A vulnerability has been identified in Opcenter Execution Foundation (All versions < V2407), Opcenter Quality (All versions < V2312), SIMATIC PCS neo (All versions < V4.1), SINEC NMS (All versions < V2.0 SP1), Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions < V17 Update 8), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 3). The affected application contains an improper input validation vulnerability that could allow an attacker to bring the service into a Denial-of-Service state by sending a specifically crafted message to 4004/tcp. The corresponding service is auto-restarted after the crash is detected by a watchdog.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| siemens | opcenter_quality | - | - |
| siemens | simatic_pcs_neo | 4.1 |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10
Affected Products
4
References
siemens / opcenter_quality
| - |
| siemens | sinumerik_integrate_runmyhmi_\/automotive | - | - |
| siemens | totally_integrated_automation_portal | 14.0 - 15 | - |
| siemens | totally_integrated_automation_portal | 15 - 16 | - |
| siemens | totally_integrated_automation_portal | 16 - 17 | - |
| siemens | totally_integrated_automation_portal | 17 - 18 | - |
| siemens | totally_integrated_automation_portal | - | - |
| siemens | totally_integrated_automation_portal | - | - |
| siemens | totally_integrated_automation_portal | - | - |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Exploitability
Impact