CVE-2020-15782

A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V21.9), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.5.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.9.2), SIMATIC S7-1500 Software Controller (All versions < V21.9), SIMATIC S7-PLCSIM Advanced (All versions < V4.0), SINAMICS PERFECT HARMONY GH180 Drives (Drives manufactured before 2021-08-13), SINUMERIK MC (All versions < V6.15), SINUMERIK ONE (All versions < V6.15). Affected devices are vulnerable to a memory protection bypass through a specific operation. A remote unauthenticated attacker with network access to port 102/tcp could potentially write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:simatic_driver_controller_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:siemens:cpu_1504d_tf:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1507d_tf:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:s7-1200_cpu_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:siemens:cpu_1211c:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1212c:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1212fc:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1214c:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1214fc:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1215c:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1215fc:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1217c:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:s7-1500_cpu_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:siemens:6es7510-1dj01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7510-1sj01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1ak01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1ak02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1ck00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1ck01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1fk01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1fk02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1tk01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1uk01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7512-1ck00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7512-1ck01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7512-1dk01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7512-1sk01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-1al01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-1al02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-1fl01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-1fl02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-1rl00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-2gl00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-2pl00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2am01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2am02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2fm01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2fm02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2rm00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2tm01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2um01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-2gn00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-2pn00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3an01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3an02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3fn01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3fn02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3tn00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3un00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7517-3ap00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7517-3fp00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7517-3hp00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7517-3tp00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7517-3up00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7518-4ap00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7518-4ap00-3ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7518-4fp00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7518-4fp00-3ab0:-:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:siemens:simatic_s7-1500__software_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_s7-plcsim_advanced:*:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:et_200sp_open_controller_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:siemens:cpu_1515sp_pc:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1515sp_pc2:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:06

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-434534.pdf - Patch, Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-434534.pdf - Patch, Vendor Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-434535.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-434535.pdf -
References () https://cert-portal.siemens.com/productcert/pdf/ssa-434536.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-434536.pdf -

14 Sep 2021, 11:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.5.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.9.2), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions < V4.0), SINAMICS PERFECT HARMONY GH180 Drives (All versions), SINUMERIK MC (All versions), SINUMERIK ONE (All versions). Affected devices are vulnerable to a memory protection bypass through a specific operation. A remote unauthenticated attacker with network access to port 102/tcp could potentially write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks. A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V21.9), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.5.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.9.2), SIMATIC S7-1500 Software Controller (All versions < V21.9), SIMATIC S7-PLCSIM Advanced (All versions < V4.0), SINAMICS PERFECT HARMONY GH180 Drives (Drives manufactured before 2021-08-13), SINUMERIK MC (All versions < V6.15), SINUMERIK ONE (All versions < V6.15). Affected devices are vulnerable to a memory protection bypass through a specific operation. A remote unauthenticated attacker with network access to port 102/tcp could potentially write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks.

13 Jul 2021, 12:15

Type Values Removed Values Added
References
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-434536.pdf -
  • (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-434535.pdf -
Summary A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.5.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.9.2), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions < V4.0), SINAMICS PERFECT HARMONY GH180 Drives (All versions), SINUMERIK MC (All versions), SINUMERIK ONE (All versions). Affected devices are vulnerable to a memory protection bypass through a specific operation. A remote unauthenticated attacker with network access to port 102/tcp could potentially write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks. A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.5.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.9.2), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions < V4.0), SINAMICS PERFECT HARMONY GH180 Drives (All versions), SINUMERIK MC (All versions), SINUMERIK ONE (All versions). Affected devices are vulnerable to a memory protection bypass through a specific operation. A remote unauthenticated attacker with network access to port 102/tcp could potentially write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks.

13 Jul 2021, 11:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.5.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.9.2), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions < V4.0). Affected devices are vulnerable to a memory protection bypass through a specific operation. A remote unauthenticated attacker with network access to port 102/tcp could potentially write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks. A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.5.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.9.2), SIMATIC S7-1500 Software Controller (All versions), SIMATIC S7-PLCSIM Advanced (All versions < V4.0), SINAMICS PERFECT HARMONY GH180 Drives (All versions), SINUMERIK MC (All versions), SINUMERIK ONE (All versions). Affected devices are vulnerable to a memory protection bypass through a specific operation. A remote unauthenticated attacker with network access to port 102/tcp could potentially write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks.

10 Jun 2021, 14:47

Type Values Removed Values Added
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-434534.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-434534.pdf - Patch, Vendor Advisory
CPE cpe:2.3:h:siemens:6es7518-4fp00-3ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7518-4fp00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-2gl00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2tm01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2fm02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2am02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1ck00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3an02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1507d_tf:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7517-3hp00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1217c:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2am01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1fk01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1fk02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1ak01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-2gn00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1214fc:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7510-1sj01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2rm00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3tn00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1212c:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1515sp_pc2:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-2pl00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2um01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1211c:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-2pn00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-1al01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7515-2fm01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1214c:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7517-3ap00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7512-1sk01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7512-1ck00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_s7-1500__software_controller:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-1al02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-1fl02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7510-1dj01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1tk01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:et_200sp_open_controller_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-1fl01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1ck01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3fn02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7512-1dk01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1212fc:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7517-3tp00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1515sp_pc:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3an01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7518-4ap00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:s7-1200_cpu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7512-1ck01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1ak02-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1215fc:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7517-3fp00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_s7-plcsim_advanced:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3fn01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:s7-1500_cpu_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1215c:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7513-1rl00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:cpu_1504d_tf:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7511-1uk01-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7516-3un00-0ab0:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7518-4ap00-3ab0:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_driver_controller_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6es7517-3up00-0ab0:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8

28 May 2021, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-28 16:15

Updated : 2024-11-21 05:06


NVD link : CVE-2020-15782

Mitre link : CVE-2020-15782

CVE.ORG link : CVE-2020-15782


JSON object : View

Products Affected

siemens

  • cpu_1215c
  • cpu_1504d_tf
  • cpu_1212c
  • 6es7515-2am01-0ab0
  • 6es7516-3un00-0ab0
  • cpu_1215fc
  • 6es7512-1ck01-0ab0
  • 6es7516-2pn00-0ab0
  • cpu_1515sp_pc2
  • 6es7510-1sj01-0ab0
  • 6es7511-1ck01-0ab0
  • 6es7515-2fm01-0ab0
  • cpu_1214fc
  • 6es7513-1fl01-0ab0
  • 6es7518-4fp00-0ab0
  • cpu_1515sp_pc
  • 6es7513-1rl00-0ab0
  • 6es7516-3tn00-0ab0
  • cpu_1217c
  • 6es7518-4ap00-3ab0
  • 6es7515-2rm00-0ab0
  • 6es7515-2tm01-0ab0
  • 6es7517-3hp00-0ab0
  • 6es7516-3fn01-0ab0
  • cpu_1214c
  • 6es7516-3an02-0ab0
  • 6es7515-2fm02-0ab0
  • 6es7517-3fp00-0ab0
  • cpu_1211c
  • 6es7518-4fp00-3ab0
  • 6es7510-1dj01-0ab0
  • 6es7517-3ap00-0ab0
  • 6es7513-2pl00-0ab0
  • 6es7511-1fk01-0ab0
  • simatic_s7-1500__software_controller
  • 6es7513-1al02-0ab0
  • et_200sp_open_controller_firmware
  • 6es7513-2gl00-0ab0
  • s7-1200_cpu_firmware
  • simatic_driver_controller_firmware
  • 6es7515-2am02-0ab0
  • 6es7517-3tp00-0ab0
  • s7-1500_cpu_firmware
  • 6es7516-3an01-0ab0
  • 6es7511-1ck00-0ab0
  • 6es7511-1fk02-0ab0
  • 6es7512-1sk01-0ab0
  • 6es7513-1al01-0ab0
  • 6es7517-3up00-0ab0
  • 6es7513-1fl02-0ab0
  • 6es7518-4ap00-0ab0
  • simatic_s7-plcsim_advanced
  • 6es7511-1uk01-0ab0
  • 6es7511-1ak01-0ab0
  • cpu_1507d_tf
  • cpu_1212fc
  • 6es7515-2um01-0ab0
  • 6es7511-1ak02-0ab0
  • 6es7512-1ck00-0ab0
  • 6es7516-2gn00-0ab0
  • 6es7516-3fn02-0ab0
  • 6es7511-1tk01-0ab0
  • 6es7512-1dk01-0ab0
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer