A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions < V2.6), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending a specially crafted packet to the affected service could cause a partial remote denial-of-service, that would cause the service to restart itself.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-841348.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-07-14 07:15
Updated : 2023-01-30 11:52
NVD link : CVE-2020-7588
Mitre link : CVE-2020-7588
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
siemens
- simocode_es
- soft_starter_es
- simatic_pcs_neo
- opcenter_quality
- opcenter_intelligence
- simatic_it_lms
- opcenter_execution_process
- opcenter_execution_foundation
- opcenter_execution_discrete
- simatic_it_production_suite
- simatic_notifier_server
- simatic_step_7
- opcenter_rd\&l