2019-10-10
|
CVE-2019-10923
|
An attacker with network access to an affected product may cause a denial of service condition by breaking the real-time synchronization (IRT) of the affected installation.
|
Cp1604_firmware, Cp1616_firmware, Dk_standard_ethernet_controller_firmware, Ek\-Ertec_200_firmware, Ek\-Ertec_200p_firmware, Scalance_x\-200irt_firmware, Simatic_et_200ecopn_firmware, Simatic_et_200m_firmware, Simatic_et_200s_firmware, Simatic_pn\/pn_coupler_6es7158\-3ad01\-0xa0_firmware, Simatic_s7\-300_cpu_312_ifm_firmware, Simatic_s7\-300_cpu_313_firmware, Simatic_s7\-300_cpu_314_firmware, Simatic_s7\-300_cpu_314_ifm_firmware, Simatic_s7\-300_cpu_315\-2_dp_firmware, Simatic_s7\-300_cpu_315_firmware, Simatic_s7\-300_cpu_316\-2_dp_firmware, Simatic_s7\-300_cpu_318\-2_firmware, Simatic_s7\-300_cpu_firmware, Simatic_s7\-400_dp_v7_firmware, Simatic_s7\-400_pn_v7_firmware, Simatic_s7\-400_v6_firmware, Simatic_winac_rtx_\(F\)_firmware, Simotion_firmware, Sinamics_dcm_firmware, Sinamics_dcp_firmware, Sinamics_g110m_firmware, Sinamics_g120_firmware, Sinamics_g130_firmware, Sinamics_g150_firmware, Sinamics_gh150_firmware, Sinamics_gl150_firmware, Sinamics_gm150_firmware, Sinamics_s110_firmware, Sinamics_s120_firmware, Sinamics_s150_firmware, Sinamics_sl150_firmware, Sinamics_sm120_firmware, Sinumerik_828d, Sinumerik_840d_sl
|
7.5
|
|
|
2019-10-10
|
CVE-2019-10936
|
Affected devices improperly handle large amounts of specially crafted UDP packets.
This could allow an unauthenticated remote attacker to trigger a denial of service condition.
|
Dk_standard_ethernet_controller_firmware, Ek\-Ertec_200_firmware, Ek\-Ertec_200p_firmware, Simatic_cfu_pa_firmware, Simatic_et_200al_firmware, Simatic_et_200ecopn_firmware, Simatic_et_200m_firmware, Simatic_et_200mp_im_155\-5_pn_ba_firmware, Simatic_et_200mp_im_155\-5_pn_hf_firmware, Simatic_et_200mp_im_155\-5_pn_st_firmware, Simatic_et_200pro_firmware, Simatic_et_200s_firmware, Simatic_et_200sp_im_155\-6_pn\/2_hf_firmware, Simatic_et_200sp_im_155\-6_pn\/3_hf_firmware, Simatic_et_200sp_im_155\-6_pn_ba_firmware, Simatic_et_200sp_im_155\-6_pn_ha_firmware, Simatic_et_200sp_im_155\-6_pn_hf_firmware, Simatic_et_200sp_im_155\-6_pn_hs_firmware, Simatic_et_200sp_im_155\-6_pn_st_firmware, Simatic_hmi_comfort_outdoor_panels_15\"_firmware, Simatic_hmi_comfort_outdoor_panels_7\"_firmware, Simatic_hmi_comfort_panels_22\"_firmware, Simatic_hmi_comfort_panels_4\"_firmware, Simatic_hmi_ktp_mobile_panels_firmware, Simatic_pn\/pn_coupler_firmware, Simatic_profinet_driver_firmware, Simatic_s7\-1200_cpu_1211c_firmware, Simatic_s7\-1200_cpu_1212c_firmware, Simatic_s7\-1200_cpu_1214c_firmware, Simatic_s7\-1200_cpu_firmware, Simatic_s7\-1500_cpu_1511c_firmware, Simatic_s7\-1500_cpu_1512c_firmware, Simatic_s7\-1500_cpu_1518_firmware, Simatic_s7\-1500_cpu_firmware, Simatic_s7\-1500s_cpu_firmware, Simatic_s7\-1500t_cpu_firmware, Simatic_s7\-300_cpu_312_ifm_firmware, Simatic_s7\-300_cpu_313_firmware, Simatic_s7\-300_cpu_314_firmware, Simatic_s7\-300_cpu_314_ifm_firmware, Simatic_s7\-300_cpu_315\-2_dp_firmware, Simatic_s7\-300_cpu_315_firmware, Simatic_s7\-300_cpu_316\-2_dp_firmware, Simatic_s7\-300_cpu_318\-2_firmware, Simatic_s7\-300_cpu_firmware, Simatic_s7\-400_dp_v7_firmware, Simatic_s7\-400_pn_v7_firmware, Simatic_s7\-400_v6_firmware, Simatic_s7\-400h_v6_firmware, Simatic_s7\-410_v8_firmware, Simatic_winac_rtx_\(F\)_firmware, Sinamics_dcm_firmware, Sinamics_dcp_firmware, Sinamics_g110m_firmware, Sinamics_g120_firmware, Sinamics_g130_firmware, Sinamics_g150_firmware, Sinamics_gl150_firmware, Sinamics_gm150_firmware, Sinamics_s110_firmware, Sinamics_s120_firmware, Sinamics_s150_firmware, Sinamics_sl150_firmware, Sinamics_sm120_firmware, Sinumerik_828d, Sinumerik_840d_sl
|
7.5
|
|
|
2020-02-11
|
CVE-2019-13946
|
Profinet-IO (PNIO) stack versions prior V06.00 do not properly limit
internal resource allocation when multiple legitimate diagnostic package
requests are sent to the DCE-RPC interface.
This could lead to a denial of service condition due to lack of memory
for devices that include a vulnerable version of the stack.
The security vulnerability could be exploited by an attacker with network
access to an affected device. Successful exploitation requires no system
privileges and no user...
|
Dk_standard_ethernet_controller, Ek\-Ertec_200_firmware, Ek\-Ertec_200p_firmware, Im_154\-3_pn_hf_firmware, Im_154\-4_pn_hf_firmware, Profinet_driver, Ruggedcom_rm1224_firmware, Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_w700_ieee_802\.11n_firmware, Scalance_x\-200irt_firmware, Scalance_x\-300_firmware, Scalance_x\-400_firmware, Scalance_xb\-200_firmware, Scalance_xc\-200_firmware, Scalance_xf\-200_firmware, Scalance_xf\-200ba_firmware, Scalance_xm\-400_firmware, Scalance_xp\-200_firmware, Scalance_xr524_firmware, Scalance_xr526_firmware, Scalance_xr528_firmware, Scalance_xr552_firmware, Scalance_xr\-300wg_firmware, Simatic_cp_1604_firmware, Simatic_cp_1616_firmware, Simatic_cp_343\-1_advanced_firmware, Simatic_cp_343\-1_erpc_firmware, Simatic_cp_343\-1_firmware, Simatic_cp_343\-1_lean_firmware, Simatic_cp_443\-1_advanced_firmware, Simatic_cp_443\-1_firmware, Simatic_cp_443\-1_opc_ua_firmware, Simatic_et200al_im_157\-1_pn_firmware, Simatic_et200ecopn_firmware, Simatic_et200m_im153\-4_pn_io_hf_firmware, Simatic_et200m_im153\-4_pn_io_st_firmware, Simatic_et200mp_im155\-5_pn_hf_firmware, Simatic_et200mp_im155\-5_pn_st_firmware, Simatic_et200pro_firmware, Simatic_et200s_firmware, Simatic_et200sp_im155\-6_pn_basic_firmware, Simatic_et200sp_im155\-6_pn_hf_firmware, Simatic_et200sp_im155\-6_pn_st_firmware, Simatic_ipc_support, Simatic_mv420_firmware, Simatic_mv440_firmware, Simatic_pn\/pn_coupler_firmware, Simatic_rf180c_firmware, Simatic_rf182c_firmware, Simatic_rf600_firmware, Sinamics_dcp_firmware
|
7.5
|
|
|