A vulnerability has been identified in SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.10), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) (All versions < V10.1), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) (All versions < V8.2.3). Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a Denial-of-Service condition. A restart is needed to restore normal operations.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-557541.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
10 Aug 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability has been identified in SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.10), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) (All versions < V10.1), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) (All versions < V8.2.3). Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a Denial-of-Service condition. A restart is needed to restore normal operations. |
10 Aug 2022, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability has been identified in SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.10), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) (All versions < V10.1), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) (All versions < V8.2.3). Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a Denial-of-Service condition. A restart is needed to restore normal operations. |
20 Apr 2022, 14:17
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-557541.pdf - Patch, Vendor Advisory | |
CPE | cpe:2.3:h:siemens:simatic_s7-410_v8:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:simatic_s7-410_v10:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_s7-400_pn\/dp_v7_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_s7-410_v10_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:simatic_s7-400_pn\/dp_v7:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_s7-410_v8_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:simatic_s7-400h_v6:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_s7-400h_v6_firmware:*:*:*:*:*:*:*:* |
|
CWE | CWE-119 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
12 Apr 2022, 10:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability has been identified in SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.10), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) (All versions < V10.1), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) (All versions). Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a Denial-of-Service condition. A restart is needed to restore normal operations. |
12 Apr 2022, 09:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-12 09:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-40368
Mitre link : CVE-2021-40368
CVE.ORG link : CVE-2021-40368
JSON object : View
Products Affected
siemens
- simatic_s7-410_v8
- simatic_s7-400_pn\/dp_v7_firmware
- simatic_s7-400_pn\/dp_v7
- simatic_s7-410_v10
- simatic_s7-400h_v6
- simatic_s7-410_v8_firmware
- simatic_s7-400h_v6_firmware
- simatic_s7-410_v10_firmware
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer