8.2
CVSSv3

CVE-2020-7587

Published: 14/07/2020 Updated: 30/01/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 8.2 | Impact Score: 4.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions < V2.6), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending multiple specially crafted packets to the affected service could cause a partial remote denial-of-service, that would cause the service to restart itself. On some cases the vulnerability could leak random information from the remote service.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

siemens opcenter execution discrete

siemens opcenter execution foundation

siemens opcenter execution process

siemens opcenter quality

siemens opcenter rd\\&l 8.0

siemens simatic step 7 16

siemens simatic notifier server

siemens soft starter es

siemens simocode es 16

siemens simatic step 7 15.1

siemens simocode es

siemens simatic pcs neo

siemens simatic it production suite

siemens simatic it lms

siemens simatic pcs neo 3.0

siemens simatic step 7

siemens simocode es 15.1

siemens soft starter es 15.1

siemens opcenter intelligence