7.5
CVE-2019-13921
- EPSS 0.44%
- Published 10.10.2019 14:15:14
- Last modified 21.11.2024 04:25:42
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in SIMATIC WinAC RTX (F) 2010 (All versions < SP3 Update 1). Affected versions of the software contain a vulnerability that could allow an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large HTTP request is sent to the executing service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the service provided by the software.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ Simatic Winac Rtx (f) 2010 Version-
Siemens ≫ Simatic Winac Rtx (f) 2010 Version- Updateupdate_1
Siemens ≫ Simatic Winac Rtx (f) 2010 Version- Updateupdate_2
Siemens ≫ Simatic Winac Rtx (f) 2010 Version- Updateupdate_3
Siemens ≫ Simatic Winac Rtx (f) 2010 Versionsp1
Siemens ≫ Simatic Winac Rtx (f) 2010 Versionsp2 Update-
Siemens ≫ Simatic Winac Rtx (f) 2010 Versionsp2 Updateupdate_1
Siemens ≫ Simatic Winac Rtx (f) 2010 Versionsp2 Updateupdate_2
Siemens ≫ Simatic Winac Rtx (f) 2010 Versionsp2 Updateupdate_3
Siemens ≫ Simatic Winac Rtx (f) 2010 Versionsp2 Updateupdate_4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.44% | 0.602 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-400 Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CWE-410 Insufficient Resource Pool
The product's resource pool is not large enough to handle peak demand, which allows an attacker to prevent others from accessing the resource by using a (relatively) large number of requests for resources.