2022-04-12
|
CVE-2022-25622
|
The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.
This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments.
|
Simatic_cfu_diq_firmware, Simatic_cfu_pa_firmware, Simatic_s7\-1500_cpu_firmware, Simatic_s7\-300_cpu_firmware, Simatic_s7\-400_pn\/dp_v7_firmware, Simatic_s7\-400h_v6_firmware, Simatic_s7\-410_v10_firmware, Simatic_s7\-410_v8_firmware, Simatic_tdc_cp51m1_firmware, Simatic_tdc_cpu555_firmware, Simatic_winac_rtx_firmware, Simit_simulation_platform
|
7.5
|
|
|
2019-10-10
|
CVE-2019-10936
|
Affected devices improperly handle large amounts of specially crafted UDP packets.
This could allow an unauthenticated remote attacker to trigger a denial of service condition.
|
Dk_standard_ethernet_controller_firmware, Ek\-Ertec_200_firmware, Ek\-Ertec_200p_firmware, Simatic_cfu_pa_firmware, Simatic_et_200al_firmware, Simatic_et_200ecopn_firmware, Simatic_et_200m_firmware, Simatic_et_200mp_im_155\-5_pn_ba_firmware, Simatic_et_200mp_im_155\-5_pn_hf_firmware, Simatic_et_200mp_im_155\-5_pn_st_firmware, Simatic_et_200pro_firmware, Simatic_et_200s_firmware, Simatic_et_200sp_im_155\-6_pn\/2_hf_firmware, Simatic_et_200sp_im_155\-6_pn\/3_hf_firmware, Simatic_et_200sp_im_155\-6_pn_ba_firmware, Simatic_et_200sp_im_155\-6_pn_ha_firmware, Simatic_et_200sp_im_155\-6_pn_hf_firmware, Simatic_et_200sp_im_155\-6_pn_hs_firmware, Simatic_et_200sp_im_155\-6_pn_st_firmware, Simatic_hmi_comfort_outdoor_panels_15\"_firmware, Simatic_hmi_comfort_outdoor_panels_7\"_firmware, Simatic_hmi_comfort_panels_22\"_firmware, Simatic_hmi_comfort_panels_4\"_firmware, Simatic_hmi_ktp_mobile_panels_firmware, Simatic_pn\/pn_coupler_firmware, Simatic_profinet_driver_firmware, Simatic_s7\-1200_cpu_1211c_firmware, Simatic_s7\-1200_cpu_1212c_firmware, Simatic_s7\-1200_cpu_1214c_firmware, Simatic_s7\-1200_cpu_firmware, Simatic_s7\-1500_cpu_1511c_firmware, Simatic_s7\-1500_cpu_1512c_firmware, Simatic_s7\-1500_cpu_1518_firmware, Simatic_s7\-1500_cpu_firmware, Simatic_s7\-1500s_cpu_firmware, Simatic_s7\-1500t_cpu_firmware, Simatic_s7\-300_cpu_312_ifm_firmware, Simatic_s7\-300_cpu_313_firmware, Simatic_s7\-300_cpu_314_firmware, Simatic_s7\-300_cpu_314_ifm_firmware, Simatic_s7\-300_cpu_315\-2_dp_firmware, Simatic_s7\-300_cpu_315_firmware, Simatic_s7\-300_cpu_316\-2_dp_firmware, Simatic_s7\-300_cpu_318\-2_firmware, Simatic_s7\-300_cpu_firmware, Simatic_s7\-400_dp_v7_firmware, Simatic_s7\-400_pn_v7_firmware, Simatic_s7\-400_v6_firmware, Simatic_s7\-400h_v6_firmware, Simatic_s7\-410_v8_firmware, Simatic_winac_rtx_\(F\)_firmware, Sinamics_dcm_firmware, Sinamics_dcp_firmware, Sinamics_g110m_firmware, Sinamics_g120_firmware, Sinamics_g130_firmware, Sinamics_g150_firmware, Sinamics_gl150_firmware, Sinamics_gm150_firmware, Sinamics_s110_firmware, Sinamics_s120_firmware, Sinamics_s150_firmware, Sinamics_sl150_firmware, Sinamics_sm120_firmware, Sinumerik_828d, Sinumerik_840d_sl
|
7.5
|
|
|
2016-02-08
|
CVE-2016-2201
|
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.
|
Simatic_s7\-1500_cpu_firmware
|
5.3
|
|
|
2016-02-08
|
CVE-2016-2200
|
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service (STOP mode transition) via crafted packets on TCP port 102.
|
Simatic_s7\-1500_cpu_firmware
|
7.5
|
|
|