Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Simatic_tdc_cpu555_firmware
(Siemens)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-11-12 | CVE-2020-15783 | A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC TDC CPU555 (All versions), SINUMERIK 840D sl (All versions). Sending multiple specially crafted packets to the affected devices could cause a Denial-of-Service on port 102. A cold restart is required to recover the service. | Simatic_s7\-300_cpu_312_firmware, Simatic_s7\-300_cpu_314_firmware, Simatic_s7\-300_cpu_315\-2_dp_firmware, Simatic_s7\-300_cpu_315\-2_pn_firmware, Simatic_s7\-300_cpu_315f\-2_dp_firmware, Simatic_s7\-300_cpu_315f\-2_pn_firmware, Simatic_s7\-300_cpu_317\-2_dp_firmware, Simatic_s7\-300_cpu_317\-2_pn_firmware, Simatic_s7\-300_cpu_317f\-2_dp_firmware, Simatic_s7\-300_cpu_317f\-2_pn_firmware, Simatic_tdc_cpu555_firmware, Sinumerik_840d_sl_firmware | 7.5 | ||
2022-04-12 | CVE-2022-25622 | The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined. This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments. | Simatic_cfu_diq_firmware, Simatic_cfu_pa_firmware, Simatic_s7\-1500_cpu_firmware, Simatic_s7\-300_cpu_firmware, Simatic_s7\-400_pn\/dp_v7_firmware, Simatic_s7\-400h_v6_firmware, Simatic_s7\-410_v10_firmware, Simatic_s7\-410_v8_firmware, Simatic_tdc_cp51m1_firmware, Simatic_tdc_cpu555_firmware, Simatic_winac_rtx_firmware, Simit_simulation_platform | 7.5 |