A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 CPU family (incl. SIPLUS variants) (All versions), SIMATIC WinAC RTX (F) 2010 (All versions), SINUMERIK 840D sl (All versions). The authentication protocol between a client and a PLC via port 102/tcp (ISO-TSAP) insufficiently protects the transmitted password. This could allow an attacker that is able to intercept the network traffic to obtain valid PLC credentials.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
siemens simatic_s7-300_cpu_312_firmware |
||
siemens simatic_s7-300_cpu_314_firmware |
||
siemens simatic_s7-300_cpu_315-2_dp_firmware |
||
siemens simatic_s7-300_cpu_315-2_pn_firmware |
||
siemens simatic_s7-300_cpu_317-2_pn_firmware |
||
siemens simatic_s7-300_cpu_317-2_dp_firmware |
||
siemens simatic_s7-300_cpu_315f-2_dp_firmware |
||
siemens simatic_s7-300_cpu_315f-2_pn_firmware |
||
siemens simatic_s7-300_cpu_317f-2_pn_firmware |
||
siemens simatic_s7-300_cpu_317f-2_dp_firmware |
||
siemens simatic_s7-400_cpu_412_firmware |
||
siemens simatic_s7-400_cpu_414_firmware |
||
siemens simatic_s7-400_cpu_416_firmware |
||
siemens simatic_s7-400_cpu_417_firmware |