Siemens SIMATIC S7-300 CPU 313

CPE Details

Siemens SIMATIC S7-300 CPU 313
-
2020-01-16
12h43 +00:00
2020-01-16
12h43 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:siemens:simatic_s7-300_cpu_313:-:*:*:*:*:*:*:*

Informations

Vendor

siemens

Product

simatic_s7-300_cpu_313

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-18336 2020-03-10 18h16 +00:00 A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V3.X.17), SIMATIC TDC CP51M1 (All versions < V1.1.8), SIMATIC TDC CPU555 (All versions < V1.1.1), SINUMERIK 840D sl (All versions < V4.8.6), SINUMERIK 840D sl (All versions < V4.94). Specially crafted packets sent to port 102/tcp (Profinet) could cause the affected device to go into defect mode. A restart is required in order to recover the system. Successful exploitation requires an attacker to have network access to port 102/tcp, with no authentication. No user interation is required. At the time of advisory publication no public exploitation of this security vulnerability was known.
7.5
High
CVE-2019-10923 2019-10-10 11h49 +00:00 An attacker with network access to an affected product may cause a denial of service condition by breaking the real-time synchronization (IRT) of the affected installation.
7.5
High
CVE-2019-10936 2019-10-09 22h00 +00:00 Affected devices improperly handle large amounts of specially crafted UDP packets. This could allow an unauthenticated remote attacker to trigger a denial of service condition.
7.5
High