Page 3 of 13 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 21EXPL: 0

A vulnerability has been identified in SIMATIC S7-300 CPU family (All versions), SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 V6 and earlier CPU family (All versions), SIMATIC S7-400 V7 CPU family (All versions). Specially crafted packets sent to port 80/tcp could cause the affected devices to go into defect mode. A cold restart is required to recover the system. • http://www.securityfocus.com/bid/94820 http://www.securitytracker.com/id/1037434 https://cert-portal.siemens.com/productcert/pdf/ssa-731239.pdf https://ics-cert.us-cert.gov/advisories/ICSA-16-348-05 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-731239.pdf • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

Siemens SIMATIC S7-400 PN CPU devices with firmware 6 before 6.0.3 allow remote attackers to cause a denial of service (defect-mode transition and service outage) via crafted ICMP packets. Dispositivos Siemens SIMATIC S7-400 PN CPU con el firmware v6 anterior a v6.0.3 permite a atacantes remotos causar una denegación de servicio (interrupción del servicio) a través de paquetes ICMP especialmente diseñados. • http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-589272.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-02.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-589272.pdf •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

Siemens SIMATIC S7-400 PN CPU devices with firmware 5.x allow remote attackers to cause a denial of service (defect-mode transition and service outage) via (1) malformed HTTP traffic or (2) malformed IP packets. Dispositivos Siemens SIMATIC S7-400 PN CPU con firmware v5.x, permite a atacantes remotos provocar una denegación de servicio (modo de transición por defecto e interrupción del servicio) a través de (1) tráfico HTTP mal formado o (2) paquetes IP mal formados • http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-617264.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-02.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-617264.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •