Note:
This project will be discontinued after December 13, 2021. [more]
Product:
6ed1052\-1cc01\-0ba8_firmware
(Siemens)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-04-17 | CVE-2019-10953 | ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple versions. Researchers have found some controllers are susceptible to a denial-of-service attack due to a flood of network packets. | Pm554\-Tp\-Eth_firmware, Ilc_151_eth_firmware, Modicon_m221_firmware, 6ed1052\-1cc01\-0ba8_firmware, 6es7211\-1ae40\-0xb0_firmware, 6es7314\-6eh04\-0ab0_firmware, Bacnet\/ip_firmware, Ethernet_firmware, Knx_ip_firmware, Pfc100_firmware | 7.5 | ||
2019-06-12 | CVE-2019-6584 | A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version < V1.82.02). The integrated webserver does not invalidate the Session ID upon user logout. An attacker that successfully extracted a valid Session ID is able to use it even after the user logs out. The security vulnerability could be exploited by an attacker in a privileged network position who is able... | 6ed1052\-1cc01\-0ba8_firmware, 6ed1052\-1cc08\-0ba0_firmware, 6ed1052\-1fb00\-0ba8_firmware, 6ed1052\-1fb08\-0ba0_firmware, 6ed1052\-1hb00\-0ba8_firmware, 6ed1052\-1hb08\-0ba0_firmware, 6ed1052\-1md00\-0ba8_firmware, 6ed1052\-1md08\-0ba0_firmware, 6ed1052\-2cc01\-0ba8_firmware, 6ed1052\-2cc08\-0ba0_firmware, 6ed1052\-2fb00\-0ba8_firmware, 6ed1052\-2fb08\-0ba0_firmware, 6ed1052\-2hb00\-0ba8_firmware, 6ed1052\-2hb08\-0ba0_firmware, 6ed1052\-2md00\-0ba8_firmware, 6ed1052\-2md08\-0ba0_firmware | 7.5 | ||
2019-06-12 | CVE-2019-6571 | A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version < V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction... | 6ed1052\-1cc01\-0ba8_firmware, 6ed1052\-1cc08\-0ba0_firmware, 6ed1052\-1fb00\-0ba8_firmware, 6ed1052\-1fb08\-0ba0_firmware, 6ed1052\-1hb00\-0ba8_firmware, 6ed1052\-1hb08\-0ba0_firmware, 6ed1052\-1md00\-0ba8_firmware, 6ed1052\-1md08\-0ba0_firmware, 6ed1052\-2cc01\-0ba8_firmware, 6ed1052\-2cc08\-0ba0_firmware, 6ed1052\-2fb00\-0ba8_firmware, 6ed1052\-2fb08\-0ba0_firmware, 6ed1052\-2hb00\-0ba8_firmware, 6ed1052\-2hb08\-0ba0_firmware, 6ed1052\-2md00\-0ba8_firmware, 6ed1052\-2md08\-0ba0_firmware | 7.5 |