3 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Sep 2021 — A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Received webpackets are not properly processed. An unauthenticated remote attacker with access to any of the Ethernet interfaces could send specially crafted packets to force a restart of the target device. Se ha identificado una vulnerabilidad en los relés SIPROTEC 5 con va... • https://cert-portal.siemens.com/productcert/pdf/ssa-500748.pdf • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

14 Sep 2021 — A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Specially crafted packets sent to port 4443/tcp could cause a Denial-of-Service condition. Se ha identificado una vulnerabilidad en los relés SIPROTEC 5 con variantes de CPU CP050 (Todas las versiones anteriores a V8.80), relés SIPROTEC 5 con variantes de CPU CP100 (Todas la... • https://cert-portal.siemens.com/productcert/pdf/ssa-847986.pdf • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

14 Sep 2021 — A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Specially crafted packets sent to port 4443/tcp could cause a Denial-of-Service condition or potential remote code execution. Se ha identificado una vulnerabilidad en los relés SIPROTEC 5 con variantes de CPU CP050 (Todas las versiones anteriores a V8.80), relés SIPROTEC 5 c... • https://cert-portal.siemens.com/productcert/pdf/ssa-847986.pdf • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •