cve/2020/CVE-2020-7587.md

33 lines
3.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-7587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7587)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20Execution%20Discrete&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20Execution%20Foundation&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20Execution%20Process&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20Intelligence&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20Quality&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Opcenter%20RD%26L&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20IT%20LMS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20IT%20Production%20Suite&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20Notifier%20Server%20for%20Windows&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20PCS%20neo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20STEP%207%20(TIA%20Portal)%20V15&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMATIC%20STEP%207%20(TIA%20Portal)%20V16&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMOCODE%20ES%20V15.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SIMOCODE%20ES%20V16&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Soft%20Starter%20ES%20V15.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Soft%20Starter%20ES%20V16&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%3A%20Uncontrolled%20Resource%20Consumption&color=brighgreen)
### Description
A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions < V2.6), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending multiple specially crafted packets to the affected service could cause a partial remote denial-of-service, that would cause the service to restart itself. On some cases the vulnerability could leak random information from the remote service.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Live-Hack-CVE/CVE-2020-7587