Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/83110 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1034954 | Third Party Advisory VDB Entry |
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf | |
https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2016-02-08 16:59
Updated : 2024-02-04 18:53
NVD link : CVE-2016-2201
Mitre link : CVE-2016-2201
CVE.ORG link : CVE-2016-2201
JSON object : View
Products Affected
siemens
- simatic_s7-1512c-1_pn_cpu
- simatic_s7-1511c-1_pn_cpu
- simatic_s7-1500_cpu_firmware
- simatic_s7-1513-1_pn_cpu
- simatic_s7-1513f-1_pn_cpu
- simatic_s7-1516-3_pn\/dp_cpu
- simatic_s7-1518-4_pn\/dp_cpu
- simatic_s7-1515-2_pn_cpu
- simatic_s7-1518f-4_pn\/dp_cpu
- simatic_s7-1517f-3_pn\/dp_cpu
- simatic_s7-1517-3_pn\/dp_cpu
- simatic_s7-1511f-1_pn_cpu
- simatic_s7-1515f-2_pn_cpu
- simatic_s7-1511-1_pn_cpu
- simatic_s7-1516f-3_pn\/dp_cpu
CWE
CWE-20
Improper Input Validation