A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 CPU family (incl. SIPLUS variants) (All versions), SIMATIC WinAC RTX (F) 2010 (All versions), SINUMERIK 840D sl (All versions). The authentication protocol between a client and a PLC via port 102/tcp (ISO-TSAP) insufficiently protects the transmitted password. This could allow an attacker that is able to intercept the network traffic to obtain valid PLC credentials.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| siemens | simatic_s7-300_cpu_312_firmware | - | - |
| siemens | simatic_s7-300_cpu_314_firmware | - | - |
| siemens | simatic_s7-300_cpu_315-2_dp_firmware |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
14
Affected Products
2
References
siemens / simatic_s7-300_cpu_312_firmware
| - |
| - |
| siemens | simatic_s7-300_cpu_315-2_pn_firmware | - | - |
| siemens | simatic_s7-300_cpu_317-2_pn_firmware | - | - |
| siemens | simatic_s7-300_cpu_317-2_dp_firmware | - | - |
| siemens | simatic_s7-300_cpu_315f-2_dp_firmware | - | - |
| siemens | simatic_s7-300_cpu_315f-2_pn_firmware | - | - |
| siemens | simatic_s7-300_cpu_317f-2_pn_firmware | - | - |
| siemens | simatic_s7-300_cpu_317f-2_dp_firmware | - | - |
| siemens | simatic_s7-400_cpu_412_firmware | - | - |
| siemens | simatic_s7-400_cpu_414_firmware | - | - |
| siemens | simatic_s7-400_cpu_416_firmware | - | - |
| siemens | simatic_s7-400_cpu_417_firmware | - | - |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Exploitability
Impact