6 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 128EXPL: 0

A vulnerability has been identified in SIPROTEC 5 6MD85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD89 (CP300) (All versions >= V7.80 < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7KE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.40), SIPROTEC 5 7SA86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.40), SIPROTEC 5 7SD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.40), SIPROTEC 5 7SK85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.40), SIPROTEC 5 7SL86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SS85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7ST85 (CP300) (All versions >= V7.80 < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SX82 (CP150) (All versions < V9.40), SIPROTEC 5 7SX85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UM85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.40), SIPROTEC 5 7UT85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VK87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V9.40 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V9.40 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.40), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.40). Affected devices lack proper validation of http request parameters of the hosted web service. An unauthenticated remote attacker could send specially crafted packets that could cause denial of service condition of the target device. Se ha identificado una vulnerabilidad en SIPROTEC 5 6MD85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 6MD86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 6MD89 ( CP300) (Todas las versiones &gt;= V7.80 &lt; V9.60), SIPROTEC 5 6MU85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7KE85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SA82 (CP100) (Todas las versiones), SIPROTEC 5 7SA82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SA86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40 ), SIPROTEC 5 7SA87 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SD82 (CP100) (Todas las versiones), SIPROTEC 5 7SD82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SD86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SD87 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SJ81 (CP100) (Todas las versiones), SIPROTEC 5 7SJ81 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SJ82 (CP100) (Todas las versiones), SIPROTEC 5 7SJ82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SJ85 (CP300) (Todas las versiones &gt; = V7.80 &lt; V9.40), SIPROTEC 5 7SJ86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SK82 (CP100) (Todas las versiones), SIPROTEC 5 7SK82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SK85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SL82 (CP100) (Todas las versiones), SIPROTEC 5 7SL82 (CP150) (Todas las versiones &lt; V9.40 ), SIPROTEC 5 7SL86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SL87 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7SS85 (CP300) (Todas versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7ST85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.60), SIPROTEC 5 7ST86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40 ), SIPROTEC 5 7SX82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7SX85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7UM85 (CP300) (Todas las versiones &gt;= V7. 80 &lt; V9.40), SIPROTEC 5 7UT82 (CP100) (Todas las versiones), SIPROTEC 5 7UT82 (CP150) (Todas las versiones &lt; V9.40), SIPROTEC 5 7UT85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9. 40), SIPROTEC 5 7UT86 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7UT87 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7VE85 (CP300) ( Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7VK87 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9.40), SIPROTEC 5 7VU85 (CP300) (Todas las versiones &gt;= V7.80 &lt; V9. 40), SIPROTEC 5 Communication Module ETH-BA-2EL (todas las versiones &lt; V9.40), SIPROTEC 5 Communication Module ETH-BB-2FO (todas las versiones &lt; V9.40), SIPROTEC 5 Communication Module ETH-BD-2FO (todas versiones &lt; V9.40), SIPROTEC 5 Compact 7SX800 (CP050) (Todas las versiones &lt; V9.40). Los dispositivos afectados carecen de una validación adecuada de los parámetros de solicitud http del servicio web alojado. Un atacante remoto no autenticado podría enviar paquetes especialmente manipulados que podrían provocar una condición de denegación de servicio del dispositivo objetivo. • https://cert-portal.siemens.com/productcert/html/ssa-322980.html https://cert-portal.siemens.com/productcert/pdf/ssa-322980.pdf • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 120EXPL: 0

A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.50), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.50), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.50), SIPROTEC 5 6MD89 (CP300) (All versions < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions < V9.50), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V9.64), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.50), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.50), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.50), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.50), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.50), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.50), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.50), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.50), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.50), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.50), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.50), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.50), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.50), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.50), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.50), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.50), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions < V9.64), SIPROTEC 5 7SX82 (CP150) (All versions < V9.50), SIPROTEC 5 7SX85 (CP300) (All versions < V9.50), SIPROTEC 5 7UM85 (CP300) (All versions < V9.50), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.50), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.50), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.50), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.50), SIPROTEC 5 7VE85 (CP300) (All versions < V9.50), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.50), SIPROTEC 5 7VU85 (CP300) (All versions < V9.50), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V9.50 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V9.50 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.50), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.50). Affected devices do not properly restrict secure client-initiated renegotiations within the SSL and TLS protocols. This could allow an attacker to create a denial of service condition on the ports 443/tcp and 4443/tcp for the duration of the attack. Se ha identificado una vulnerabilidad en SIPROTEC 5 6MD84 (CP300) (versiones &lt; V9.50), SIPROTEC 5 6MD85 (CP200) (Todas las versiones), SIPROTEC 5 6MD85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 6MD86 (CP200) (Todas las versiones), SIPROTEC 5 6MD86 (CP300) (versiones &lt; V9.50), SIPROTEC 5 6MD89 (CP300) (versiones &lt; V9.60), SIPROTEC 5 6MU85 (CP300) (versiones &lt; V9. 50), SIPROTEC 5 7KE85 (CP200) (Todas las versiones), SIPROTEC 5 7KE85 (CP300) (versiones &lt; V9.60), SIPROTEC 5 7SA82 (CP100) (Todas las versiones), SIPROTEC 5 7SA82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SA84 (CP200) (Todas las versiones), SIPROTEC 5 7SA86 (CP200) (Todas las versiones), SIPROTEC 5 7SA86 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SA87 (CP200) (Todas las versiones), SIPROTEC 5 7SA87 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SD82 (CP100) (Todas las versiones), SIPROTEC 5 7SD82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SD84 (CP200) (Todas las versiones), SIPROTEC 5 7SD86 (CP200) (Todas las versiones), SIPROTEC 5 7SD86 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SD87 (CP200) (Todas las versiones), SIPROTEC 5 7SD87 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SJ81 (CP100) (Todas las versiones), SIPROTEC 5 7SJ81 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SJ82 (CP100) (Todas las versiones), SIPROTEC 5 7SJ82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SJ85 (CP200) (Todas las versiones), SIPROTEC 5 7SJ85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SJ86 (CP200) (Todas las versiones), SIPROTEC 5 7SJ86 ( CP300) (versiones &lt; V9.50), SIPROTEC 5 7SK82 (CP100) (Todas las versiones), SIPROTEC 5 7SK82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SK85 (CP200) (Todas las versiones), SIPROTEC 5 7SK85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SL82 (CP100) (Todas las versiones), SIPROTEC 5 7SL82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SL86 (CP200) (Todas las versiones), SIPROTEC 5 7SL86 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SL87 (CP200) (Todas las versiones), SIPROTEC 5 7SL87 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7SS85 (CP200) (Todas las versiones), SIPROTEC 5 7SS85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7ST85 (CP200) (Todas las versiones), SIPROTEC 5 7ST85 (CP300) (versiones &lt; V9.60), SIPROTEC 5 7ST86 (CP300) (versiones &lt; V9.60), SIPROTEC 5 7SX82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7SX85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7UM85 (CP300) (versiones &lt; V9. 50), SIPROTEC 5 7UT82 (CP100) (Todas las versiones), SIPROTEC 5 7UT82 (CP150) (versiones &lt; V9.50), SIPROTEC 5 7UT85 (CP200) (Todas las versiones), SIPROTEC 5 7UT85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7UT86 (CP200) (Todas las versiones), SIPROTEC 5 7UT86 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7UT87 (CP200) (Todas las versiones), SIPROTEC 5 7UT87 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7VE85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7VK87 (CP200) (Todas las versiones), SIPROTEC 5 7VK87 (CP300) (versiones &lt; V9.50), SIPROTEC 5 7VU85 (CP300) (versiones &lt; V9.50), SIPROTEC 5 Communication Module ETH-BA-2EL (versiones &lt; V9.50 instaladas en dispositivos CP150 y CP300), SIPROTEC 5 Communication Module ETH-BA-2EL (Todas las versiones instaladas en dispositivos CP100 y CP200), SIPROTEC 5 Communication Module ETH-BB-2FO (versiones &lt; V9.50 instaladas en dispositivos CP150 y CP300), SIPROTEC 5 Communication Module ETH-BB-2FO (Todas las versiones instaladas en dispositivos CP100 y CP200) , SIPROTEC 5 Communication Module ETH-BD-2FO (versiones &lt; V9.50), SIPROTEC 5 Compact 7SX800 (CP050) (versiones &lt; V9.50). Los dispositivos afectados no restringen adecuadamente las renegociaciones seguras iniciadas por el cliente dentro de los protocolos SSL y TLS. Esto podría permitir a un atacante crear una condición de denegación de servicio en los puertos 443/tcp y 4443/tcp mientras dure el ataque. • https://cert-portal.siemens.com/productcert/html/ssa-552874.html https://cert-portal.siemens.com/productcert/pdf/ssa-552874.pdf • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 0%CPEs: 62EXPL: 0

A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MU85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7KE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SA86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ81 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SK82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SK85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SL86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SS85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7ST85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SX85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UM85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7UT85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VK87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 Compact 7SX800 devices (CPU variant CP050) (All versions < V8.83). An improper input validation vulnerability in the web server could allow an unauthenticated user to access device information. Se ha identificado una vulnerabilidad en los dispositivos SIPROTEC 5 6MD85 (variante de CPU CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 6MD86 (variante de CPU CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 6MD89 (variante de CPU CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 6MU85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7KE85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SA82 (CPU variante CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SA86 (CPU variante CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 7SA87 (variante CPU CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SD82 (variante CPU CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SD86 (variante CPU CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SD87 (variante CPU CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 7SJ81 (variante CPU CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SJ82 (variante CPU CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SJ85 (variante CPU CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SJ86 (variante CPU CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 7SK82 (CPU variante CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SK85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SL82 (CPU variante CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SL86 (CPU variante CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 7SL87 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SS85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7ST85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SX85 (CPU variante CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 7UM85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7UT82 (CPU variante CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7UT85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7UT86 (CPU variante CP300) (Todas las versiones anteriores a V8. 83), dispositivos SIPROTEC 5 7UT87 (variante de CPU CP300) (Todas las versiones anteriores a V8.83), dispositivos SIPROTEC 5 7VE85 (variante de CPU CP300) (Todas las versiones anteriores a V8.83), dispositivos SIPROTEC 5 7VK87 (variante de CPU CP300) (Todas las versiones anteriores a V8.83), dispositivos SIPROTEC 5 Compact 7SX800 (variante de CPU CP050) (Todas las versiones anteriores a V8.83). Una vulnerabilidad de comprobación de entrada inapropiada en el servidor web podría permitir a un usuario no autentificado acceder a la información del dispositivo • https://cert-portal.siemens.com/productcert/pdf/ssa-439673.pdf • CWE-20: Improper Input Validation •

CVSS: 5.9EPSS: 0%CPEs: 34EXPL: 0

A vulnerability has been identified in Firmware variant IEC 61850 for EN100 Ethernet module (All versions < V4.35), Firmware variant MODBUS TCP for EN100 Ethernet module (All versions), Firmware variant DNP3 TCP for EN100 Ethernet module (All versions), Firmware variant IEC104 for EN100 Ethernet module (All versions), Firmware variant Profinet IO for EN100 Ethernet module (All versions), SIPROTEC 5 relays with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.82), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions < V7.58). Specially crafted packets to port 102/tcp could cause a denial-of-service condition in the affected products. A manual restart is required to recover the EN100 module functionality of the affected devices. Successful exploitation requires an attacker with network access to send multiple packets to the affected products or modules. As a precondition the IEC 61850-MMS communication needs to be activated on the affected products or modules. • https://cert-portal.siemens.com/productcert/pdf/ssa-104088.pdf •

CVSS: 7.8EPSS: 0%CPEs: 33EXPL: 0

A vulnerability has been identified in Firmware variant IEC 61850 for EN100 Ethernet module (All versions < V4.33), Firmware variant PROFINET IO for EN100 Ethernet module (All versions), Firmware variant Modbus TCP for EN100 Ethernet module (All versions), Firmware variant DNP3 TCP for EN100 Ethernet module (All versions), Firmware variant IEC104 for EN100 Ethernet module (All versions < V1.22), SIPROTEC 5 relays with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.80), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions < V7.58). Specially crafted packets to port 102/tcp could cause a denial-of-service condition in the affected products. A manual restart is required to recover the EN100 module functionality of the affected devices. Successful exploitation requires an attacker with network access to send multiple packets to the affected products or modules. As a precondition the IEC 61850-MMS communication needs to be activated on the affected products or modules. • https://cert-portal.siemens.com/productcert/pdf/ssa-325546.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-635129.pdf https://www.securityfocus.com/bid/106221 • CWE-20: Improper Input Validation •