CVE-2021-37186

A vulnerability has been identified in LOGO! CMR2020 (All versions < V2.2), LOGO! CMR2040 (All versions < V2.2), SIMATIC RTU3010C (All versions < V4.0.9), SIMATIC RTU3030C (All versions < V4.0.9), SIMATIC RTU3031C (All versions < V4.0.9), SIMATIC RTU3041C (All versions < V4.0.9). The underlying TCP/IP stack does not properly calculate the random numbers used as ISN (Initial Sequence Numbers). An adjacent attacker with network access to the LAN interface could interfere with traffic, spoof the connection and gain access to sensitive information.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:logo\!_cmr2020_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:logo\!_cmr2020:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:logo\!_cmr2040_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:logo\!_cmr2040:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3010c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3010c:*:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3030c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3030c:*:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3031c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3031c:*:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:siemens:simatic_rtu3041c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3041c:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:14

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf - Patch, Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf - Patch, Vendor Advisory

29 Apr 2022, 17:19

Type Values Removed Values Added
CPE cpe:2.3:o:siemens:simatic_rtu3010c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_rtu3030c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_rtu3031c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_rtu3041c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_rtu3031c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_rtu3041c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_rtu3030c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_rtu3010c_firmware:*:*:*:*:*:*:*:*

09 Feb 2022, 16:15

Type Values Removed Values Added
Summary A vulnerability has been identified in LOGO! CMR2020 (All versions < V2.2), LOGO! CMR2040 (All versions < V2.2), SIMATIC RTU 3000 family (All versions). The underlying TCP/IP stack does not properly calculate the random numbers used as ISN (Initial Sequence Numbers). An adjacent attacker with network access to the LAN interface could interfere with traffic, spoof the connection and gain access to sensitive information. A vulnerability has been identified in LOGO! CMR2020 (All versions < V2.2), LOGO! CMR2040 (All versions < V2.2), SIMATIC RTU3010C (All versions < V4.0.9), SIMATIC RTU3030C (All versions < V4.0.9), SIMATIC RTU3031C (All versions < V4.0.9), SIMATIC RTU3041C (All versions < V4.0.9). The underlying TCP/IP stack does not properly calculate the random numbers used as ISN (Initial Sequence Numbers). An adjacent attacker with network access to the LAN interface could interfere with traffic, spoof the connection and gain access to sensitive information.

24 Sep 2021, 13:48

Type Values Removed Values Added
CPE cpe:2.3:h:siemens:logo\!_cmr2040:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:logo\!_cmr2020_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:logo\!_cmr2040_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3010c:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3031c:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_rtu3010c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3041c:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_rtu3030c:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_rtu3031c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_rtu3041c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_rtu3030c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:logo\!_cmr2020:-:*:*:*:*:*:*:*
CWE CWE-330
CVSS v2 : unknown
v3 : unknown
v2 : 4.8
v3 : 5.4
References (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf - (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf - Patch, Vendor Advisory

14 Sep 2021, 11:42

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-14 11:15

Updated : 2024-11-21 06:14


NVD link : CVE-2021-37186

Mitre link : CVE-2021-37186

CVE.ORG link : CVE-2021-37186


JSON object : View

Products Affected

siemens

  • simatic_rtu3030c
  • logo\!_cmr2020
  • simatic_rtu3041c_firmware
  • logo\!_cmr2040_firmware
  • logo\!_cmr2020_firmware
  • simatic_rtu3010c_firmware
  • simatic_rtu3010c
  • simatic_rtu3030c_firmware
  • simatic_rtu3031c_firmware
  • simatic_rtu3031c
  • simatic_rtu3041c
  • logo\!_cmr2040
CWE
CWE-330

Use of Insufficiently Random Values