cve-2023-38380
Vulnerability from cvelistv5
Published
2023-12-12 11:26
Modified
2024-08-02 17:39
Summary
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-7 LTE (All versions < V3.4.29), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions < V3.4.29), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) (All versions < V3.0.37), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SINAMICS S210 (6SL5...) (All versions >= V6.1 < V6.1 HF2), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) (All versions < V3.0.37). The webserver implementation of the affected products does not correctly release allocated memory after it has been used. An attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product.
Impacted products
Vendor Product Version
Siemens SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) Version: 0   < V3.4.29
Create a notification for this product.
   Siemens SIMATIC CP 1243-1 (incl. SIPLUS variants) Version: 0   < V3.4.29
Create a notification for this product.
   Siemens SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) Version: 0   < V3.4.29
Create a notification for this product.
   Siemens SIMATIC CP 1243-7 LTE Version: 0   < V3.4.29
Create a notification for this product.
   Siemens SIMATIC CP 1243-8 IRC Version: 0   < V3.4.29
Create a notification for this product.
   Siemens SIMATIC CP 1542SP-1 Version: 0   < V2.3
Create a notification for this product.
   Siemens SIMATIC CP 1542SP-1 IRC Version: 0   < V2.3
Create a notification for this product.
   Siemens SIMATIC CP 1543-1 Version: 0   < V3.0.37
Create a notification for this product.
   Siemens SIMATIC CP 1543SP-1 Version: 0   < V2.3
Create a notification for this product.
   Siemens SINAMICS S210 (6SL5...) Version: V6.1   < V6.1 HF2
Create a notification for this product.
   Siemens SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL Version: 0   < V2.3
Create a notification for this product.
   Siemens SIPLUS ET 200SP CP 1543SP-1 ISEC Version: 0   < V2.3
Create a notification for this product.
   Siemens SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL Version: 0   < V2.3
Create a notification for this product.
   Siemens SIPLUS NET CP 1543-1 Version: 0   < V3.0.37
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:39:13.213Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-693975.pdf",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-693975.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-139628.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/html/ssa-625862.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "SIMATIC CP 1242-7 V2 (incl. SIPLUS variants)",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V3.4.29",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC CP 1243-1 (incl. SIPLUS variants)",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V3.4.29",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants)",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC CP 1243-1 IEC (incl. SIPLUS variants)",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V3.4.29",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC CP 1243-7 LTE",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V3.4.29",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC CP 1243-8 IRC",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V3.4.29",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC CP 1542SP-1",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V2.3",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC CP 1542SP-1 IRC",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V2.3",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC CP 1543-1",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V3.0.37",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC CP 1543SP-1",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V2.3",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SINAMICS S210 (6SL5...)",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V6.1 HF2",
                     status: "affected",
                     version: "V6.1",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V2.3",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIPLUS ET 200SP CP 1543SP-1 ISEC",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V2.3",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V2.3",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIPLUS NET CP 1543-1",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V3.0.37",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-7 LTE (All versions < V3.4.29), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions < V3.4.29), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) (All versions < V3.0.37), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SINAMICS S210 (6SL5...) (All versions >= V6.1 < V6.1 HF2), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) (All versions < V3.0.37). The webserver implementation of the affected products does not correctly release allocated memory after it has been used.\r\n\r\nAn attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
            {
               cvssV4_0: {
                  baseScore: 8.7,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
                  version: "4.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-401",
                     description: "CWE-401: Missing Release of Memory after Effective Lifetime",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-06-11T14:19:50.234Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-693975.pdf",
            },
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-693975.html",
            },
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-139628.html",
            },
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-625862.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2023-38380",
      datePublished: "2023-12-12T11:26:36.173Z",
      dateReserved: "2023-07-17T13:06:36.758Z",
      dateUpdated: "2024-08-02T17:39:13.213Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2023-38380\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2023-12-12T12:15:11.477\",\"lastModified\":\"2024-11-21T08:13:26.780\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-7 LTE (All versions < V3.4.29), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions < V3.4.29), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) (All versions < V3.0.37), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SINAMICS S210 (6SL5...) (All versions >= V6.1 < V6.1 HF2), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) (All versions < V3.0.37). The webserver implementation of the affected products does not correctly release allocated memory after it has been used.\\r\\n\\r\\nAn attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en:\\nSIMATIC CP 1242-7 V2 (incluidas las variantes SIPLUS) (todas las versiones), \\nSIMATIC CP 1243-1 (incluidas las variantes SIPLUS) (todas las versiones), \\nSIMATIC CP 1243-1 DNP3 (incluidas las variantes SIPLUS) ) (todas las versiones), \\nSIMATIC CP 1243-1 IEC (incl. variantes SIPLUS) (todas las versiones), \\nSIMATIC CP 1243-7 LTE (todas las versiones), \\nSIMATIC CP 1243-8 IRC (todas las versiones), \\nSIMATIC CP 1543-1 (Todas las versiones), \\nSINAMICS S210 (6SL5...) (Todas las versiones &gt;= V6.1 &lt; V6.1 HF2), \\nSIPLUS NET CP 1543-1 (Todas las versiones). \\nLa implementación del servidor web de los productos afectados no libera correctamente la memoria asignada una vez utilizada. Un atacante con acceso a la red podría utilizar esta vulnerabilidad para provocar una condición de denegación de servicio en el servidor web del producto afectado.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnerableSystemConfidentiality\":\"NONE\",\"vulnerableSystemIntegrity\":\"NONE\",\"vulnerableSystemAvailability\":\"HIGH\",\"subsequentSystemConfidentiality\":\"NONE\",\"subsequentSystemIntegrity\":\"NONE\",\"subsequentSystemAvailability\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"NOT_DEFINED\",\"recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk7243-8rx30-0xe0_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBBD0600-DB41-4DE8-97FC-2D180DA1406F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk7243-8rx30-0xe0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A50A52E7-D8FE-4071-99B3-3652B0892D07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6gk7543-1ax00-0xe0_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7C15EC-3C83-434B-A313-9035302EEF87\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6gk7543-1ax00-0xe0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42E7B79-A3D2-4AAC-80E2-7E5C19A72CC5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:6ag1543-1ax00-2xe0_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9373F60E-03D0-4EB2-9774-6479A8F342C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:6ag1543-1ax00-2xe0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9063778-2B5F-4A32-83C8-6CEB9EE8F9C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1242-7_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66A2C7F2-F787-4770-8F56-E2AFF1AFD780\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1242-7_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29D4C72C-4E84-4563-9D66-5C641AB996BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"373B769D-0E60-4362-BAE1-90BA6E0B211C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9BB25C-D5E3-43DE-8C73-06BDC43CA960\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1243-1_dnp3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1158D559-2A46-4BE4-B16E-C2789AD3C60E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1243-1_dnp3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FFBFB96-1A35-4724-831B-68E3A9C32921\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1243-1_iec_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C3E8B50-07E9-4697-B42D-86B9BE942553\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1243-1_iec:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE96226-A2DF-4A9E-8CBB-8D7CF328E404\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_cp_1243-7_lte_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FC29937-7A70-4A9F-89F8-8D17E285C225\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_cp_1243-7_lte:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAFC3319-F07C-4784-9873-3E1907FE3080\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEBF14B3-65A0-41E9-B99C-D88548F307CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F151297C-3097-483F-98B5-0261BD547421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.1:sp1_hotfix8:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CEAB952-BBF0-4585-8F12-F25A192FAA1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F4D3F85-4CA5-438E-955E-C039F7DE91B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:hotfix2:*:*:*:*:*:*\",\"matchCriteriaId\":\"59608DD3-87C3-4ED1-B0C2-AFD31A7A70A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:hotfix5:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA3D3D7E-CB48-4B8D-8101-CB0DADEEC0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:hotfix6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F8FC52F-3648-410B-8BCB-76129ABC0D4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:hotfix7:*:*:*:*:*:*\",\"matchCriteriaId\":\"59BDCF31-2D94-4D7D-9EC8-60726B10DFC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D62C3EEA-000C-41CD-8264-4A4B6AE1BAD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:sp3_hotfix3:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF00EE34-1A68-40F0-A9FC-FBBF268C6400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:sp3_hotfix5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BB896A-8C42-416E-AE03-D5A0E122BA79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:sp3_hotfix6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18F1100-8157-4E99-AB22-BF51EB1663B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:sp3_hotfix9:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9B1D54-E3A0-4EFF-8EB2-A52B8E1F117F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:6.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E509394F-9987-41D2-A866-68479FF39DCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:sinamics_s210_firmware:6.1:hotfix1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DEB162B-6579-4280-9BCC-403C1B351002\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:sinamics_s210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BFA8FB3-12A9-4D2E-BCFD-C66313521C80\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-139628.html\",\"source\":\"productcert@siemens.com\"},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-625862.html\",\"source\":\"productcert@siemens.com\"},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-693975.html\",\"source\":\"productcert@siemens.com\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-693975.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-139628.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-625862.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-693975.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-693975.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.