A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.
                
            References
                    | Link | Resource | 
|---|---|
| https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Information
                Published : 2022-02-09 08:15
Updated : 2022-10-06 09:51
NVD link : CVE-2021-40360
Mitre link : CVE-2021-40360
JSON object : View
CWE
                
                    
                        
                        CWE-307
                        
            Improper Restriction of Excessive Authentication Attempts
Products Affected
                siemens
- simatic_pcs_7
- simatic_wincc


