CVE updates for Siemens AD-2019-07

This commit is contained in:
Siemens ProductCERT 2019-07-11 12:47:33 +02:00
parent c0aee99a98
commit 2e71562099
No known key found for this signature in database
GPG Key ID: BB6795EA8E55D52E
13 changed files with 1043 additions and 638 deletions

View File

@ -4,9 +4,9 @@
"data_type": "CVE", "data_type": "CVE",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2018-13808", "ID": "CVE-2018-13808",
"ASSIGNER": "productcert@siemens.com", "ASSIGNER": "productcert@siemens.com"
"STATE": "PUBLIC"
}, },
"cve_id": "CVE-2018-13808",
"affects": { "affects": {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
@ -19,7 +19,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions < V2.8" "version_value" : "All versions"
} }
] ]
} }
@ -29,12 +29,11 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions < V2.8" "version_value" : "All versions"
} }
] ]
} }
} } ]
]
} }
} }
] ]
@ -55,9 +54,7 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf", "url":"https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf"
"refsource": "MISC",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf"
} }
] ]
}, },
@ -65,8 +62,9 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability has been identified in CP 1604 (All versions < V2.8), CP 1616 (All versions < V2.8). An attacker with network access to port 23/tcp could extract internal communication data or cause a Denial-of-Service condition. Successful exploitation requires network access to a vulnerable device. At the time of advisory publication no public exploitation of this vulnerability was known." "value": "A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). An attacker with network access to port 23/tcp could extract internal communication data or cause a Denial-of-Service condition.\n\nSuccessful exploitation requires network access to a vulnerable device.\n\nAt the time of advisory publication no public exploitation of this vulnerability was known."
} }
] ]
} }
} }

View File

@ -4,9 +4,9 @@
"data_type": "CVE", "data_type": "CVE",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2018-13809", "ID": "CVE-2018-13809",
"ASSIGNER": "productcert@siemens.com", "ASSIGNER": "productcert@siemens.com"
"STATE": "PUBLIC"
}, },
"cve_id": "CVE-2018-13809",
"affects": { "affects": {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
@ -19,7 +19,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions < V2.8" "version_value" : "All versions"
} }
] ]
} }
@ -29,12 +29,11 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions < V2.8" "version_value" : "All versions"
} }
] ]
} }
} } ]
]
} }
} }
] ]
@ -55,9 +54,7 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf", "url":"https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf"
"refsource": "MISC",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf"
} }
] ]
}, },
@ -65,8 +62,9 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability has been identified in CP 1604 (All versions < V2.8), CP 1616 (All versions < V2.8). The integrated web server of the affected CP devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into following a malicious link. User interaction is required for a successful exploitation. At the time of advisory publication no public exploitation of this vulnerability was known." "value": "A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). The integrated web server of the affected CP devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into following a malicious link.\n\nUser interaction is required for a successful exploitation.\n\nAt the time of advisory publication no public exploitation of this vulnerability was known."
} }
] ]
} }
} }

View File

@ -4,9 +4,9 @@
"data_type": "CVE", "data_type": "CVE",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2018-13810", "ID": "CVE-2018-13810",
"ASSIGNER": "productcert@siemens.com", "ASSIGNER": "productcert@siemens.com"
"STATE": "PUBLIC"
}, },
"cve_id": "CVE-2018-13810",
"affects": { "affects": {
"vendor" : { "vendor" : {
"vendor_data" : [ "vendor_data" : [
@ -19,7 +19,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions < V2.8" "version_value" : "All versions"
} }
] ]
} }
@ -29,12 +29,11 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions < V2.8" "version_value" : "All versions"
} }
] ]
} }
} } ]
]
} }
} }
] ]
@ -55,9 +54,7 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf", "url":"https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf"
"refsource": "MISC",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf"
} }
] ]
}, },
@ -65,7 +62,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability has been identified in CP 1604 (All versions < V2.8), CP 1616 (All versions < V2.8). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. At the time of advisory publication no public exploitation of this vulnerability was known." "value": "A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link.\n\nSuccessful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform.\n\nAt the time of advisory publication no public exploitation of this vulnerability was known."
} }
] ]
} }

View File

@ -1,18 +1,61 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2019-10915", "ID": "CVE-2019-10915",
"ASSIGNER": "cve@mitre.org", "STATE": "PUBLIC"
"STATE": "RESERVED" },
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"affects": {
"vendor" : {
"vendor_data" : [
{
"vendor_name": "Siemens AG",
"product" : {
"product_data" : [
{
"product_name": "TIA Administrator",
"version" : {
"version_data" : [
{
"version_value" : "All versions < V1.0 SP1 Upd1"
}
]
}
} ]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-306: Missing Authentication for Critical Function"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-721298.pdf"
}
]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A vulnerability has been identified in TIA Administrator (All versions < V1.0 SP1 Upd1). The integrated configuration web application (TIA Administrator) allows to execute certain application commands without proper authentication.\n\nThe vulnerability could be exploited by an attacker with local access to the affected system. Successful exploitation requires no privileges and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system.\n\nAt the time of advisory publication no public exploitation of this security vulnerability was known."
} }
] ]
} }
} }

View File

@ -39,7 +39,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11"
} }
] ]
} }
@ -49,7 +49,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11"
} }
] ]
} }
@ -119,7 +119,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V7.4 SP1 Upd 11"
} }
] ]
} }
@ -133,8 +133,7 @@
} }
] ]
} }
} } ]
]
} }
} }
] ]
@ -155,14 +154,8 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "MISC", "refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf"
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf"
},
{
"refsource": "BID",
"name": "108404",
"url": "http://www.securityfocus.com/bid/108404"
} }
] ]
}, },
@ -170,8 +163,9 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions), SIMATIC WinCC (TIA Portal) V15 (All versions), SIMATIC WinCC Runtime Professional (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 Upd3). An attacker with access to the project file could run arbitrary system commands with the privileges of the local database server. The vulnerability could be exploited by an attacker with access to the project file. The vulnerability does impact the confidentiality, integrity, and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known." "value": "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions), SIMATIC WinCC (TIA Portal) V15 (All versions), SIMATIC WinCC Runtime Professional (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with access to the project file could run arbitrary system commands with the privileges of the local database server.\n\nThe vulnerability could be exploited by an attacker with access to the project file. The vulnerability does impact the confidentiality, integrity, and availability of the affected system.\n\nAt the time of advisory publication no public exploitation of this security vulnerability was known."
} }
] ]
} }
} }

View File

@ -39,7 +39,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11"
} }
] ]
} }
@ -49,7 +49,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11"
} }
] ]
} }
@ -119,7 +119,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V7.4 SP1 Upd 11"
} }
] ]
} }
@ -133,8 +133,7 @@
} }
] ]
} }
} } ]
]
} }
} }
] ]
@ -155,14 +154,8 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "MISC", "refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf"
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf"
},
{
"refsource": "BID",
"name": "108404",
"url": "http://www.securityfocus.com/bid/108404"
} }
] ]
}, },
@ -170,8 +163,9 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions), SIMATIC WinCC (TIA Portal) V15 (All versions), SIMATIC WinCC Runtime Professional (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 Upd3). An attacker with local access to the project file could cause a Denial-of-Service condition on the affected product while the project file is loaded. Successful exploitation requires access to the project file. An attacker could use the vulnerability to compromise availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known." "value": "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions), SIMATIC WinCC (TIA Portal) V15 (All versions), SIMATIC WinCC Runtime Professional (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An attacker with local access to the project file could cause a Denial-of-Service condition on the affected product while the project file is loaded.\n\nSuccessful exploitation requires access to the project file. An attacker could use the vulnerability to compromise availability of the affected system.\n\nAt the time of advisory publication no public exploitation of this security vulnerability was known."
} }
] ]
} }
} }

View File

@ -39,7 +39,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11"
} }
] ]
} }
@ -49,7 +49,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11"
} }
] ]
} }
@ -119,7 +119,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V7.4 SP1 Upd 11"
} }
] ]
} }
@ -133,8 +133,7 @@
} }
] ]
} }
} } ]
]
} }
} }
] ]
@ -155,14 +154,8 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "MISC", "refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf"
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-697412.pdf"
},
{
"refsource": "BID",
"name": "108404",
"url": "http://www.securityfocus.com/bid/108404"
} }
] ]
}, },
@ -170,8 +163,9 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions), SIMATIC WinCC (TIA Portal) V15 (All versions), SIMATIC WinCC Runtime Professional (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 Upd3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known." "value": "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions), SIMATIC WinCC (TIA Portal) V15 (All versions), SIMATIC WinCC Runtime Professional (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges.\n\nThe vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system.\n\nAt the time of advisory publication no public exploitation of this security vulnerability was known."
} }
] ]
} }
} }

View File

@ -1,18 +1,91 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2019-10930", "ID": "CVE-2019-10930",
"ASSIGNER": "cve@mitre.org", "STATE": "PUBLIC"
"STATE": "RESERVED" },
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"affects": {
"vendor" : {
"vendor_data" : [
{
"vendor_name": "Siemens AG",
"product" : {
"product_data" : [
{
"product_name": "SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules",
"version" : {
"version_data" : [
{
"version_value" : "All versions < V7.90"
}
]
}
},
{
"product_name": "All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "DIGSI 5 engineering software",
"version" : {
"version_data" : [
{
"version_value" : "All versions < V7.90"
}
]
}
} ]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-552: Files or Directories Accessible to External Parties"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-899560.pdf"
}
]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A vulnerability has been identified in SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.90), All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions), DIGSI 5 engineering software (All versions < V7.90). A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system."
} }
] ]
} }
} }

View File

@ -1,17 +1,89 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2019-10931", "ID": "CVE-2019-10931",
"ASSIGNER": "cve@mitre.org", "STATE": "PUBLIC"
"STATE": "RESERVED" },
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"affects": {
"vendor" : {
"vendor_data" : [
{
"vendor_name": "Siemens AG",
"product" : {
"product_data" : [
{
"product_name": "SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules",
"version" : {
"version_data" : [
{
"version_value" : "All versions < V7.90"
}
]
}
},
{
"product_name": "All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "DIGSI 5 engineering software",
"version" : {
"version_data" : [
{
"version_value" : "All versions < V7.90"
}
]
}
} ]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-248: Uncaught Exception"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-899560.pdf"
}
]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A vulnerability has been identified in SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.90), All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions), DIGSI 5 engineering software (All versions < V7.90). Specially crafted packets sent to port 443/TCP could cause a Denial of Service condition."
} }
] ]
} }

View File

@ -1,18 +1,91 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2019-10933", "ID": "CVE-2019-10933",
"ASSIGNER": "cve@mitre.org", "STATE": "PUBLIC"
"STATE": "RESERVED" },
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"affects": {
"vendor" : {
"vendor_data" : [
{
"vendor_name": "Siemens AG",
"product" : {
"product_data" : [
{
"product_name": "Spectrum Power 3 (Corporate User Interface)",
"version" : {
"version_data" : [
{
"version_value" : "All versions <= v3.11"
}
]
}
},
{
"product_name": "Spectrum Power 4 (Corporate User Interface)",
"version" : {
"version_data" : [
{
"version_value" : "Version v4.75"
}
]
}
},
{
"product_name": "Spectrum Power 5 (Corporate User Interface)",
"version" : {
"version_data" : [
{
"version_value" : "All versions <= v5.50"
}
]
}
},
{
"product_name": "Spectrum Power 7 (Corporate User Interface)",
"version" : {
"version_data" : [
{
"version_value" : "All versions <= v2.20"
}
]
}
} ]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-747162.pdf"
}
]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A vulnerability has been identified in Spectrum Power 3 (Corporate User Interface) (All versions <= v3.11), Spectrum Power 4 (Corporate User Interface) (Version v4.75), Spectrum Power 5 (Corporate User Interface) (All versions <= v5.50), Spectrum Power 7 (Corporate User Interface) (All versions <= v2.20). The web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link.\n\nUser interaction is required for a successful exploitation. The user does not need to be logged into the web interface in order for the exploitation to succeed.\n\nAt the stage of publishing this security advisory no public exploitation is known."
} }
] ]
} }
} }

View File

@ -1,17 +1,189 @@
{ {
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2019-10935", "ID": "CVE-2019-10935",
"ASSIGNER": "cve@mitre.org", "STATE": "PUBLIC"
"STATE": "RESERVED" },
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"affects": {
"vendor" : {
"vendor_data" : [
{
"vendor_name": "Siemens AG",
"product" : {
"product_data" : [
{
"product_name": "SIMATIC PCS 7 V8.0 and earlier",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIMATIC PCS 7 V8.1",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIMATIC PCS 7 V8.2",
"version" : {
"version_data" : [
{
"version_value" : "All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11"
}
]
}
},
{
"product_name": "SIMATIC PCS 7 V9.0",
"version" : {
"version_data" : [
{
"version_value" : "All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11"
}
]
}
},
{
"product_name": "SIMATIC WinCC Professional (TIA Portal V13)",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIMATIC WinCC Professional (TIA Portal V14)",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIMATIC WinCC Professional (TIA Portal V15)",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIMATIC WinCC Runtime Professional V13",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIMATIC WinCC Runtime Professional V14",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIMATIC WinCC Runtime Professional V15",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIMATIC WinCC V7.2 and earlier",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIMATIC WinCC V7.3",
"version" : {
"version_data" : [
{
"version_value" : "All versions"
}
]
}
},
{
"product_name": "SIMATIC WinCC V7.4",
"version" : {
"version_data" : [
{
"version_value" : "All versions < V7.4 SP1 Upd 11"
}
]
}
},
{
"product_name": "SIMATIC WinCC V7.5",
"version" : {
"version_data" : [
{
"version_value" : "All versions < V7.5 Upd 3"
}
]
}
} ]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-434: Unrestricted Upload of File with Dangerous Type"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-121293.pdf"
}
]
}, },
"description": { "description": {
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value": "A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC Professional (TIA Portal V13) (All versions), SIMATIC WinCC Professional (TIA Portal V14) (All versions), SIMATIC WinCC Professional (TIA Portal V15) (All versions), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions), SIMATIC WinCC Runtime Professional V15 (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). The SIMATIC WinCC DataMonitor web application of the affected products allows to upload arbitrary ASPX code.\n\nThe security vulnerability could be exploited by an authenticated attacker with network access to the WinCC DataMonitor application. No user interaction is required to exploit this vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the affected device.\n\nAt the stage of publishing this security advisory no public exploitation is known."
} }
] ]
} }

View File

@ -159,7 +159,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V1.1.0"
} }
] ]
} }
@ -169,7 +169,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V1.1.0"
} }
] ]
} }
@ -179,7 +179,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V1.1.0"
} }
] ]
} }
@ -189,7 +189,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V3.2.1"
} }
] ]
} }
@ -623,8 +623,7 @@
} }
] ]
} }
} } ]
]
} }
} }
] ]
@ -645,9 +644,8 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "MISC", "refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480230.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-480230.pdf"
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-480230.pdf"
} }
] ]
}, },
@ -655,8 +653,9 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability has been identified in CP1604 (All versions), CP1616 (All versions), SIMATIC CP343-1 Advanced (All versions), SIMATIC CP443-1 (All versions), SIMATIC CP443-1 Advanced (All versions), SIMATIC CP443-1 OPC UA (All versions), SIMATIC ET 200 SP Open Controller CPU 1515SP PC (All versions < V2.1.6), SIMATIC ET 200 SP Open Controller CPU 1515SP PC2 (All versions < V2.7), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions), SIMATIC HMI Comfort Panels 4\" - 22\" (All versions), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions), SIMATIC IPC DiagMonitor (All versions), SIMATIC RF181-EIP (All versions), SIMATIC RF182C (All versions), SIMATIC RF185C (All versions), SIMATIC RF186C (All versions), SIMATIC RF188C (All versions), SIMATIC RF600R (All versions), SIMATIC S7-1500 CPU family (All versions < V2.6.1), SIMATIC S7-1500 Software Controller (All versions < V2.7), SIMATIC S7-300 CPU family (All versions < V3.X.16), SIMATIC S7-400 PN (incl. F) V6 and below (All versions), SIMATIC S7-400 PN/DP V7 (incl. F) (All versions), SIMATIC S7-PLCSIM Advanced (All versions < V2.0 SP1 UPD1), SIMATIC Teleservice Adapter IE Advanced (All versions), SIMATIC Teleservice Adapter IE Basic (All versions), SIMATIC Teleservice Adapter IE Standard (All versions), SIMATIC WinAC RTX 2010 (All versions), SIMATIC WinCC Runtime Advanced (All versions), SIMOCODE pro V EIP (All versions), SIMOCODE pro V PN (All versions), SINAMICS G130 V4.6 (Control Unit) (All versions), SINAMICS G130 V4.7 (Control Unit) (All versions), SINAMICS G130 V4.7 SP1 (Control Unit) (All versions), SINAMICS G130 V4.8 (Control Unit) (All versions < V4.8 HF6), SINAMICS G130 V5.1 (Control Unit) (All versions), SINAMICS G130 V5.1 SP1 (Control Unit) (All versions < V5.1 SP1 HF4), SINAMICS G150 V4.6 (Control Unit) (All versions), SINAMICS G150 V4.7 (Control Unit) (All versions), SINAMICS G150 V4.7 SP1 (Control Unit) (All versions), SINAMICS G150 V4.8 (Control Unit) (All versions < V4.8 HF6), SINAMICS G150 V5.1 (Control Unit) (All versions), SINAMICS G150 V5.1 SP1 (Control Unit) (All versions < V5.1 SP1 HF4), SINAMICS S120 V4.6 (Control Unit) (All versions), SINAMICS S120 V4.7 (Control Unit) (All versions), SINAMICS S120 V4.7 SP1 (Control Unit) (All versions), SINAMICS S120 V4.8 (Control Unit) (All versions < V4.8 HF6), SINAMICS S120 V5.1 (Control Unit) (All versions), SINAMICS S120 V5.1 SP1 (Control Unit) (All versions < V5.1 SP1 HF4), SINAMICS S150 V4.6 (Control Unit) (All versions), SINAMICS S150 V4.7 (Control Unit) (All versions), SINAMICS S150 V4.7 SP1 (Control Unit) (All versions), SINAMICS S150 V4.8 (Control Unit) (All versions < V4.8 HF6), SINAMICS S150 V5.1 (Control Unit) (All versions), SINAMICS S150 V5.1 SP1 (Control Unit) (All versions < V5.1 SP1 HF4), SINAMICS S210 V5.1 (Control Unit) (All versions), SINAMICS S210 V5.1 SP1 (Control Unit) (All versions), SITOP Manager (All versions), SITOP PSU8600 (All versions), SITOP UPS1600 (All versions), TIM 1531 IRC (All versions). The webserver of the affected devices contains a vulnerability that may lead to a denial-of-service condition. An attacker may cause a denial-of-service situation which leads to a restart of the webserver of the affected device. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known." "value": "A vulnerability has been identified in CP1604 (All versions), CP1616 (All versions), SIMATIC CP343-1 Advanced (All versions), SIMATIC CP443-1 (All versions), SIMATIC CP443-1 Advanced (All versions), SIMATIC CP443-1 OPC UA (All versions), SIMATIC ET 200 SP Open Controller CPU 1515SP PC (All versions < V2.1.6), SIMATIC ET 200 SP Open Controller CPU 1515SP PC2 (All versions < V2.7), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions), SIMATIC HMI Comfort Panels 4\" - 22\" (All versions), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions), SIMATIC IPC DiagMonitor (All versions), SIMATIC RF181-EIP (All versions), SIMATIC RF182C (All versions), SIMATIC RF185C (All versions < V1.1.0), SIMATIC RF186C (All versions < V1.1.0), SIMATIC RF188C (All versions < V1.1.0), SIMATIC RF600R (All versions < V3.2.1), SIMATIC S7-1500 CPU family (All versions < V2.6.1), SIMATIC S7-1500 Software Controller (All versions < V2.7), SIMATIC S7-300 CPU family (All versions < V3.X.16), SIMATIC S7-400 PN (incl. F) V6 and below (All versions), SIMATIC S7-400 PN/DP V7 (incl. F) (All versions), SIMATIC S7-PLCSIM Advanced (All versions < V2.0 SP1 UPD1), SIMATIC Teleservice Adapter IE Advanced (All versions), SIMATIC Teleservice Adapter IE Basic (All versions), SIMATIC Teleservice Adapter IE Standard (All versions), SIMATIC WinAC RTX 2010 (All versions), SIMATIC WinCC Runtime Advanced (All versions), SIMOCODE pro V EIP (All versions), SIMOCODE pro V PN (All versions), SINAMICS G130 V4.6 (Control Unit) (All versions), SINAMICS G130 V4.7 (Control Unit) (All versions), SINAMICS G130 V4.7 SP1 (Control Unit) (All versions), SINAMICS G130 V4.8 (Control Unit) (All versions < V4.8 HF6), SINAMICS G130 V5.1 (Control Unit) (All versions), SINAMICS G130 V5.1 SP1 (Control Unit) (All versions < V5.1 SP1 HF4), SINAMICS G150 V4.6 (Control Unit) (All versions), SINAMICS G150 V4.7 (Control Unit) (All versions), SINAMICS G150 V4.7 SP1 (Control Unit) (All versions), SINAMICS G150 V4.8 (Control Unit) (All versions < V4.8 HF6), SINAMICS G150 V5.1 (Control Unit) (All versions), SINAMICS G150 V5.1 SP1 (Control Unit) (All versions < V5.1 SP1 HF4), SINAMICS S120 V4.6 (Control Unit) (All versions), SINAMICS S120 V4.7 (Control Unit) (All versions), SINAMICS S120 V4.7 SP1 (Control Unit) (All versions), SINAMICS S120 V4.8 (Control Unit) (All versions < V4.8 HF6), SINAMICS S120 V5.1 (Control Unit) (All versions), SINAMICS S120 V5.1 SP1 (Control Unit) (All versions < V5.1 SP1 HF4), SINAMICS S150 V4.6 (Control Unit) (All versions), SINAMICS S150 V4.7 (Control Unit) (All versions), SINAMICS S150 V4.7 SP1 (Control Unit) (All versions), SINAMICS S150 V4.8 (Control Unit) (All versions < V4.8 HF6), SINAMICS S150 V5.1 (Control Unit) (All versions), SINAMICS S150 V5.1 SP1 (Control Unit) (All versions < V5.1 SP1 HF4), SINAMICS S210 V5.1 (Control Unit) (All versions), SINAMICS S210 V5.1 SP1 (Control Unit) (All versions), SITOP Manager (All versions), SITOP PSU8600 (All versions), SITOP UPS1600 (All versions), TIM 1531 IRC (All versions). The webserver of the affected devices contains a vulnerability that may lead to a denial-of-service condition. An attacker may cause a denial-of-service situation which leads to a restart of the webserver of the affected device.\n\nThe security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device.\n\nAt the time of advisory publication no public exploitation of this security vulnerability was known."
} }
] ]
} }
} }

View File

@ -89,7 +89,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V1.1.0"
} }
] ]
} }
@ -99,7 +99,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V3.2.1"
} }
] ]
} }
@ -119,7 +119,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions >= V2.5" "version_value" : "All versions between V2.5 (including) and V2.7 (excluding)"
} }
] ]
} }
@ -159,7 +159,7 @@
"version" : { "version" : {
"version_data" : [ "version_data" : [
{ {
"version_value": "All versions" "version_value" : "All versions < V14 SP2"
} }
] ]
} }
@ -183,8 +183,7 @@
} }
] ]
} }
} } ]
]
} }
} }
] ]
@ -205,9 +204,8 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"refsource": "MISC", "refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-307392.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-307392.pdf"
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-307392.pdf"
} }
] ]
}, },
@ -215,7 +213,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A vulnerability has been identified in SIMATIC CP443-1 OPC UA (All versions), SIMATIC ET 200 Open Controller CPU 1515SP PC2 (All versions < V2.7), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions), SIMATIC HMI Comfort Panels 4\" - 22\" (All versions), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions), SIMATIC IPC DiagMonitor (All versions), SIMATIC NET PC Software (All versions >= V7.1), SIMATIC RF188C (All versions), SIMATIC RF600R (All versions), SIMATIC S7-1500 CPU family (All versions >= V2.5 < V2.6.1), SIMATIC S7-1500 Software Controller (All versions >= V2.5), SIMATIC WinCC OA (All versions < V3.15-P018), SIMATIC WinCC Runtime Advanced (All versions), SINEC-NMS (All versions), SINEMA Server (All versions), SINUMERIK OPC UA Server (All versions < V2.1), TeleControl Server Basic (All versions). Specially crafted network packets sent to affected devices on port 4840/tcp could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the OPC communication or crash the device. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the OPC communication. At the time of advisory publication no public exploitation of this security vulnerability was known." "value": "A vulnerability has been identified in SIMATIC CP443-1 OPC UA (All versions), SIMATIC ET 200 Open Controller CPU 1515SP PC2 (All versions < V2.7), SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (All versions), SIMATIC HMI Comfort Panels 4\" - 22\" (All versions), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions), SIMATIC IPC DiagMonitor (All versions), SIMATIC NET PC Software (All versions >= V7.1), SIMATIC RF188C (All versions < V1.1.0), SIMATIC RF600R (All versions < V3.2.1), SIMATIC S7-1500 CPU family (All versions >= V2.5 < V2.6.1), SIMATIC S7-1500 Software Controller (All versions between V2.5 (including) and V2.7 (excluding)), SIMATIC WinCC OA (All versions < V3.15-P018), SIMATIC WinCC Runtime Advanced (All versions), SINEC-NMS (All versions), SINEMA Server (All versions < V14 SP2), SINUMERIK OPC UA Server (All versions < V2.1), TeleControl Server Basic (All versions). Specially crafted network packets sent to affected devices on port 4840/tcp could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the OPC communication or crash the device.\n\nThe security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the OPC communication.\n\nAt the time of advisory publication no public exploitation of this security vulnerability was known."
} }
] ]
} }