A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Jul 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update5:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update8:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update13:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update18:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update15:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update2:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:15.1:update_6:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update4:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update9:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:15.1:-:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update10:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update6:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:15.1:update_5:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update14:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update17:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update11:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update12:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:15.1:update_1:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:15.1:update_3:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update7:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:15.1:update_4:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update1:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update16:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update3:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:15.1:update_2:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:* |
|
CWE | CWE-522 |
20 May 2022, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server. |
12 Apr 2022, 09:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server. |
14 Feb 2022, 16:30
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 8.8 |
CWE | CWE-307 | |
CPE | cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:16:-:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:14.0.1:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:13:sp1:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:17:-:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:16:update4:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_pcs_7:9.1:-:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:13:-:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:13:sp2:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:17:update1:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:16:update3:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update5:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:16:update2:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:16:update1:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:* |
09 Feb 2022, 16:26
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-09 16:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-40360
Mitre link : CVE-2021-40360
CVE.ORG link : CVE-2021-40360
JSON object : View
Products Affected
siemens
- simatic_wincc
- simatic_pcs_7