0AD-44A4-8E2A-DC749F34DF00", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1511f-1_pn_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "649FE2F6-F518-45A9-9DB5-9AFD6C9BF90D", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1512c-1_pn_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "8C6E4885-5DBC-4580-9D8F-1175672EB981", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1513-1_pn_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "02719AB0-C8A7-483F-8C4D-1C97B0952EE9", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1513f-1_pn_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "125761BB-F793-4BFD-ACAC-F99769D4CF96", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1515-2_pn_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "D7214400-5B44-47DC-8D59-5EF3C832B71F", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1515f-2_pn_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "D0DA5B03-9125-4089-9A8F-4E22F042B6E3", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1516-3_pn\\/dp_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "483088DD-BAF6-48A0-9F65-89F190AAD3EB", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1516f-3_pn\\/dp_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "4CB19389-FB88-411E-8D67-9291AB078E9F", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1517-3_pn\\/dp_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "A3224213-ED91-4CF0-95E7-D8D3B8F1647A", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1517f-3_pn\\/dp_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "77E0EAEA-DC27-4115-875D-48D2A7EF2E46", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1518-4_pn\\/dp_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "0ADDDA90-1BC6-45E1-83EE-E8966A266656", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1518f-4_pn\\/dp_cpu:*:*:*:*:*:*:*:*", matchCriteriaId: "8C923985-A69F-46D3-BCEB-C3A8BDFEFC2B", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E2E064AF-49B2-4BDF-9C76-6911ADF5F603", versionEndIncluding: "1.8.2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service (STOP mode transition) via crafted packets on TCP port 102.", }, { lang: "es", value: "Dispositivos Siemens SIMATIC S7-1500 CPU en versiones anteriores a 1.8.3 permiten a atacantes remotos causar una denegación de servicio (transición al modo STOP) a través de paquetes manipulados sobre el puerto 102 TCP.", }, ], id: "CVE-2016-2200", lastModified: "2024-11-21T02:48:01.647", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-02-08T16:59:03.723", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/83106", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1034954", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/83106", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1034954", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2024-11-21 02:05
Severity ?
Summary
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTPS packets.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_s7-1500_cpu_firmware | * | |
siemens | simatic_s7-1500_cpu_firmware | 1.0.1 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.0 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F9DE401-8833-4BBC-A9F9-6275484C932C", versionEndIncluding: "1.1.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "00673095-ABE2-44E9-B032-3C0D9FD4DADC", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "B7034B3A-0E68-46CB-B481-A644CAF26855", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "ABE40AA5-31F1-42E7-9C96-EB0812EA699D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTPS packets.", }, { lang: "es", value: "Dispositivos de Siemens SIMATIC S7-1500 CPU PLC con firmware anterior a 1.5.0 permiten a atacantes remotos causar una denegación de servicio (transición de modo defecto) a través de paquetes HTTPS manipulados.", }, ], evaluatorComment: "CWE-404: Improper Resource Shutdown or Release", id: "CVE-2014-2259", lastModified: "2024-11-21T02:05:57.230", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-03-16T14:06:45.960", references: [ { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2024-11-21 02:05
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_s7-1500_cpu_firmware | * | |
siemens | simatic_s7-1500_cpu_firmware | 1.0.1 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.0 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F9DE401-8833-4BBC-A9F9-6275484C932C", versionEndIncluding: "1.1.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "00673095-ABE2-44E9-B032-3C0D9FD4DADC", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "B7034B3A-0E68-46CB-B481-A644CAF26855", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "ABE40AA5-31F1-42E7-9C96-EB0812EA699D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", }, { lang: "es", value: "Vulnerabilidad de XSS en el servidor web integrado en dispositivos de Siemens SIMATIC S7-1500 CPU PLC con firmware anterior a 1.5.0 permite a atacantes remotos inyectar script Web o HTML arbitrarios a través de vectores no especificados.", }, ], id: "CVE-2014-2246", lastModified: "2024-11-21T02:05:55.360", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2014-03-16T14:06:45.773", references: [ { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/66201", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/66201", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2024-11-21 02:05
Severity ?
Summary
The integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject headers via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_s7-1500_cpu_firmware | * | |
siemens | simatic_s7-1500_cpu_firmware | 1.0.1 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.0 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F9DE401-8833-4BBC-A9F9-6275484C932C", versionEndIncluding: "1.1.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "00673095-ABE2-44E9-B032-3C0D9FD4DADC", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "B7034B3A-0E68-46CB-B481-A644CAF26855", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "ABE40AA5-31F1-42E7-9C96-EB0812EA699D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject headers via unspecified vectors.", }, { lang: "es", value: "El servidor web integrado en dispositivos Siemens SIMATIC S7-1500 CPU PLC con firmware anterior a 1.5.0 permite a atacantes remotos inyectar cabeceras a través de vectores no especificados.", }, ], evaluatorComment: "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", id: "CVE-2014-2247", lastModified: "2024-11-21T02:05:55.503", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2014-03-16T14:06:45.803", references: [ { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2024-11-21 02:05
Severity ?
Summary
Open redirect vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_s7-1500_cpu_firmware | * | |
siemens | simatic_s7-1500_cpu_firmware | 1.0.1 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.0 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F9DE401-8833-4BBC-A9F9-6275484C932C", versionEndIncluding: "1.1.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "00673095-ABE2-44E9-B032-3C0D9FD4DADC", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "B7034B3A-0E68-46CB-B481-A644CAF26855", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "ABE40AA5-31F1-42E7-9C96-EB0812EA699D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Open redirect vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.", }, { lang: "es", value: "Vulnerabilidad de redirección abierta en el servidor web integrado en dispositivos de Siemens SIMATIC S7-1500 CPU PLC con firmware anterior a 1.5.0 permite a atacantes remotos redirigir usuarios hacia sitios web arbitrarios y realizar ataques de phishing a través de vectores no especificados.\n", }, ], evaluatorComment: "CWE-601: URL Redirection to Untrusted Site (“Open Redirect”)", id: "CVE-2014-2248", lastModified: "2024-11-21T02:05:55.633", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2014-03-16T14:06:45.820", references: [ { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/66190", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/66190", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-04-12 09:15
Modified
2024-11-21 06:52
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.
This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_cfu_diq_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CF0CF4BB-3200-4942-ADA2-120D348E03A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_cfu_diq:-:*:*:*:*:*:*:*", matchCriteriaId: "AF942F59-C13F-40FC-9601-2B4202677CC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_cfu_pa_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A5119182-CB31-466A-AB0F-7956C8B45AE0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_cfu_pa:-:*:*:*:*:*:*:*", matchCriteriaId: "B6C1E4CC-2657-4383-83D8-5C8F88B12755", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-300_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E4872DF2-8C81-45BA-A606-99D0A75464AC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-300_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "602FB384-0DB2-488C-B3CC-96E3A2882976", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-400h_v6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6668A57C-BC46-4008-B174-9E557946ACA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-400h_v6:-:*:*:*:*:*:*:*", matchCriteriaId: "1D082EB6-3C13-40C1-9949-179DC59037C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-400_pn\\/dp_v7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EC44664E-830D-4122-A97A-1AFA61F5BBB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-400_pn\\/dp_v7:-:*:*:*:*:*:*:*", matchCriteriaId: "C48D93F2-FB6B-4D4D-84FB-3A7CDE89B727", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-410_v8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "18E1CA5D-3D7D-49D0-A417-235E2AF6075C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-410_v8:-:*:*:*:*:*:*:*", matchCriteriaId: "926D9DCF-A7EA-416A-9A07-122D1FCA027B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-410_v10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "70A009DD-9D8A-4FF3-B65C-D1AF477D5CB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-410_v10:-:*:*:*:*:*:*:*", matchCriteriaId: "6F240847-0ADC-475C-BDDF-6483A8FF5602", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1ED5EE9B-B05A-4D2A-9FC6-0519E020FFB8", versionEndExcluding: "2.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1500_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "01048F7F-9C5B-47C0-AE16-321FCA670F3D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_tdc_cp51m1_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E2689E6-A204-4744-827E-EEFB11B7C334", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_tdc_cp51m1:-:*:*:*:*:*:*:*", matchCriteriaId: "8DA1E7C4-6352-41A4-8A94-C24DDB456572", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_tdc_cpu555_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2D9C7D4A-F989-4B01-8FFD-5B5859F42D43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_tdc_cpu555:-:*:*:*:*:*:*:*", matchCriteriaId: "AE6AB995-D67B-43E5-B8FF-97C38D20CB10", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_winac_rtx_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2E721F4E-2F84-496D-938D-A27F3E53E543", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_winac_rtx:-:*:*:*:*:*:*:*", matchCriteriaId: "CA5ADAB0-3985-4933-8CDD-D1546D8271CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:siemens:simit_simulation_platform:*:*:*:*:*:*:*:*", matchCriteriaId: "7902D452-4DA8-420E-BD33-5FC112C2F5BE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.\n\nThis could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments.", }, { lang: "es", value: "Se ha identificado una vulnerabilidad en SIMATIC CFU DIQ, SIMATIC CFU PA, SIMATIC ET 200S IM151-8 PN/DP CPU, SIMATIC ET 200S IM151-8F PN/DP CPU, SIMATIC ET 200pro IM154-8 PN/DP CPU, SIMATIC ET 200pro IM154-8F PN/DP CPU, SIMATIC ET 200pro IM154-8FX PN/DP CPU, SIMATIC ET200AL IM157-1 PN, SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. variantes SIPLUS), SIMATIC ET200SP IM155-6 PN HF (incl. variantes SIPLUS), SIMATIC ET200SP IM155-6 PN/2 HF (incl. variantes SIPLUS), SIMATIC ET200SP IM155-6 PN/3 HF (incl. variantes SIPLUS) variantes SIPLUS), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L, SIMATIC ET200ecoPN, DI 16x24VDC, M12-L, SIMATIC ET200ecoPN, DI 8x24VDC, M12-L, SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L, SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L, SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L, Acoplador SIMATIC PN/MF, Acoplador SIMATIC PN/PN, familia de CPUs SIMATIC S7-1500 (incl. CPUs ET200 relacionadas y variantes SIPLUS), SIMATIC S7-300 CPU 314C-2 PN/DP, SIMATIC S7-300 CPU 315-2 PN/DP, SIMATIC S7-300 CPU 315F-2 PN/DP, SIMATIC S7-300 CPU 315T-3 PN/DP, SIMATIC S7-300 CPU 317-2 PN/DP, SIMATIC S7-300 CPU 317F-2 PN/DP, SIMATIC S7-300 CPU 317T-3 PN/DP, SIMATIC S7-300 CPU 317TF-3 PN/DP, SIMATIC S7-300 CPU 319-3 PN/DP, SIMATIC S7-300 CPU 319F-3 PN/DP, familia de CPUs SIMATIC S7-300 (incl. CPUs ET200 relacionadas y variantes SIPLUS), familia de CPUs SIMATIC S7-400 H V6 (incl. variantes SIPLUS), familia de CPUs SIMATIC S7-400 PN/DP V7 (incl. variantes SIPLUS), familia de CPUs SIMATIC S7-410 V10 (incl. variantes SIPLUS), familia de CPUs SIMATIC S7-410 V8 (incl. variantes SIPLUS). variantes SIPLUS), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX, SIMIT Simulation Platform, SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. variantes SIPLUS), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. variantes SIPLUS), SIMATIC S120 (incl. variantes SIPLUS). variantes SIPLUS), SINAMICS S150, SINAMICS S210, SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU, SIPLUS ET 200S IM151-8F PN/DP CPU, SIPLUS HCS4200 CIM4210, SIPLUS HCS4200 CIM4210C, SIPLUS HCS4300 CIM4310, SIPLUS NET PN/PN Coupler, SIPLUS S7-300 CPU 314C-2 PN/DP, SIPLUS S7-300 CPU 315-2 PN/DP, SIPLUS S7-300 CPU 315F-2 PN/DP, SIPLUS S7-300 CPU 317-2 PN/DP, SIPLUS S7-300 CPU 317F-2 PN/DP. La pila PROFINET (PNIO), cuando se integra con la pila IP de Interniche, maneja incorrectamente los recursos internos para los segmentos TCP en los que la longitud mínima del TCP-Header es inferior a la definida. Esto podría permitir a un atacante crear una condición de denegación de servicio para los servicios TCP en los dispositivos afectados mediante el envío de segmentos TCP especialmente diseñados", }, ], id: "CVE-2022-25622", lastModified: "2024-11-21T06:52:27.700", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "productcert@siemens.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-04-12T09:15:14.483", references: [ { source: "productcert@siemens.com", url: "https://cert-portal.siemens.com/productcert/html/ssa-446448.html", }, { source: "productcert@siemens.com", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-446448.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/html/ssa-446448.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-446448.pdf", }, ], sourceIdentifier: "productcert@siemens.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "productcert@siemens.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2024-11-21 02:05
Severity ?
Summary
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTP packets.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_s7-1500_cpu_firmware | * | |
siemens | simatic_s7-1500_cpu_firmware | 1.0.1 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.0 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F9DE401-8833-4BBC-A9F9-6275484C932C", versionEndIncluding: "1.1.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "00673095-ABE2-44E9-B032-3C0D9FD4DADC", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "B7034B3A-0E68-46CB-B481-A644CAF26855", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "ABE40AA5-31F1-42E7-9C96-EB0812EA699D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTP packets.", }, { lang: "es", value: "Dispositivos de Siemens SIMATIC S7-1500 CPU PLC con firmware anterior a 1.5.0 permiten a atacantes remotos causar una denegación de servicio (transición de modo defecto) a través de paquetes HTTP manipulados.", }, ], evaluatorComment: "CWE-404: Improper Resource Shutdown or Release", id: "CVE-2014-2255", lastModified: "2024-11-21T02:05:56.660", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-03-16T14:06:45.913", references: [ { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2024-11-21 02:05
Severity ?
Summary
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted ISO-TSAP packets.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_s7-1500_cpu_firmware | * | |
siemens | simatic_s7-1500_cpu_firmware | 1.0.1 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.0 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F9DE401-8833-4BBC-A9F9-6275484C932C", versionEndIncluding: "1.1.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "00673095-ABE2-44E9-B032-3C0D9FD4DADC", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "B7034B3A-0E68-46CB-B481-A644CAF26855", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "ABE40AA5-31F1-42E7-9C96-EB0812EA699D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted ISO-TSAP packets.", }, { lang: "es", value: "Dispositivos de Siemens SIMATIC S7-1500 CPU PLC con firmware anterior a 1.5.0 permiten a atacantes remotos causar una denegación de servicio (transición de modo defecto) a través de paquetes ISO-TSAP manipulados.", }, ], evaluatorComment: "CWE-404: Improper Resource Shutdown or Release", id: "CVE-2014-2257", lastModified: "2024-11-21T02:05:56.947", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-03-16T14:06:45.943", references: [ { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2016-02-08 16:59
Modified
2024-11-21 02:48
Severity ?
Summary
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.8.2:*:*:*:*:*:*:*", matchCriteriaId: "6AE7D26A-B1CA-4059-820C-E2C13662AAEB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1511-1_pn_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "668B8FDF-4D50-4E54-88CE-D9A2C483D460", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1511c-1_pn_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "223C911C-B69D-41B9-A461-C6153A255324", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1511f-1_pn_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "43828956-FDB0-4DB2-ACAA-6D94F314C070", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1512c-1_pn_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "7966ED38-7F26-44BF-93FF-5D999C510D19", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1513-1_pn_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "6F18327E-6C57-42F0-983C-F88F70C9FB6C", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1513f-1_pn_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "7E943853-055C-45E3-9BD0-E8DE2D9C339B", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1515-2_pn_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "A074A6C0-6D87-40C3-9031-E8582797A299", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1515f-2_pn_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "D13388C5-D329-46E2-8FE6-E45DB604C112", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1516-3_pn\\/dp_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "E3C8B2D4-9BC2-424E-ABE3-2095CE414255", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1516f-3_pn\\/dp_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "84C4C6FB-5D77-4A8B-9ABA-321353F6D1E2", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1517-3_pn\\/dp_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "A6DA5627-663C-48F9-B76D-BD53D43ACDFA", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1517f-3_pn\\/dp_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "55AE4959-EE30-4FE1-8FCC-3F7710C80C3F", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1518-4_pn\\/dp_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "59EFE215-70A4-4A85-AA84-360FED0B6D89", vulnerable: false, }, { criteria: "cpe:2.3:h:siemens:simatic_s7-1518f-4_pn\\/dp_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "9BE49E75-DC54-4AD5-923C-12F6603B9793", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.", }, { lang: "es", value: "Dispositivos Siemens SIMATIC S7-1500 CPU en versiones anteriores a 1.8.3 permiten a atacantes remotos eludir el mecanismo de protección de repetición a través de paquetes manipulados sobre el puerto 102 TCP.", }, ], id: "CVE-2016-2201", lastModified: "2024-11-21T02:48:01.833", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-02-08T16:59:07.130", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/83110", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1034954", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/83110", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1034954", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2024-11-21 02:05
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 and SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_s7-1500_cpu_firmware | * | |
siemens | simatic_s7-1500_cpu_firmware | 1.0.1 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.0 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F9DE401-8833-4BBC-A9F9-6275484C932C", versionEndIncluding: "1.1.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "00673095-ABE2-44E9-B032-3C0D9FD4DADC", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "B7034B3A-0E68-46CB-B481-A644CAF26855", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "ABE40AA5-31F1-42E7-9C96-EB0812EA699D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross-site request forgery (CSRF) vulnerability on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 and SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.", }, { lang: "es", value: "Una vulnerabilidad de tipo cross-site request forgery (CSRF) en dispositivos SIMATIC S7-1500 CPU PLC de Siemens con versión de firmware anterior a 1.5.0 y dispositivos SIMATIC S7-1200 CPU PLC con versión de firmware anterior a 4.0 de Siemens, permite a atacantes remotos secuestrar la autenticación de víctimas no especificadas por medio de vectores desconocidos.", }, ], id: "CVE-2014-2249", lastModified: "2024-11-21T02:05:55.780", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2014-03-16T14:06:45.850", references: [ { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-079-02", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "cve@mitre.org", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-654382.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-079-02", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-654382.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-10 14:15
Modified
2024-11-21 04:20
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Affected devices improperly handle large amounts of specially crafted UDP packets.
This could allow an unauthenticated remote attacker to trigger a denial of service condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:dk_standard_ethernet_controller_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E19343EA-5ECA-4263-A568-DAEA04425F86", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:dk_standard_ethernet_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "53DF35F1-94FF-4D0B-9FA2-E8B0AFAEA5FF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:ek-ertec_200_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "70D5CDF4-A134-402E-A4E9-4BBA19082397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:ek-ertec_200:-:*:*:*:*:*:*:*", matchCriteriaId: "B47CF3BB-08E4-4B86-B793-8253C172D846", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:ek-ertec_200p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2773F4B7-095E-4A33-93F2-765FA58B828C", versionEndExcluding: "4.6", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:ek-ertec_200p_firmware:4.6:-:*:*:*:*:*:*", matchCriteriaId: "9E7753EE-DF23-4838-B3B4-7C43C550519C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:ek-ertec_200p:-:*:*:*:*:*:*:*", matchCriteriaId: "FB75CD44-5223-40A7-A835-111BF3C25D23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_cfu_pa_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ABA8C0E5-E6AA-4BF2-925F-0041C382A416", versionEndExcluding: "1.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_cfu_pa:-:*:*:*:*:*:*:*", matchCriteriaId: "B6C1E4CC-2657-4383-83D8-5C8F88B12755", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200al_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "24E01824-4942-4400-A8C2-43A5772C2968", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200al:-:*:*:*:*:*:*:*", matchCriteriaId: "34C17B00-34B5-4A15-9333-252BE2975F37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "14E56570-5C20-40BD-BF0B-F6ED06AFC8F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200m:-:*:*:*:*:*:*:*", matchCriteriaId: "7037E46B-4FE5-4693-B6A6-B5AF7B652C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200mp_im_155-5_pn_ba_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B4458E08-9864-452E-B95E-A46C5600D488", versionEndExcluding: "4.3.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200mp_im_155-5_pn_ba:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF349D2-2560-4C60-8729-4B6CCDC52347", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200mp_im_155-5_pn_hf_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "00743200-D240-4CBC-8652-555F5E89B042", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200mp_im_155-5_pn_hf:-:*:*:*:*:*:*:*", matchCriteriaId: "AB9BFB03-D366-4F23-9477-D6133BD021CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200mp_im_155-5_pn_st_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ACDF9AF3-DDB9-41A8-90C5-2A95A51D5EDE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200mp_im_155-5_pn_st:-:*:*:*:*:*:*:*", matchCriteriaId: "4B48C0A4-072A-4744-94A5-FC4741F4A029", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BB063929-AAB0-4FF8-BCA3-71BA80517B1A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200s:-:*:*:*:*:*:*:*", matchCriteriaId: "A1EC40E7-F004-446C-B5C9-0AB9911105E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200sp_im_155-6_pn_ba_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8A1327FC-E785-4AA7-BC73-CC61CEED832D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200sp_im_155-6_pn_ba:-:*:*:*:*:*:*:*", matchCriteriaId: "4C0300D2-1A87-4F61-9444-C1D23E3E6033", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200sp_im_155-6_pn_ha_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "17B7ED41-6AC7-4D34-A94E-61AECFA088EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200sp_im_155-6_pn_ha:-:*:*:*:*:*:*:*", matchCriteriaId: "34131306-1591-42B3-B235-4265F918CBDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200sp_im_155-6_pn_hf_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67DAE64A-6E78-452E-9812-242769378ED8", versionEndExcluding: "4.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200sp_im_155-6_pn_hf:-:*:*:*:*:*:*:*", matchCriteriaId: "527AE806-5C00-4C44-940F-88032AD8120D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200sp_im_155-6_pn_hs_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AAAA8667-C792-45E4-AE5E-C194B5B76366", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200sp_im_155-6_pn_hs:-:*:*:*:*:*:*:*", matchCriteriaId: "455EC7E5-236B-43E6-86E7-702FAFCCCB15", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200sp_im_155-6_pn_st_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "918CBE10-D912-446B-B8B3-843B0089CB7A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200sp_im_155-6_pn_st:-:*:*:*:*:*:*:*", matchCriteriaId: "1DB6FAE7-8598-4673-83A9-7A838BB207C5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200sp_im_155-6_pn\\/2_hf_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6269D1CC-FF57-409F-8284-C95FF4DCEF25", versionEndExcluding: "4.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200sp_im_155-6_pn\\/2_hf:-:*:*:*:*:*:*:*", matchCriteriaId: "2CBAACFE-CD21-4FAC-9262-1A7F325D6E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200sp_im_155-6_pn\\/3_hf_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3FA7253F-17B9-411B-B4C9-FE51DF0DE44D", versionEndExcluding: "4.2.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200sp_im_155-6_pn\\/3_hf:-:*:*:*:*:*:*:*", matchCriteriaId: "DCCAFEF7-CA0C-4F20-B98E-DBB8365F1CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200ecopn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3EE0B998-E408-408F-8F78-5E90F74E9C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200ecopn:-:*:*:*:*:*:*:*", matchCriteriaId: "0259EAE9-0CA0-49A5-A573-8339604A181B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_et_200pro_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D054139B-BE36-4B34-88AE-BC487DCB1DCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_et_200pro:-:*:*:*:*:*:*:*", matchCriteriaId: "3F0CE2EC-9A73-4576-A389-A19893D47B0F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\\"_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5F14E991-8DF6-4221-A9BF-E13EEF211220", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_7\\\":-:*:*:*:*:*:*:*", matchCriteriaId: "B531FDD4-2796-4FE9-9F94-E9D461C7C528", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\\"_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE84D161-BA23-422A-8959-CF047834A631", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_15\\\":-:*:*:*:*:*:*:*", matchCriteriaId: "39DA22F7-E4B6-4A1E-9CCB-651EBEFD691D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\\"_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E6230347-9AAE-424F-A46F-4A714BA0823D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_panels_4\\\":-:*:*:*:*:*:*:*", matchCriteriaId: "D63658BB-2364-4DE5-904B-2367B70294AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\\"_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4A1A44BC-15CC-4CC1-A9D0-4B04233B80CE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_hmi_comfort_panels_22\\\":-:*:*:*:*:*:*:*", matchCriteriaId: "DFDC8157-7EA3-4BC4-82C1-06A307996F45", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "54EFA8B5-8DA1-4547-9E15-BDC265C56006", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels:-:*:*:*:*:*:*:*", matchCriteriaId: "B1CEB200-E38F-4629-9279-5AF065396678", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_pn\\/pn_coupler_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "87B14F05-4D54-420F-8393-4AB27EF6A7D1", versionEndExcluding: "4.2.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_pn\\/pn_coupler:-:*:*:*:*:*:*:*", matchCriteriaId: "49FB85F8-7D45-433E-805B-360725F2980C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_profinet_driver_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05248152-94EB-4978-98A7-B1A393CA1F03", versionEndExcluding: "2.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_profinet_driver:-:*:*:*:*:*:*:*", matchCriteriaId: "526493E9-EF74-4836-9A8F-134B625035AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1200_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2BA63AED-84E4-4F92-A4D4-0713E7F65C4A", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1200_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "F2B63726-10CE-46AB-ADBA-A511E770E162", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1211c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4D81B519-6FE9-405C-8BB1-57D14AF531E5", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1211c:-:*:*:*:*:*:*:*", matchCriteriaId: "3871C0C9-C65E-4E0B-9CA8-75E60066297F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "84E0444D-01E0-4F7A-81A0-314C0F7FA623", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212c:-:*:*:*:*:*:*:*", matchCriteriaId: "07849777-92E7-41D2-9128-F8D20DE15391", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B980BB8C-9AFE-45E4-A4D4-AB555B234059", versionEndExcluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214c:-:*:*:*:*:*:*:*", matchCriteriaId: "FE17584A-BF7A-48B8-A9CB-477663766C63", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BD6FB801-AE4C-4EDF-96CC-33A4CD51165A", versionEndExcluding: "2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1500_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "01048F7F-9C5B-47C0-AE16-321FCA670F3D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500s_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D5DE5B3D-13B1-4684-8859-C3FB34FE50CF", versionEndExcluding: "2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1500s_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "B82EADBC-AECE-45B4-AF95-6F0D84966E67", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500t_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EF5E4914-A5EA-451C-9FAF-751B74B8BC69", versionEndExcluding: "2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1500t_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "4BE2F683-2A24-4152-9A07-00B0117C5F12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7B6777DC-80B5-4B36-B9AA-DA764C8016F7", versionEndExcluding: "2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518:-:*:*:*:*:*:*:*", matchCriteriaId: "BE0BA68C-EB57-49CE-94A8-E7905AB79824", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1511c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "55490E3D-616D-4D21-BAC2-29A51CB067E9", versionEndExcluding: "2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1511c:-:*:*:*:*:*:*:*", matchCriteriaId: "822894D4-96D5-4BDC-A698-D31262BCF422", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_1512c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "45303F50-046B-4621-AC6D-2B6E17D948C3", versionEndExcluding: "2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-1500_cpu_1512c:-:*:*:*:*:*:*:*", matchCriteriaId: "D2E24A4C-AC13-4382-BDF6-E13878FED4DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-300_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C87674A8-B518-4910-B03D-FFF4D5A7B627", versionEndExcluding: "3.3.17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-300_cpu:-:*:*:*:*:*:*:*", matchCriteriaId: "602FB384-0DB2-488C-B3CC-96E3A2882976", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-300_cpu_312_ifm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7B0C6327-7BF6-4B96-82A8-D750007869EE", versionEndExcluding: "3.3.17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-300_cpu_312_ifm:-:*:*:*:*:*:*:*", matchCriteriaId: "CCFCAA2B-71FE-4DB4-B8B0-F5FD1254C331", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-300_cpu_313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3EF9F3FB-FBBA-42A8-9A90-FE34703274B5", versionEndExcluding: "3.3.17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-300_cpu_313:-:*:*:*:*:*:*:*", matchCriteriaId: "4E6E900F-63C1-4E50-9DCD-26CE760E5275", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-300_cpu_314_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8F2F0659-CD37-4AA9-B7D5-44639515533C", versionEndExcluding: "3.3.17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-300_cpu_314:-:*:*:*:*:*:*:*", matchCriteriaId: "78399465-EED5-4EBD-A2E1-6FE0BD01EDB4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-300_cpu_314_ifm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "07AD63B6-B05C-4BBF-812D-379C4D8F8CC7", versionEndExcluding: "3.3.17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-300_cpu_314_ifm:-:*:*:*:*:*:*:*", matchCriteriaId: "8BE7963C-7AFF-495B-9F0B-28FB393443FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-300_cpu_315_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F2A0C75-E360-4E3D-85DA-878E39054E26", versionEndExcluding: "3.3.17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-300_cpu_315:-:*:*:*:*:*:*:*", matchCriteriaId: "E3962681-E32E-4BD1-8C71-8768248691D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-300_cpu_315-2_dp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "488F0774-43DA-455D-905C-C514A0192260", versionEndExcluding: "3.3.17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-300_cpu_315-2_dp:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FD8E6D-0527-4215-B6F0-5824011433FB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-300_cpu_316-2_dp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F103C351-99C9-4F7D-B69A-D8A876F57504", versionEndExcluding: "3.3.17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-300_cpu_316-2_dp:-:*:*:*:*:*:*:*", matchCriteriaId: "644AD6A8-AEDE-4F1C-92F8-836877A81310", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-300_cpu_318-2_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BA99549B-5E95-445A-A95B-1CDA7014686B", versionEndExcluding: "3.3.17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-300_cpu_318-2:-:*:*:*:*:*:*:*", matchCriteriaId: "FF58C652-E74D-4B57-A7C5-08D7446863D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-400_pn_v7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1B6B9D8B-D7BA-4D72-97C7-7BBEB49802F7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-400_pn_v7:-:*:*:*:*:*:*:*", matchCriteriaId: "E4F8215E-E737-4CD5-B7D9-57FE4A2A2FE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-400_dp_v7_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "72F7B870-35A1-4900-8104-1303F291E29A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-400_dp_v7:-:*:*:*:*:*:*:*", matchCriteriaId: "ABE9F7D2-22C7-4E7C-99C3-4A88CDD2CDB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-400_v6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A4C79A5-96BB-4ADB-B28A-C9C48B195F49", versionEndExcluding: "6.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-400_v6:-:*:*:*:*:*:*:*", matchCriteriaId: "A6445275-2AEF-4285-BE7A-67F20182481C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-400h_v6_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EE93A33C-7007-4908-868A-4FBE4D073E57", versionEndExcluding: "6.0.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-400h_v6:-:*:*:*:*:*:*:*", matchCriteriaId: "1D082EB6-3C13-40C1-9949-179DC59037C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-410_v8_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "63EA1886-A72E-48A7-B99F-C236BF6992FA", versionEndExcluding: "8.2.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_s7-410_v8:-:*:*:*:*:*:*:*", matchCriteriaId: "926D9DCF-A7EA-416A-9A07-122D1FCA027B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9D03BD73-51ED-42E0-A552-C32BB7A935B2", versionEndExcluding: "2010", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_firmware:2010:-:*:*:*:*:*:*", matchCriteriaId: "7151A19C-0AE5-4F66-9E3D-8BF675A8430C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*", matchCriteriaId: "E6034789-ABD1-4035-8378-F0BA7157B087", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_dcm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "84B1F9B1-4248-4A4C-A8BB-77475A0E9B9B", versionEndExcluding: "1.5", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:sinamics_dcm_firmware:1.5:-:*:*:*:*:*:*", matchCriteriaId: "F2F99FFB-C312-4080-9580-84AFB7C9FA09", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_dcm:-:*:*:*:*:*:*:*", matchCriteriaId: "A1A43D34-ECA3-4330-B85F-02BDD1D22149", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_dcp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83803F1C-4842-43BB-B903-C2E91FF7DC08", versionEndExcluding: "1.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_dcp:-:*:*:*:*:*:*:*", matchCriteriaId: "B75F50CA-7371-4BC7-8D8A-13F8BC69E4EB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_g110m_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "775C90BB-C026-435C-889A-517EF85656C5", versionEndExcluding: "4.7", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:sinamics_g110m_firmware:4.7:-:*:*:*:*:*:*", matchCriteriaId: "CAA92AC6-7DA0-418D-A13F-69268DFD7966", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_g110m:-:*:*:*:*:*:*:*", matchCriteriaId: "D61D3E9C-1346-4354-BCD9-B02F67500C41", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_g120_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1DBCA1A-27F3-4E9A-9F89-65E82A68DE4A", versionEndExcluding: "4.7", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:sinamics_g120_firmware:4.7:-:*:*:*:*:*:*", matchCriteriaId: "94CB2F3E-AAA1-4472-BFD4-4E6E1B663FF5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_g120:-:*:*:*:*:*:*:*", matchCriteriaId: "61A60DCE-384B-43A4-A669-973FB8ECA932", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_g130_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "856768D2-C096-4CA7-B26F-E94B005C0D79", versionEndExcluding: "5.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:sinamics_g130_firmware:5.2:-:*:*:*:*:*:*", matchCriteriaId: "AD0515D7-829B-4591-95D9-94C3982FD727", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_g130:-:*:*:*:*:*:*:*", matchCriteriaId: "373DBE44-AC28-4D04-93BB-35CD8C60E899", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_g150_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C579C2C7-0402-46B2-A770-C3B7F71D1096", versionEndExcluding: "5.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:sinamics_g150_firmware:5.2:-:*:*:*:*:*:*", matchCriteriaId: "255A153A-A6A0-46A4-A7CF-01D0D09761C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_g150:-:*:*:*:*:*:*:*", matchCriteriaId: "2296CA65-0E89-4BCB-8003-E7212BF1F585", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_gl150_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3653DA37-DB23-41E0-8CE8-838E384AA40A", versionEndExcluding: "4.8", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:sinamics_gl150_firmware:4.8:-:*:*:*:*:*:*", matchCriteriaId: "0F86A334-10F9-4DFB-A421-CBCAFD86C8C2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_gl150:-:*:*:*:*:*:*:*", matchCriteriaId: "DED7F33B-D475-4232-8683-48554A6729F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_gm150_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0E25804D-D943-4C2A-9C78-AAC61F7BA4FF", versionEndExcluding: "4.8", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:sinamics_gm150_firmware:4.8:-:*:*:*:*:*:*", matchCriteriaId: "06B69CD4-3AEC-4014-81DB-33805A44A5D3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_gm150:-:*:*:*:*:*:*:*", matchCriteriaId: "DD76CFB0-B5D7-40DC-8D14-FC9C9BACF3CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_s110_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "243FFEA3-7193-45EA-B865-E9CA1D6656FE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_s110:-:*:*:*:*:*:*:*", matchCriteriaId: "6218802E-D3B1-4197-A6B5-7343A50F7D88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_s120_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "03F9CBC3-B2B3-4FA7-963D-A8F3AE6D8EA0", versionEndExcluding: "5.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:sinamics_s120_firmware:5.2:-:*:*:*:*:*:*", matchCriteriaId: "6622AE2E-81B0-419C-8C37-A7C56FB92745", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_s120:-:*:*:*:*:*:*:*", matchCriteriaId: "E5A824BD-935F-4E53-8313-C5544B0489C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_s150_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6BF989EE-CD8D-450D-90F6-FD15F00B59B9", versionEndExcluding: "5.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:sinamics_s150_firmware:5.2:-:*:*:*:*:*:*", matchCriteriaId: "EFFDE2CB-684D-4ECE-A104-F355254A46B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_s150:-:*:*:*:*:*:*:*", matchCriteriaId: "0D48682C-A39D-4A09-B904-50FA64A9D2A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_sl150_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30E52510-9306-42B8-A517-A6BBD34B8B9D", versionEndExcluding: "4.7", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:sinamics_sl150_firmware:4.7:-:*:*:*:*:*:*", matchCriteriaId: "58A71910-E54F-426B-BAB1-260AEFD8EF6E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_sl150:-:*:*:*:*:*:*:*", matchCriteriaId: "C6619B0F-7CDC-40A6-89B2-C6067AF45214", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:sinamics_sm120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28DB0BC6-E60A-4798-80DC-125EF25B3A40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:sinamics_sm120:-:*:*:*:*:*:*:*", matchCriteriaId: "444DD77F-DB65-4766-A89D-7A679B4CA1E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:siemens:sinumerik_828d:*:*:*:*:*:*:*:*", matchCriteriaId: "328F0192-B34D-481C-8964-226317439966", versionEndExcluding: "4.8", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:sinumerik_828d:4.8:-:*:*:*:*:*:*", matchCriteriaId: "C7936CF6-DC07-4550-9FEC-823A2F49096D", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:sinumerik_828d:4.8:sp1:*:*:*:*:*:*", matchCriteriaId: "BEE7D914-F2DE-4D8C-BFB2-7AD16650CD3F", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:sinumerik_828d:4.8:sp2:*:*:*:*:*:*", matchCriteriaId: "BDBAEDBC-6A76-495D-9BC7-BA687F32EE40", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:sinumerik_828d:4.8:sp3:*:*:*:*:*:*", matchCriteriaId: "45EF769B-1EB1-4D2D-84C5-8005EF1EE1EF", vulnerable: true, }, { criteria: "cpe:2.3:a:siemens:sinumerik_828d:4.8:sp4:*:*:*:*:*:*", matchCriteriaId: "48EE5859-5450-4078-94E7-E525B999A837", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:siemens:sinumerik_840d_sl:*:*:*:*:*:*:*:*", matchCriteriaId: "9FFC86D6-F312-4097-91A6-79C78502323F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Affected devices improperly handle large amounts of specially crafted UDP packets.\r\n\r\nThis could allow an unauthenticated remote attacker to trigger a denial of service condition.", }, { lang: "es", value: "Se ha identificado una vulnerabilidad en Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Kits de desarrollo/evaluación para PROFINET IO: EK-ERTEC 200P, SIMATIC CFU PA, SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. variantes SIPLUS), SIMATIC ET200AL, SIMATIC ET200M (incl. variantes SIPLUS), SIMATIC ET200MP IM155-5 PN BA (incl. variantes SIPLUS), SIMATIC ET200MP IM155-5 PN HF (incl. variantes SIPLUS), SIMATIC ET200MP IM155-5 PN ST (incl. variantes SIPLUS) SIPLUS), SIMATIC ET200S (incl. variantes SIPLUS), SIMATIC ET200SP IM155-6 PN BA (incl. variantes SIPLUS), SIMATIC ET200SP IM155-6 PN HA (incl. variantes SIPLUS), SIMATIC ET200SP IM155-6 PN HF (incl. variantes SIPLUS), SIMATIC ET200SP IM155-6 PN HS (incl. variantes SIPLUS), SIMATIC ET200SP IM155-6 PN ST (incl. variantes SIPLUS). SIPLUS), SIMATIC ET200SP IM155-6 PN/2 HF (incl. variantes SIPLUS), SIMATIC ET200SP IM155-6 PN/3 HF (incl. variantes SIPLUS) variantes SIPLUS), SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 4AO U/I 4xM12, SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12, SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12, SIMATIC ET200ecoPN, 8AI 4 U/I; 4 RTD/TC 8xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN: IO-Link Master, SIMATIC ET200pro, paneles exteriores SIMATIC HMI Comfort de 7\" y 15\" (incl. variantes SIPLUS), paneles SIMATIC HMI Comfort de 4\" a 22\" (incl. variantes SIPLUS), paneles móviles SIMATIC HMI KTP, acoplador SIMATIC PN/PN (incl. variantes SIPLUS NET), driver SIMATIC PROFINET, familia de CPUs SIMATIC S7-1200 (incl. variantes SIPLUS), familia de CPUs SIMATIC S7-1500 (incl. variantes SIPLUS). CPUs ET200 y variantes SIPLUS), SIMATIC S7-1500 Software Controller, familia de CPUs SIMATIC S7-300 (incl. CPUs ET200 y variantes SIPLUS), familia de CPUs SIMATIC S7-400 H V6 (incl. variantes SIPLUS), familia de CPUs SIMATIC S7-400 PN/DP V6 e inferiores (incl. variantes SIPLUS), familia de CPUs SIMATIC S7-400 PN/DP V7 (incl. variantes SIPLUS), SIMATIC S7-400 PN/DP V7 (incl. variantes SIPLUS). SIPLUS), familia de CPU SIMATIC S7-410 V8 (incl. variantes SIPLUS), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX (F) 2010, SINAMICS DCM, SINAMICS DCP, SINAMICS G110M V4. 7 PN Control Unit, SINAMICS G120 V4.7 PN Control Unit (incl. variantes SIPLUS), SINAMICS G130 V4.7 Control Unit, SINAMICS G150 Control Unit, SINAMICS GH150 V4. 7, SINAMICS GL150 V4.7, SINAMICS GM150 V4.7, SINAMICS S110, SINAMICS S120 V4.7 (incluidas las variantes SIPLUS), SINAMICS S150, SINAMICS SL150 V4.7, SINAMICS SM120 V4.7, SINUMERIK 828D, SINUMERIK 840D sl. Los dispositivos afectados contienen una vulnerabilidad que permite a un atacante no autenticado desencadenar una condición de denegación de servicio. La vulnerabilidad puede activarse si se envía al dispositivo una gran cantidad de paquetes UDP especialmente diseñados. La vulnerabilidad de seguridad podría ser explotada por un atacante con acceso a la red de los sistemas afectados. La explotación exitosa no requiere privilegios del sistema ni interacción del usuario. Un atacante podría utilizar la vulnerabilidad para comprometer la disponibilidad del dispositivo. En el momento de la publicación del aviso no se conocía ninguna explotación pública de esta vulnerabilidad de seguridad", }, ], id: "CVE-2019-10936", lastModified: "2024-11-21T04:20:11.257", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "productcert@siemens.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Secondary", }, ], }, published: "2019-10-10T14:15:14.707", references: [ { source: "productcert@siemens.com", url: "https://cert-portal.siemens.com/productcert/html/ssa-473245.html", }, { source: "productcert@siemens.com", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-473245.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/html/ssa-473245.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-473245.pdf", }, ], sourceIdentifier: "productcert@siemens.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "productcert@siemens.com", type: "Primary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2014-03-16 14:06
Modified
2024-11-21 02:05
Severity ?
Summary
The random-number generator on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
siemens | simatic_s7-1500_cpu_firmware | * | |
siemens | simatic_s7-1500_cpu_firmware | 1.0.1 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.0 | |
siemens | simatic_s7-1500_cpu_firmware | 1.1.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1F9DE401-8833-4BBC-A9F9-6275484C932C", versionEndIncluding: "1.1.2", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "00673095-ABE2-44E9-B032-3C0D9FD4DADC", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "B7034B3A-0E68-46CB-B481-A644CAF26855", vulnerable: true, }, { criteria: "cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "ABE40AA5-31F1-42E7-9C96-EB0812EA699D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The random-number generator on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors.", }, { lang: "es", value: "El generador de números aleatorios en dispositivos de Siemens SIMATIC S7-1500 CPU PLC con firmware anterior a 1.5.0 no tiene suficiente entropía, lo que facilita a atacantes remotos derrotar mecanismos de protección criptográficos y secuestrar sesiones a través de vectores no especificados.", }, ], evaluatorComment: "CWE-331: Insufficient Entropy", id: "CVE-2014-2251", lastModified: "2024-11-21T02:05:56.067", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 8.3, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 8.5, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-03-16T14:06:45.867", references: [ { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "cve@mitre.org", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2016-2201
Vulnerability from cvelistv5
Published
2016-02-08 16:00
Modified
2024-08-05 23:24
Severity ?
EPSS score ?
Summary
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1034954 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/83110 | vdb-entry, x_refsource_BID | |
https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:24:48.225Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", }, { name: "1034954", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034954", }, { name: "83110", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/83110", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-02-08T00:00:00", descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:49", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", }, { name: "1034954", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034954", }, { name: "83110", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/83110", }, { tags: [ "x_refsource_MISC", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-2201", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", }, { name: "1034954", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034954", }, { name: "83110", refsource: "BID", url: "http://www.securityfocus.com/bid/83110", }, { name: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", refsource: "MISC", url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-2201", datePublished: "2016-02-08T16:00:00", dateReserved: "2016-02-02T00:00:00", dateUpdated: "2024-08-05T23:24:48.225Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-10936
Vulnerability from cvelistv5
Published
2019-10-10 00:00
Modified
2024-08-04 22:40
Severity ?
EPSS score ?
Summary
Affected devices improperly handle large amounts of specially crafted UDP packets.
This could allow an unauthenticated remote attacker to trigger a denial of service condition.
References
Impacted products
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:o:siemens:dk_standard_ethernet_controller_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "dk_standard_ethernet_controller_firmware", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:ek-ertec_200_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ek-ertec_200_firmware", vendor: "siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:ek-ertec_200p_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "ek-ertec_200p_firmware", vendor: "siemens", versions: [ { lessThan: "4.6", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:simatic_cfu_pa:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_cfu_pa", vendor: "siemens", versions: [ { lessThan: "v1.2.0", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_et200ecopn_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_et200ecopn_firmware", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_et200s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_et200s_firmware", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_et_200al_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_et_200al_firmware", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_et_200m_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_et_200m_firmware", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_et_200mp_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_et_200mp_firmware", vendor: "siemens", versions: [ { lessThan: "v4.3.0", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_et_200pro_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_et_200pro_firmware", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_et_200s_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_et_200s_firmware", vendor: "siemens", versions: [ { lessThan: "v3.2.17", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_et_200sp_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_et_200sp_firmware", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_hmi_comfort_outdoor_panels", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:simatic_pn\\/pn_coupler_6es7158-3ad01-0xa0:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_pn\\/pn_coupler_6es7158-3ad01-0xa0", vendor: "siemens", versions: [ { lessThan: "v4.2.1", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:simatic_profinet_driver:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_profinet_driver", vendor: "siemens", versions: [ { lessThan: "v2.1", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_s7-300_cpu_314_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-300_cpu_314_firmware", vendor: "siemens", versions: [ { lessThan: "v3.2.17", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_s7-300_cpu_315-2_dp_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-300_cpu_315-2_dp_firmware", vendor: "siemens", versions: [ { lessThan: "v3.2.17", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_s7-300_cpu_315f-2_dp_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-300_cpu_315f-2_dp_firmware", vendor: "siemens", versions: [ { lessThan: "v3.2.17", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_s7-300_cpu_317-2_dp_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-300_cpu_317-2_dp_firmware", vendor: "siemens", versions: [ { lessThan: "v3.2.17", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_s7-300_cpu_317-2_pn\\/dp_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-300_cpu_317-2_pn\\/dp_firmware", vendor: "siemens", versions: [ { lessThan: "v3.2.17", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_s7-300_cpu_319-3_pn\\/dp_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-300_cpu_319-3_pn\\/dp_firmware", vendor: "siemens", versions: [ { lessThan: "v3.2.17", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:simatic_s7-400_cpu_412-2_pn:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-400_cpu_412-2_pn", vendor: "siemens", versions: [ { lessThan: "v7.0.3", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:simatic_s7-400_cpu_414-3_pn\\/dp:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-400_cpu_414-3_pn\\/dp", vendor: "siemens", versions: [ { lessThan: "v7.0.3", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:simatic_s7-400_cpu_416-3_pn\\/dp:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-400_cpu_416-3_pn\\/dp", vendor: "siemens", versions: [ { lessThanOrEqual: "v7.0.3", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_s7-400_h_v6_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-400_h_v6_firmware", vendor: "siemens", versions: [ { lessThanOrEqual: "v6.0.9", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_s7-400_pn\\/dp_v6_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-400_pn\\/dp_v6_firmware", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_s7-410_cpu_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-410_cpu_firmware", vendor: "siemens", versions: [ { lessThan: "v8.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:simatic_s7-1200_cpu:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-1200_cpu", vendor: "siemens", versions: [ { lessThan: "v4.4.0", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:simatic_s7-1500_cpu:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-1500_cpu", vendor: "siemens", versions: [ { lessThan: "v2.0", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:simatic_s7-1500_controller:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_s7-1500_controller", vendor: "siemens", versions: [ { lessThan: "v2.0", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_tdc_cp51m1_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_tdc_cp51m1_firmware", vendor: "siemens", versions: [ { lessThan: "v1.1.8", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:o:siemens:simatic_tdc_cpu555_firmware:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_tdc_cpu555_firmware", vendor: "siemens", versions: [ { lessThan: "v1.1.1", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:a:siemens:simatic_winac_rtx_2010:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_winac_rtx_2010", vendor: "siemens", versions: [ { lessThan: "v2010_sp3", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "simatic_winac_rtx_\\(f\\)_2010", vendor: "siemens", versions: [ { lessThan: "v2010_sp3", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_dcm:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_dcm", vendor: "siemens", versions: [ { lessThan: "v1.5_hf1", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_dcp:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_dcp", vendor: "siemens", versions: [ { lessThan: "v1.3", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_g110m:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_g110m", vendor: "siemens", versions: [ { lessThan: "v4.7_sp10_hf5", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_g120:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_g120", vendor: "siemens", versions: [ { lessThan: "v4.7_sp10_hf5", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_g130:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_g130", vendor: "siemens", versions: [ { lessThan: "v4.8", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_g150:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_g150", vendor: "siemens", versions: [ { lessThan: "v4.8", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_gh150:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_gh150", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_gl150:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_gl150", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_gm150:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_gm150", vendor: "siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_s110:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_s110", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_s120:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_s120", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_sl150:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_sl150", vendor: "siemens", versions: [ { lessThan: "v4.8", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_sl150:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_sl150", vendor: "siemens", versions: [ { lessThan: "v4.7_hf33", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinamics_sm120:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinamics_sm120", vendor: "siemens", versions: [ { lessThanOrEqual: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinumerik_828d:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinumerik_828d", vendor: "siemens", versions: [ { lessThan: "v4.8_sp5", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:sinumerik_840d_sl:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "sinumerik_840d_sl", vendor: "siemens", versions: [ { lessThan: "v4.8_sp6", status: "affected", version: "0", versionType: "custom", }, ], }, { cpes: [ "cpe:2.3:h:siemens:siplus_s7-300_cpu_314:-:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "siplus_s7-300_cpu_314", vendor: "siemens", versions: [ { lessThan: "v3.3.17", status: "affected", version: "0", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2019-10936", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-09T14:36:59.481395Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-07-09T15:59:12.602Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-04T22:40:15.253Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-473245.pdf", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/html/ssa-473245.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.6 Patch 01", }, ], }, { defaultStatus: "unknown", product: "SIMATIC CFU PA", vendor: "Siemens", versions: [ { lessThan: "V1.2.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200AL IM 157-1 PN", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200M (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200MP IM 155-5 PN BA", vendor: "Siemens", versions: [ { lessThan: "V4.3.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200MP IM 155-5 PN HF", vendor: "Siemens", versions: [ { lessThan: "V4.4.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200MP IM 155-5 PN ST", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200MP IM 155-5 PN ST", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200pro IM 154-3 PN HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200pro IM 154-4 PN HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200pro IM 154-8 PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200pro IM 154-8F PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200pro IM 154-8FX PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200S IM 151-8 PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200S IM 151-8F PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN BA", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V1.2.1", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN HF", vendor: "Siemens", versions: [ { lessThan: "V4.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN HS", vendor: "Siemens", versions: [ { lessThan: "V4.0.1", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN ST", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN ST", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN ST BA", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN ST BA", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN/2 HF", vendor: "Siemens", versions: [ { lessThan: "V4.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN/3 HF", vendor: "Siemens", versions: [ { lessThan: "V4.2.1", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { lessThan: "V2.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 4AO U/I 4xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN: IO-Link Master", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200S (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC HMI Comfort Outdoor Panels (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC HMI Comfort Panels (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC HMI KTP Mobile Panels", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC PN/PN Coupler", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.2.1", }, ], }, { defaultStatus: "unknown", product: "SIMATIC PROFINET Driver", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.1", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.4.0", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-1500 Software Controller", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 314C-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 315-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 315F-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 315T-3 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 317-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 317F-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 317T-3 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 317TF-3 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 319-3 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 319F-3 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 CPU 412-2 PN V7", vendor: "Siemens", versions: [ { lessThan: "V7.0.3", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 CPU 414-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "V7.0.3", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 CPU 414F-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "V7.0.3", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 CPU 416-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "V7.0.3", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 CPU 416F-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "V7.0.3", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { lessThan: "V6.0.9", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V8.2.2", }, ], }, { defaultStatus: "unknown", product: "SIMATIC TDC CP51M1", vendor: "Siemens", versions: [ { lessThan: "V1.1.8", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC TDC CPU555", vendor: "Siemens", versions: [ { lessThan: "V1.1.1", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC WinAC RTX 2010", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2010 SP3", }, ], }, { defaultStatus: "unknown", product: "SIMATIC WinAC RTX F 2010", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2010 SP3", }, ], }, { defaultStatus: "unknown", product: "SINAMICS DCM", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V1.5 HF1", }, ], }, { defaultStatus: "unknown", product: "SINAMICS DCP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V1.3", }, ], }, { defaultStatus: "unknown", product: "SINAMICS G110M V4.7 PN Control Unit", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.7 SP10 HF5", }, ], }, { defaultStatus: "unknown", product: "SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.7 SP10 HF5", }, ], }, { defaultStatus: "unknown", product: "SINAMICS G130 V4.7 Control Unit", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < 4.8", }, ], }, { defaultStatus: "unknown", product: "SINAMICS G150 Control Unit", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < 4.8", }, ], }, { defaultStatus: "unknown", product: "SINAMICS GH150 V4.7 Control Unit", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SINAMICS GL150 V4.7 Control Unit", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SINAMICS GM150 V4.7 Control Unit", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SINAMICS S110 Control Unit", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS S150 Control Unit", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < 4.8", }, ], }, { defaultStatus: "unknown", product: "SINAMICS SL150 V4.7 Control Unit", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.7 HF33", }, ], }, { defaultStatus: "unknown", product: "SINAMICS SM120 V4.7 Control Unit", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINUMERIK 828D", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.8 SP5", }, ], }, { defaultStatus: "unknown", product: "SINUMERIK 840D sl", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.8 SP6", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200MP IM 155-5 PN HF", vendor: "Siemens", versions: [ { lessThan: "V4.4.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200MP IM 155-5 PN HF", vendor: "Siemens", versions: [ { lessThan: "V4.4.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL", vendor: "Siemens", versions: [ { lessThan: "V4.4.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200MP IM 155-5 PN ST", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200MP IM 155-5 PN ST", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200MP IM 155-5 PN ST TX RAIL", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200MP IM 155-5 PN ST TX RAIL", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200S IM 151-8 PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200S IM 151-8F PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF", vendor: "Siemens", versions: [ { lessThan: "V4.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF", vendor: "Siemens", versions: [ { lessThan: "V4.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF", vendor: "Siemens", versions: [ { lessThan: "V4.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF", vendor: "Siemens", versions: [ { lessThan: "V4.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL", vendor: "Siemens", versions: [ { lessThan: "V4.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL", vendor: "Siemens", versions: [ { lessThan: "V4.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF TX RAIL", vendor: "Siemens", versions: [ { lessThan: "V4.2.2", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN ST", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN ST", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN ST BA", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN ST BA", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN ST BA TX RAIL", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN ST TX RAIL", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN ST TX RAIL", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS NET PN/PN Coupler", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V4.2.1", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-300 CPU 314C-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.3.17", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-300 CPU 315-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-300 CPU 315F-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-300 CPU 317-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-300 CPU 317F-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.17", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-400 CPU 414-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "V7.0.3", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-400 CPU 416-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "V7.0.3", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "Affected devices improperly handle large amounts of specially crafted UDP packets.\r\n\r\nThis could allow an unauthenticated remote attacker to trigger a denial of service condition.", }, ], metrics: [ { cvssV3_1: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400: Uncontrolled Resource Consumption", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-09T12:03:55.957Z", orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", shortName: "siemens", }, references: [ { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-473245.pdf", }, { url: "https://cert-portal.siemens.com/productcert/html/ssa-473245.html", }, ], }, }, cveMetadata: { assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", assignerShortName: "siemens", cveId: "CVE-2019-10936", datePublished: "2019-10-10T00:00:00", dateReserved: "2019-04-08T00:00:00", dateUpdated: "2024-08-04T22:40:15.253Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-2247
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
The integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject headers via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:06:00.315Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-03-14T00:00:00", descriptions: [ { lang: "en", value: "The integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject headers via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:23", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-2247", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject headers via unspecified vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { name: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", refsource: "MISC", url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-2247", datePublished: "2014-03-16T10:00:00", dateReserved: "2014-02-28T00:00:00", dateUpdated: "2024-08-06T10:06:00.315Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-2255
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTP packets.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:05:59.987Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-03-14T00:00:00", descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTP packets.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:22", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-2255", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTP packets.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { name: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", refsource: "MISC", url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-2255", datePublished: "2014-03-16T10:00:00", dateReserved: "2014-02-28T00:00:00", dateUpdated: "2024-08-06T10:05:59.987Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2016-2200
Vulnerability from cvelistv5
Published
2016-02-08 16:00
Modified
2024-08-05 23:24
Severity ?
EPSS score ?
Summary
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service (STOP mode transition) via crafted packets on TCP port 102.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/83106 | vdb-entry, x_refsource_BID | |
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1034954 | vdb-entry, x_refsource_SECTRACK | |
https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T23:24:48.489Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "83106", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/83106", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", }, { name: "1034954", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034954", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-02-08T00:00:00", descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service (STOP mode transition) via crafted packets on TCP port 102.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:49", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "83106", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/83106", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", }, { name: "1034954", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034954", }, { tags: [ "x_refsource_MISC", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2016-2200", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service (STOP mode transition) via crafted packets on TCP port 102.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "83106", refsource: "BID", url: "http://www.securityfocus.com/bid/83106", }, { name: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf", }, { name: "1034954", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034954", }, { name: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", refsource: "MISC", url: "https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2016-2200", datePublished: "2016-02-08T16:00:00", dateReserved: "2016-02-02T00:00:00", dateUpdated: "2024-08-05T23:24:48.489Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-5074
Vulnerability from cvelistv5
Published
2014-08-17 23:00
Modified
2024-08-06 11:34
Severity ?
EPSS score ?
Summary
Siemens SIMATIC S7-1500 CPU devices with firmware before 1.6 allow remote attackers to cause a denial of service (device restart and STOP transition) via crafted TCP packets.
References
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-14-226-01 | x_refsource_MISC | |
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-310688.pdf | x_refsource_CONFIRM | |
https://www.exploit-db.com/exploits/44693/ | exploit, x_refsource_EXPLOIT-DB | |
https://cert-portal.siemens.com/productcert/pdf/ssa-310688.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T11:34:37.307Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-14-226-01", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-310688.pdf", }, { name: "44693", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/44693/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-310688.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-08-14T00:00:00", descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU devices with firmware before 1.6 allow remote attackers to cause a denial of service (device restart and STOP transition) via crafted TCP packets.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:27", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://ics-cert.us-cert.gov/advisories/ICSA-14-226-01", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-310688.pdf", }, { name: "44693", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/44693/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-310688.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-5074", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Siemens SIMATIC S7-1500 CPU devices with firmware before 1.6 allow remote attackers to cause a denial of service (device restart and STOP transition) via crafted TCP packets.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://ics-cert.us-cert.gov/advisories/ICSA-14-226-01", refsource: "MISC", url: "https://ics-cert.us-cert.gov/advisories/ICSA-14-226-01", }, { name: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-310688.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-310688.pdf", }, { name: "44693", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/44693/", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-310688.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-310688.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-5074", datePublished: "2014-08-17T23:00:00", dateReserved: "2014-07-24T00:00:00", dateUpdated: "2024-08-06T11:34:37.307Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-2251
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
The random-number generator on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:06:00.200Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-03-14T00:00:00", descriptions: [ { lang: "en", value: "The random-number generator on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:24", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-2251", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The random-number generator on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { name: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", refsource: "MISC", url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-2251", datePublished: "2014-03-16T10:00:00", dateReserved: "2014-02-28T00:00:00", dateUpdated: "2024-08-06T10:06:00.200Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-25622
Vulnerability from cvelistv5
Published
2022-04-12 00:00
Modified
2025-01-14 10:26
Severity ?
EPSS score ?
Summary
The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.
This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SIMATIC CFU DIQ |
Version: 0 < V2.0.0 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T04:42:50.341Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-446448.pdf", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/html/ssa-446448.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unknown", product: "SIMATIC CFU DIQ", vendor: "Siemens", versions: [ { lessThan: "V2.0.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC CFU PA", vendor: "Siemens", versions: [ { lessThan: "V2.0.0", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200AL IM 157-1 PN", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200MP IM 155-5 PN HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200pro IM 154-8 PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200pro IM 154-8F PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200pro IM 154-8FX PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200S IM 151-8 PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200S IM 151-8F PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 MF HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN/2 HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET 200SP IM 155-6 PN/3 HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L", vendor: "Siemens", versions: [ { lessThan: "V5.1.2", status: "affected", version: "V5.1.1", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L", vendor: "Siemens", versions: [ { lessThan: "V5.1.2", status: "affected", version: "V5.1.1", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L", vendor: "Siemens", versions: [ { lessThan: "V5.1.2", status: "affected", version: "V5.1.1", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L", vendor: "Siemens", versions: [ { lessThan: "V5.1.2", status: "affected", version: "V5.1.1", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, DI 16x24VDC, M12-L", vendor: "Siemens", versions: [ { lessThan: "V5.1.2", status: "affected", version: "V5.1.1", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, DI 8x24VDC, M12-L", vendor: "Siemens", versions: [ { lessThan: "V5.1.2", status: "affected", version: "V5.1.1", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L", vendor: "Siemens", versions: [ { lessThan: "V5.1.3", status: "affected", version: "V5.1.1", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L", vendor: "Siemens", versions: [ { lessThan: "V5.1.2", status: "affected", version: "V5.1.1", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L", vendor: "Siemens", versions: [ { lessThan: "V5.1.2", status: "affected", version: "V5.1.1", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC PN/MF Coupler", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC PN/PN Coupler", vendor: "Siemens", versions: [ { status: "affected", version: "All versions >= 4.2", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V2.0.0", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 314C-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.3.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 315-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 315F-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 315T-3 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 317-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 317F-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 317T-3 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 317TF-3 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 319-3 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-300 CPU 319F-3 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 CPU 412-2 PN V7", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 CPU 414-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 CPU 414F-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 CPU 416-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 CPU 416F-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { lessThan: "V6.0.10", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V10.1.1", }, ], }, { defaultStatus: "unknown", product: "SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { lessThan: "V8.2.3", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC TDC CP51M1", vendor: "Siemens", versions: [ { lessThan: "V1.1.10", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC TDC CPU555", vendor: "Siemens", versions: [ { lessThan: "V1.2.1", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIMATIC WinAC RTX 2010", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIMATIC WinAC RTX F 2010", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SINAMICS DCM", vendor: "Siemens", versions: [ { lessThan: "V1.5 SP1", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS G110M", vendor: "Siemens", versions: [ { lessThan: "V4.7.14", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS G115D", vendor: "Siemens", versions: [ { lessThan: "V4.7.14", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS G120 (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { lessThan: "V4.7 SP14", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS G130", vendor: "Siemens", versions: [ { lessThan: "V5.2.3.13", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS G150", vendor: "Siemens", versions: [ { lessThan: "V5.2.3.13", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS S110", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS S120 (incl. SIPLUS variants)", vendor: "Siemens", versions: [ { lessThan: "V5.2 SP3 HF13", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS S150", vendor: "Siemens", versions: [ { lessThan: "V5.2.3.13", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS S210 (6SL5...)", vendor: "Siemens", versions: [ { lessThan: "V5.2 SP3 HF18", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SINAMICS V90", vendor: "Siemens", versions: [ { lessThan: "V1.04.04", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200MP IM 155-5 PN HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200MP IM 155-5 PN HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200MP IM 155-5 PN HF T1 RAIL", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200S IM 151-8 PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200S IM 151-8F PN/DP CPU", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF T1 RAIL", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS ET 200SP IM 155-6 PN HF TX RAIL", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "V4.2.0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS HCS4200 CIM4210", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIPLUS HCS4200 CIM4210C", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIPLUS HCS4300 CIM4310", vendor: "Siemens", versions: [ { status: "affected", version: "All versions", }, ], }, { defaultStatus: "unknown", product: "SIPLUS NET PN/PN Coupler", vendor: "Siemens", versions: [ { status: "affected", version: "All versions >= 4.2", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-300 CPU 314C-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.3.19", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-300 CPU 315-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-300 CPU 315F-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-300 CPU 317-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-300 CPU 317F-2 PN/DP", vendor: "Siemens", versions: [ { status: "affected", version: "All versions < V3.2.19", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-400 CPU 414-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, { defaultStatus: "unknown", product: "SIPLUS S7-400 CPU 416-3 PN/DP V7", vendor: "Siemens", versions: [ { lessThan: "*", status: "affected", version: "0", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.\n\nThis could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments.", }, ], metrics: [ { cvssV3_1: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400: Uncontrolled Resource Consumption", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-14T10:26:55.984Z", orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", shortName: "siemens", }, references: [ { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-446448.pdf", }, { url: "https://cert-portal.siemens.com/productcert/html/ssa-446448.html", }, ], }, }, cveMetadata: { assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", assignerShortName: "siemens", cveId: "CVE-2022-25622", datePublished: "2022-04-12T00:00:00", dateReserved: "2022-02-21T00:00:00", dateUpdated: "2025-01-14T10:26:55.984Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-2248
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
Open redirect vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/66190 | vdb-entry, x_refsource_BID | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:06:00.210Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { name: "66190", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/66190", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-03-14T00:00:00", descriptions: [ { lang: "en", value: "Open redirect vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:19", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { name: "66190", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/66190", }, { tags: [ "x_refsource_MISC", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-2248", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Open redirect vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { name: "66190", refsource: "BID", url: "http://www.securityfocus.com/bid/66190", }, { name: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", refsource: "MISC", url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-2248", datePublished: "2014-03-16T10:00:00", dateReserved: "2014-02-28T00:00:00", dateUpdated: "2024-08-06T10:06:00.210Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-2246
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/66201 | vdb-entry, x_refsource_BID | |
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:06:00.220Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "66201", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/66201", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-03-14T00:00:00", descriptions: [ { lang: "en", value: "Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:20", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "66201", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/66201", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-2246", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "66201", refsource: "BID", url: "http://www.securityfocus.com/bid/66201", }, { name: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { name: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", refsource: "MISC", url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-2246", datePublished: "2014-03-16T10:00:00", dateReserved: "2014-02-28T00:00:00", dateUpdated: "2024-08-06T10:06:00.220Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-2249
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 10:05
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 and SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf | x_refsource_CONFIRM | |
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-079-02 | x_refsource_MISC | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-654382.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:05:59.975Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-079-02", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-654382.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-03-14T00:00:00", descriptions: [ { lang: "en", value: "Cross-site request forgery (CSRF) vulnerability on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 and SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:30", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf", }, { tags: [ "x_refsource_MISC", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-079-02", }, { tags: [ "x_refsource_MISC", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-654382.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-2249", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cross-site request forgery (CSRF) vulnerability on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 and SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { name: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-654382.pdf", }, { name: "http://ics-cert.us-cert.gov/advisories/ICSA-14-079-02", refsource: "MISC", url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-079-02", }, { name: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", refsource: "MISC", url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-654382.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-654382.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-2249", datePublished: "2014-03-16T10:00:00", dateReserved: "2014-02-28T00:00:00", dateUpdated: "2024-08-06T10:05:59.975Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-2257
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted ISO-TSAP packets.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:06:00.259Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-03-14T00:00:00", descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted ISO-TSAP packets.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:18", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-2257", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted ISO-TSAP packets.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { name: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", refsource: "MISC", url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-2257", datePublished: "2014-03-16T10:00:00", dateReserved: "2014-02-28T00:00:00", dateUpdated: "2024-08-06T10:06:00.259Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-2253
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted Profinet packets.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:06:00.119Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-03-14T00:00:00", descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted Profinet packets.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:22", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-2253", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted Profinet packets.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { name: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", refsource: "MISC", url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-2253", datePublished: "2014-03-16T10:00:00", dateReserved: "2014-02-28T00:00:00", dateUpdated: "2024-08-06T10:06:00.119Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2014-2259
Vulnerability from cvelistv5
Published
2014-03-16 10:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTPS packets.
References
▼ | URL | Tags |
---|---|---|
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf | x_refsource_CONFIRM | |
http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T10:06:00.300Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-03-14T00:00:00", descriptions: [ { lang: "en", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTPS packets.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-10T14:06:19", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { tags: [ "x_refsource_MISC", ], url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-2259", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTPS packets.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", refsource: "CONFIRM", url: "http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf", }, { name: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", refsource: "MISC", url: "http://ics-cert.us-cert.gov/advisories/ICSA-14-073-01", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-2259", datePublished: "2014-03-16T10:00:00", dateReserved: "2014-02-28T00:00:00", dateUpdated: "2024-08-06T10:06:00.300Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }