A vulnerability has been identified in SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.10), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) (All versions < V10.1), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) (All versions < V8.2.3). Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a Denial-of-Service condition. A restart is needed to restore normal operations.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-557541.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Information
Published : 2022-04-12 02:15
Updated : 2022-08-10 13:27
NVD link : CVE-2021-40368
Mitre link : CVE-2021-40368
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
siemens
- simatic_s7-400h_v6_firmware
- simatic_s7-400h_v6
- simatic_s7-400_pn\/dp_v7_firmware
- simatic_s7-400_pn\/dp_v7
- simatic_s7-410_v8
- simatic_s7-410_v8_firmware
- simatic_s7-410_v10
- simatic_s7-410_v10_firmware