
CVE-2021-42029
https://notcve.org/view.php?id=CVE-2021-42029
12 Apr 2022 — A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) V15 (All versions), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 5), SIMATIC STEP 7 (TIA Portal) V17 (All versions < V17 Update 2). An attacker could achieve privilege escalation on the web server of certain devices due to improper access control vulnerability in the engineering system software. The attacker needs to have direct access to the impacted web server. Se ha identificado una vulnerabilidad en SIMATIC STEP 7 (TIA Port... • https://cert-portal.siemens.com/productcert/pdf/ssa-350757.pdf • CWE-284: Improper Access Control •

CVE-2020-28397
https://notcve.org/view.php?id=CVE-2020-28397
10 Aug 2021 — A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V21.9), SIMATIC S7 PLCSIM Advanced (All versions > V2 < V4), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (Version V4.4), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions > V2.5 < V2.9.2), SIMATIC S7-1500 Software Controller (All versions > V2.5 < V21.9), TIM 1531 IRC (incl. SIPLUS ... • https://cert-portal.siemens.com/productcert/pdf/ssa-865327.pdf • CWE-863: Incorrect Authorization •

CVE-2019-19300
https://notcve.org/view.php?id=CVE-2019-19300
14 Apr 2020 — A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, KTK ATE530S, SIDOOR ATD430W, SIDOOR ATE530S COATED, SIDOOR ATE531S, SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0), SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0), SIMATIC ET 200pro IM 154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM 154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM 154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), S... • https://cert-portal.siemens.com/productcert/html/ssa-593272.html • CWE-400: Uncontrolled Resource Consumption •

CVE-2019-19281
https://notcve.org/view.php?id=CVE-2019-19281
10 Mar 2020 — A vulnerability has been identified in SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions >= V2.5 and < V20.8), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.5 and < V2.8), SIMATIC S7-1500 Software Controller (All versions >= V2.5 and < V20.8). Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a Denial-of-Service condition. The vulnerability can be triggered if specially crafted UDP p... • https://cert-portal.siemens.com/productcert/pdf/ssa-750824.pdf • CWE-400: Uncontrolled Resource Consumption •

CVE-2016-2200
https://notcve.org/view.php?id=CVE-2016-2200
08 Feb 2016 — Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service (STOP mode transition) via crafted packets on TCP port 102. Dispositivos Siemens SIMATIC S7-1500 CPU en versiones anteriores a 1.8.3 permiten a atacantes remotos causar una denegación de servicio (transición al modo STOP) a través de paquetes manipulados sobre el puerto 102 TCP. • http://www.securityfocus.com/bid/83106 • CWE-20: Improper Input Validation •

CVE-2016-2201
https://notcve.org/view.php?id=CVE-2016-2201
08 Feb 2016 — Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102. Dispositivos Siemens SIMATIC S7-1500 CPU en versiones anteriores a 1.8.3 permiten a atacantes remotos eludir el mecanismo de protección de repetición a través de paquetes manipulados sobre el puerto 102 TCP. • http://www.securityfocus.com/bid/83110 • CWE-20: Improper Input Validation •

CVE-2014-5074 – Siemens SIMATIC S7-1500 CPU - Remote Denial of Service
https://notcve.org/view.php?id=CVE-2014-5074
17 Aug 2014 — Siemens SIMATIC S7-1500 CPU devices with firmware before 1.6 allow remote attackers to cause a denial of service (device restart and STOP transition) via crafted TCP packets. Los dispositivos Siemens SIMATIC S7-1500 CPU con firmware anterior a 1.6 permiten a atacantes remotos causar una denegación de servicio (reinicio de dispositivos y transición STOP) a través de paquetes TCP manipulados. • https://www.exploit-db.com/exploits/44693 •