31 results (0.003 seconds)

CVSS: 6.9EPSS: 0%CPEs: 82EXPL: 0

The web server of affected devices do not properly authenticate user request to the '/ClientArea/RuntimeInfoData.mwsl' endpoint. This could allow an unauthenticated remote attacker to gain knowledge about current actual and configured maximum cycle times as well as about configured maximum communication load. • https://cert-portal.siemens.com/productcert/html/ssa-054046.html • CWE-288: Authentication Bypass Using an Alternate Path or Channel •

CVSS: 5.1EPSS: 0%CPEs: 141EXPL: 0

The web server of affected devices does not properly validate input that is used for a user redirection. This could allow an attacker to make the server redirect the legitimate user to an attacker-chosen URL. For a successful exploit, the legitimate user must actively click on an attacker-crafted link. • https://cert-portal.siemens.com/productcert/html/ssa-876787.html • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 7.5EPSS: 0%CPEs: 152EXPL: 0

Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a denial of service condition. A restart is needed to restore normal operations. Los dispositivos afectados manejan incorrectamente paquetes especialmente manipulados enviados al puerto 102/tcp. Esto podría permitir que un atacante cree una condición de denegación de servicio. Es necesario reiniciar para restaurar las operaciones normales. • https://cert-portal.siemens.com/productcert/html/ssa-280603.html https://cert-portal.siemens.com/productcert/html/ssa-592380.html https://cert-portal.siemens.com/productcert/pdf/ssa-280603.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-592380.pdf • CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 158EXPL: 0

The OPC UA implementations (ANSI C and C++) in affected products contain an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation. This could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate. Las implementaciones de OPC UA (ANSI C y C++) en los productos afectados contienen una vulnerabilidad de desbordamiento de enteros que podría provocar que la aplicación se ejecute en un bucle infinito durante la validación del certificado. Esto podría permitir que un atacante remoto no autenticado cree una condición de denegación de servicio enviando un certificado especialmente manipulado. • https://cert-portal.siemens.com/productcert/html/ssa-118850.html https://cert-portal.siemens.com/productcert/html/ssa-711309.html https://cert-portal.siemens.com/productcert/pdf/ssa-118850.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-711309.pdf • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.5EPSS: 0%CPEs: 48EXPL: 0

A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 (All versions), SIMATIC CP 1542SP-1 IRC (All versions), SIMATIC CP 1543SP-1 (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions), SIPLUS TIM 1531 IRC (All versions < V2.3.6), TIM 1531 IRC (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product. • https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf https://cert-portal.siemens.com/productcert/html/ssa-139628.html https://cert-portal.siemens.com/productcert/html/ssa-566905.html • CWE-770: Allocation of Resources Without Limits or Throttling •