Siemens SIMATIC ET 200SP

CPE Details

Siemens SIMATIC ET 200SP
-
2017-05-22
23h51 +00:00
2021-05-14
14h59 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:siemens:simatic_et_200sp:-:*:*:*:*:*:*:*

Informations

Vendor

siemens

Product

simatic_et_200sp

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2018-13805 2018-10-10 15h00 +00:00 A vulnerability has been identified in SIMATIC ET 200SP Open Controller (All versions >= V2.0 and < V2.1.6), SIMATIC S7-1500 Software Controller (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 incl. F (All versions >= V2.0 and < V2.5). An attacker can cause a denial-of-service condition on the network stack by sending a large number of specially crafted packets to the PLC. The PLC will lose its ability to communicate over the network. This vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no privileges and no user interaction. An attacker could use this vulnerability to compromise availability of the network connectivity. At the time of advisory publication no public exploitation of this vulnerability was known.
7.5
High
CVE-2017-12741 2017-12-26 03h00 +00:00 Specially crafted packets sent to port 161/udp could cause a denial of service condition. The affected devices must be restarted manually.
8.7
High
CVE-2017-2681 2017-05-11 08h00 +00:00 Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.
7.1
High
CVE-2017-2680 2017-05-10 23h00 +00:00 Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected.
7.1
High