2017-05-11
|
CVE-2017-2680
|
Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected.
|
Dk_standard_ethernet_controller_firmware, Ek\-Ertec_200_pn_io_firmware, Ek\-Ertec_200p_pn_io_firmware, Extension_unit_12_profinet_firmware, Extension_unit_15_profinet_firmware, Extension_unit_19_profinet_firmware, Extension_unit_22_profinet_firmware, Ie\/as\-I_link_pn_io_firmware, Ie\/pb\-Link_firmware, Pn\/pn_coupler_firmware, Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_w700_firmware, Scalance_x200_firmware, Scalance_x200_irt_firmware, Scalance_x300_firmware, Scalance_x408_firmware, Scalance_x414_firmware, Scalance_xm400_firmware, Scalance_xr500_firmware, Simatic_cm_1542\-1_firmware, Simatic_cp_1242\-7_gprs_firmware, Simatic_cp_1243\-1_dnp3_firmware, Simatic_cp_1243\-1_firmware, Simatic_cp_1243\-1_iec_firmware, Simatic_cp_1243\-1_irc_firmware, Simatic_cp_1243\-7_lte\/us_firmware, Simatic_cp_1243\-8_firmware, Simatic_cp_1542sp\-1_firmware, Simatic_cp_1542sp\-1_irc_firmware, Simatic_cp_1543\-1_firmware, Simatic_cp_1543sp\-1_firmware, Simatic_cp_1604_firmware, Simatic_cp_1616_firmware, Simatic_cp_1626_firmware, Simatic_cp_343\-1_adv_firmware, Simatic_cp_343\-1_lean_firmware, Simatic_cp_343\-1_std_firmware, Simatic_cp_443\-1_adv_firmware, Simatic_cp_443\-1_opc\-Ua_firmware, Simatic_cp_443\-1_std_firmware, Simatic_dk\-1604_pn_io_firmware, Simatic_dk\-1616_pn_io_firmware, Simatic_et_200al_firmware, Simatic_et_200ecopn_firmware, Simatic_et_200m_firmware, Simatic_et_200mp_firmware, Simatic_et_200pro_firmware, Simatic_et_200s_firmware, Simatic_et_200sp_firmware, Simatic_hmi_comfort_panels, Simatic_hmi_mobile_panels, Simatic_hmi_multi_panels, Simatic_rf650r_firmware, Simatic_rf680r_firmware, Simatic_rf685r_firmware, Simatic_s7\-1200_firmware, Simatic_s7\-1500_firmware, Simatic_s7\-1500_software_controller_firmware, Simatic_s7\-200_smart_firmware, Simatic_s7\-300_firmware, Simatic_s7\-400_firmware, Simatic_tdc_cp51m1_firmware, Simatic_tdc_cpu555_firmware, Simatic_teleservice_adapter_ie_advanced_firmware, Simatic_teleservice_adapter_ie_basic_firmware, Simatic_teleservice_adapter_ie_standard_firmware, Simatic_winac_rtx_firmware, Simocode_pro_v_profinet_firmware, Simotion_firmware, Sinamics__s110_pn_firmware, Sinamics_dcm_firmware, Sinamics_dcp_firmware, Sinamics_g110m_firmware, Sinamics_g120\(C\/p\/d\)_w\._pn_firmware, Sinamics_g130_firmware, Sinamics_g150_firmware, Sinamics_gh150_firmware, Sinamics_gl150_firmware, Sinamics_gm150_firmware, Sinamics_s120_firmware, Sinamics_s150_firmware, Sinamics_sl150_firmware, Sinamics_sm120_firmware, Sinamics_v90_pn_firmware, Sinumerik_828d_firmware, Sinumerik_840d_sl_firmware, Sirius_act_3su1_firmware, Sirius_motor_starter_m200d_profinet_firmware, Sirius_soft_starter_3rw44_pn_firmware, Sitop_psu8600_firmware, Softnet_profinet_io_firmware, Ups1600_profinet_firmware
|
6.5
|
|
|
2017-05-11
|
CVE-2017-2681
|
Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.
|
Dk_standard_ethernet_controller_firmware, Ek\-Ertec_200_pn_io_firmware, Ek\-Ertec_200p_pn_io_firmware, Ie\/as\-I_link_pn_io_firmware, Ie\/pb\-Link_firmware, Pn\/pn_coupler_firmware, Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_w700_firmware, Scalance_x200_firmware, Scalance_x200_irt_firmware, Scalance_x300_firmware, Scalance_x408_firmware, Scalance_x414_firmware, Scalance_xm400_firmware, Scalance_xr500_firmware, Simatic_cm_1542\-1_firmware, Simatic_cm_1542sp\-1_firmware, Simatic_cp_1243\-1_dnp3_firmware, Simatic_cp_1243\-1_firmware, Simatic_cp_1243\-1_iec_firmware, Simatic_cp_1243\-1_irc_firmware, Simatic_cp_1542sp\-1_irc_firmware, Simatic_cp_1543\-1_firmware, Simatic_cp_1543sp\-1_firmware, Simatic_cp_1604_firmware, Simatic_cp_1616_firmware, Simatic_cp_343\-1_adv_firmware, Simatic_cp_343\-1_lean_firmware, Simatic_cp_343\-1_std_firmware, Simatic_cp_443\-1_adv_firmware, Simatic_cp_443\-1_opc\-Ua_firmware, Simatic_cp_443\-1_std_firmware, Simatic_dk\-16xx_pn_io_firmware, Simatic_et_200al_firmware, Simatic_et_200ecopn_firmware, Simatic_et_200m_firmware, Simatic_et_200mp_firmware, Simatic_et_200pro_firmware, Simatic_et_200s_firmware, Simatic_et_200sp_firmware, Simatic_hmi_comfort_panels, Simatic_hmi_mobile_panels, Simatic_hmi_multi_panels, Simatic_rf650r_firmware, Simatic_rf680r_firmware, Simatic_rf685r_firmware, Simatic_s7\-1200_firmware, Simatic_s7\-1500_firmware, Simatic_s7\-1500_software_controller, Simatic_s7\-200_smart_firmware, Simatic_s7\-300_firmware, Simatic_s7\-400_firmware, Simatic_tdc_cp51m1_firmware, Simatic_tdc_cpu555_firmware, Simatic_teleservice_adapter_ie_advanced_modem_firmware, Simatic_teleservice_adapter_ie_basic_modem_firmware, Simatic_teleservice_adapter_standard_modem_firmware, Simatic_winac_rtx_firmware, Simocode_pro_v_profinet_firmware, Simotion_firmware, Sinamics_dcm_firmware, Sinamics_dcp_firmware, Sinamics_g110m_firmware, Sinamics_g120\(C\/p\/d\)_pn_firmware, Sinamics_g130_firmware, Sinamics_g150_firmware, Sinamics_s110_pn_firmware, Sinamics_s120_firmware, Sinamics_s150_firmware, Sinamics_v90_pn_firmware, Sinumerik_828d_firmware, Sinumerik_840d_sl_firmware, Sirius_act_3su1_firmware, Sirius_motor_starter_m200d_profinet_firmware, Sirius_soft_starter_3rw44_pn_firmware, Sitop_psu8600_firmware, Softnet_profinet_io_firmware, Ups1600_profinet_firmware
|
6.5
|
|
|
2017-12-26
|
CVE-2017-12741
|
Specially crafted packets sent to port 161/udp could cause a denial of service condition. The affected devices must be restarted manually.
|
Dk_standard_ethernet_controller_firmware, Ek\-Ertec_200p_firmware, Ek\-Ertec_200pn_io_firmware, Simatic_compact_field_unit_firmware, Simatic_et_200al_firmware, Simatic_et_200ecopn_firmware, Simatic_et_200m_firmware, Simatic_et_200mp_firmware, Simatic_et_200pro_firmware, Simatic_et_200s_firmware, Simatic_et_200sp_firmware, Simatic_pn\/pn_coupler_firmware, Simatic_s7\-1200_firmware, Simatic_s7\-1500_controller_firmware, Simatic_s7\-1500_firmware, Simatic_s7\-200_firmware, Simatic_s7\-300_firmware, Simatic_s7\-400h_v6_firmware, Simatic_s7\-400pn\/dp_v7_firmware, Simatic_s7\-400pn_v6_firmware, Simatic_s7\-410_v8_firmware, Simatic_winac_rtx_f_2010_firmware, Simocode_pro_v_profinet_firmware, Simotion_c_firmware, Simotion_d_firmware, Simotion_p_firmware, Sinamics_dcm_firmware, Sinamics_dcp_firmware, Sinamics_g110m\/g120pn_firmware, Sinamics_g130_firmware, Sinamics_g150_firmware, Sinamics_s110pn_firmware, Sinamics_s120_firmware, Sinamics_s150_v4\.7_firmware, Sinamics_s150_v4\.8_firmware, Sinamics_v90pn_firmware, Sinumerik_840d_sl_firmware, Sirius_soft_starter_3rw44pn_firmware
|
7.5
|
|
|
2018-03-20
|
CVE-2018-4843
|
A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP...
|
Simatic_cp_343\-1_firmware, Simatic_cp_443\-1_firmware, Simatic_s7\-1500_firmware, Simatic_s7\-300_firmware, Simatic_s7\-400_h_v6_firmware, Simatic_s7\-400_pn\/dp_v6_firmware, Simatic_s7\-400_pn\/dp_v7_firmware, Simatic_s7\-410_firmware, Simatic_winac_rtx_2010_firmware, Sinumerik_828d_firmware, Softnet_pn\-Io_linux_firmware
|
6.5
|
|
|
2019-04-17
|
CVE-2019-6568
|
The webserver of the affected devices contains a vulnerability that may lead to
a denial of service condition. An attacker may cause a denial of service
situation which leads to a restart of the webserver of the affected device.
The security vulnerability could be exploited by an attacker with network
access to the affected systems. Successful exploitation requires no system
privileges and no user interaction. An attacker could use the vulnerability
to compromise availability of the device.
|
Cp1604_firmware, Cp1616_firmware, Simatic_cp343\-1_advanced_firmware, Simatic_cp443\-1_advanced_firmware, Simatic_cp443\-1_firmware, Simatic_cp443\-1_opc_ua, Simatic_et_200_sp_open_controller_cpu_1515sp_pc2_firmware, Simatic_et_200_sp_open_controller_cpu_1515sp_pc_firmware, Simatic_hmi_comfort_outdoor_panels_firmware, Simatic_hmi_comfort_panels_firmware, Simatic_hmi_ktp_mobile_panels_ktp400f_firmware, Simatic_hmi_ktp_mobile_panels_ktp700_firmware, Simatic_hmi_ktp_mobile_panels_ktp700f_firmware, Simatic_hmi_ktp_mobile_panels_ktp900_firmware, Simatic_hmi_ktp_mobile_panels_ktp900f_firmware, Simatic_ipc_diagmonitor, Simatic_rf181\-Eip_firmware, Simatic_rf182c_firmware, Simatic_rf185c_firmware, Simatic_rf186c_firmware, Simatic_rf188c_firmware, Simatic_rf600r_firmware, Simatic_s7\-1500_firmware, Simatic_s7\-1500_software_controller, Simatic_s7\-1500f_firmware, Simatic_s7\-1500s_firmware, Simatic_s7\-1500t_firmware, Simatic_s7\-300_firmware, Simatic_s7\-400_pn\/dp_firmware, Simatic_s7\-400_pn_firmware, Simatic_s7\-Plcsim_advanced, Simatic_teleservice_adapter_ie_advanced_firmware, Simatic_teleservice_adapter_ie_basic_firmware, Simatic_teleservice_adapter_ie_standard_firmware, Simatic_winac_rtx_firmware, Simatic_wincc_runtime_advanced, Simocode_pro_v_eip_firmware, Simocode_pro_v_pn_firmware, Sinamics_g130_firmware, Sinamics_g150_firmware, Sinamics_gh150_firmware, Sinamics_gl150_firmware, Sinamics_gm150_firmware, Sinamics_s120_firmware, Sinamics_s150_firmware, Sinamics_s210_firmware, Sinamics_sl150_firmware, Sinamics_sm120_firmware, Sinamics_sm150_firmware, Sitop_manager, Sitop_psu8600_firmware, Sitop_ups1600_firmware, Tim_1531_irc_firmware
|
7.5
|
|
|
2019-04-17
|
CVE-2018-16561
|
A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions < V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user...
|
Simatic_s7\-300_firmware, Simatic_s7\-300f_firmware, Simatic_s7\-300fs_firmware, Simatic_s7\-300t_firmware
|
7.5
|
|
|