CVE-2021-40360

A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update10:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update11:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update12:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update13:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update14:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update15:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update16:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update17:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update18:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update7:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update8:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update9:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:13:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:13:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:13:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:14.0.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:update1:*:*:*:*:*:*

History

17 Jul 2023, 15:15

Type Values Removed Values Added
CPE cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update8:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update13:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update18:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update15:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update9:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update10:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update14:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update17:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update11:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update12:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update7:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update16:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*
CWE CWE-307 CWE-522

20 May 2022, 13:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server. A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.

12 Apr 2022, 09:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server. A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.

14 Feb 2022, 16:30

Type Values Removed Values Added
References (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf - (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 8.8
CWE CWE-307
CPE cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:14.0.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:13:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:13:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:13:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*

09 Feb 2022, 16:26

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-09 16:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-40360

Mitre link : CVE-2021-40360

CVE.ORG link : CVE-2021-40360


JSON object : View

Products Affected

siemens

  • simatic_wincc
  • simatic_pcs_7
CWE
CWE-522

Insufficiently Protected Credentials

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor