Page 3 of 14 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 78EXPL: 0

A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) V15 (All versions), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 5), SIMATIC STEP 7 (TIA Portal) V17 (All versions < V17 Update 2). An attacker could achieve privilege escalation on the web server of certain devices due to improper access control vulnerability in the engineering system software. The attacker needs to have direct access to the impacted web server. Se ha identificado una vulnerabilidad en SIMATIC STEP 7 (TIA Portal) versión V15 (Todas las versiones), SIMATIC STEP 7 (TIA Portal) versión V16 (todas las versiones anteriores a versión V16 Update 5), SIMATIC STEP 7 (TIA Portal) versión V17 (todas las versiones anteriores a versión V17 Update 2). Un atacante podría lograr una escalada de privilegios en el servidor web de determinados dispositivos debido a una vulnerabilidad de control de acceso inapropiada en el software del sistema de ingeniería. • https://cert-portal.siemens.com/productcert/pdf/ssa-350757.pdf • CWE-284: Improper Access Control •

CVSS: 5.3EPSS: 0%CPEs: 119EXPL: 0

A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V21.9), SIMATIC S7 PLCSIM Advanced (All versions > V2 < V4), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (Version V4.4), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions > V2.5 < V2.9.2), SIMATIC S7-1500 Software Controller (All versions > V2.5 < V21.9), TIM 1531 IRC (incl. SIPLUS NET variants) (Version V2.1). Due to an incorrect authorization check in the affected component, an attacker could extract information about access protected PLC program variables over port 102/tcp from an affected device when reading multiple attributes at once. • https://cert-portal.siemens.com/productcert/pdf/ssa-865327.pdf • CWE-863: Incorrect Authorization •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service (STOP mode transition) via crafted packets on TCP port 102. Dispositivos Siemens SIMATIC S7-1500 CPU en versiones anteriores a 1.8.3 permiten a atacantes remotos causar una denegación de servicio (transición al modo STOP) a través de paquetes manipulados sobre el puerto 102 TCP. • http://www.securityfocus.com/bid/83106 http://www.securitytracker.com/id/1034954 http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02 • CWE-20: Improper Input Validation •

CVSS: 5.3EPSS: 0%CPEs: 15EXPL: 0

Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102. Dispositivos Siemens SIMATIC S7-1500 CPU en versiones anteriores a 1.8.3 permiten a atacantes remotos eludir el mecanismo de protección de repetición a través de paquetes manipulados sobre el puerto 102 TCP. • http://www.securityfocus.com/bid/83110 http://www.securitytracker.com/id/1034954 http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02 • CWE-20: Improper Input Validation •