Product:

Simatic_tdc_cpu555_firmware

(Siemens)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 5
Date Id Summary Products Score Patch Annotated
2020-11-12 CVE-2020-15783 A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC TDC CPU555 (All versions), SINUMERIK 840D sl (All versions). Sending multiple specially crafted packets to the affected devices could cause a Denial-of-Service on port 102. A cold restart is required to recover the service. Simatic_s7\-300_cpu_312_firmware, Simatic_s7\-300_cpu_314_firmware, Simatic_s7\-300_cpu_315\-2_dp_firmware, Simatic_s7\-300_cpu_315\-2_pn_firmware, Simatic_s7\-300_cpu_315f\-2_dp_firmware, Simatic_s7\-300_cpu_315f\-2_pn_firmware, Simatic_s7\-300_cpu_317\-2_dp_firmware, Simatic_s7\-300_cpu_317\-2_pn_firmware, Simatic_s7\-300_cpu_317f\-2_dp_firmware, Simatic_s7\-300_cpu_317f\-2_pn_firmware, Simatic_tdc_cpu555_firmware, Sinumerik_840d_sl_firmware 7.5
2022-04-12 CVE-2022-25622 The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined. This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments. Simatic_cfu_diq_firmware, Simatic_cfu_pa_firmware, Simatic_s7\-1500_cpu_firmware, Simatic_s7\-300_cpu_firmware, Simatic_s7\-400_pn\/dp_v7_firmware, Simatic_s7\-400h_v6_firmware, Simatic_s7\-410_v10_firmware, Simatic_s7\-410_v8_firmware, Simatic_tdc_cp51m1_firmware, Simatic_tdc_cpu555_firmware, Simatic_winac_rtx_firmware, Simit_simulation_platform 7.5