Siemens SIPLUS ET 200SP CPU 1512SP-1 PN RAIL

CPE Details

Siemens SIPLUS ET 200SP CPU 1512SP-1 PN RAIL
-
2023-01-13
14h21 +00:00
2023-01-13
16h43 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:siemens:siplus_et_200sp_cpu_1512sp-1_pn_rail:-:*:*:*:*:*:*:*

Informations

Vendor

siemens

Product

siplus_et_200sp_cpu_1512sp-1_pn_rail

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-46156 2023-12-12 11h27 +00:00 Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a denial of service condition. A restart is needed to restore normal operations.
7.5
High
CVE-2023-28831 2023-09-12 09h32 +00:00 The OPC UA implementations (ANSI C and C++) in affected products contain an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation. This could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate.
7.5
High
CVE-2022-38773 2023-01-10 11h39 +00:00 Affected devices do not contain an Immutable Root of Trust in Hardware. With this the integrity of the code executed on the device can not be validated during load-time. An attacker with physical access to the device could use this to replace the boot image of the device and execute arbitrary code.
6.8
Medium