Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.
References
Link | Resource |
---|---|
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf | Vendor Advisory |
http://www.securityfocus.com/bid/83110 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02 | Third Party Advisory US Government Resource |
http://www.securitytracker.com/id/1034954 | Third Party Advisory VDB Entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2016-02-08 08:59
Updated : 2020-02-10 07:15
NVD link : CVE-2016-2201
Mitre link : CVE-2016-2201
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
siemens
- simatic_s7-1513-1_pn_cpu
- simatic_s7-1511f-1_pn_cpu
- simatic_s7-1517-3_pn\/dp_cpu
- simatic_s7-1512c-1_pn_cpu
- simatic_s7-1500_cpu_firmware
- simatic_s7-1511-1_pn_cpu
- simatic_s7-1518f-4_pn\/dp_cpu
- simatic_s7-1515f-2_pn_cpu
- simatic_s7-1513f-1_pn_cpu
- simatic_s7-1518-4_pn\/dp_cpu
- simatic_s7-1516-3_pn\/dp_cpu
- simatic_s7-1511c-1_pn_cpu
- simatic_s7-1515-2_pn_cpu
- simatic_s7-1516f-3_pn\/dp_cpu
- simatic_s7-1517f-3_pn\/dp_cpu