8.7

CVE-2020-28400

Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial of service condition. The vulnerability can be triggered if a large amount of DCP reset packets are sent to the device.

Data is provided by the National Vulnerability Database (NVD)
SiemensRuggedcom Rm1224 Firmware Version < 6.4
   SiemensRuggedcom Rm1224 Version-
SiemensScalance M-800 Firmware Version < 6.4
   SiemensScalance M-800 Version-
SiemensScalance S615 Firmware Version < 6.4
   SiemensScalance S615 Version-
SiemensScalance X201-3p Irt Firmware Version < 5.5.0
   SiemensScalance X201-3p Irt Version-
SiemensScalance X202-2 Irt Firmware Version < 5.5.0
   SiemensScalance X202-2 Irt Version-
SiemensScalance X204 Irt Firmware Version < 5.5.0
   SiemensScalance X204 Irt Version-
SiemensScalance X204-2 Firmware Version < 5.2.5
   SiemensScalance X204-2 Version-
SiemensScalance X204-2fm Firmware Version < 5.2.5
   SiemensScalance X204-2fm Version-
SiemensScalance X204-2ld Firmware Version < 5.2.5
   SiemensScalance X204-2ld Version-
SiemensScalance X204-2ld Ts Firmware Version < 5.2.5
   SiemensScalance X204-2ld Ts Version-
SiemensScalance X204-2ts Firmware Version < 5.2.5
   SiemensScalance X204-2ts Version-
SiemensScalance X206-1 Firmware Version < 5.2.5
   SiemensScalance X206-1 Version-
SiemensScalance X206-1ld Firmware Version < 5.2.5
   SiemensScalance X206-1ld Version-
SiemensScalance X208 Firmware Version < 5.2.5
   SiemensScalance X208 Version-
SiemensScalance X208pro Firmware Version < 5.2.5
   SiemensScalance X208pro Version-
SiemensScalance X212-2 Firmware Version < 5.2.5
   SiemensScalance X212-2 Version-
SiemensScalance X212-2ld Firmware Version < 5.2.5
   SiemensScalance X212-2ld Version-
SiemensScalance X216 Firmware Version < 5.2.5
   SiemensScalance X216 Version-
SiemensScalance X224 Firmware Version < 5.2.5
   SiemensScalance X224 Version-
SiemensScalance Xb-200 Firmware Version < 4.3
   SiemensScalance Xb-200 Version-
SiemensScalance Xc-200 Firmware Version < 4.3
   SiemensScalance Xc-200 Version-
SiemensScalance Xf204 Firmware Version < 5.2.5
   SiemensScalance Xf204 Version-
SiemensScalance Xf204 Irt Firmware Version < 5.5.0
   SiemensScalance Xf204 Irt Version-
SiemensScalance Xf204-2 Firmware Version < 5.2.5
   SiemensScalance Xf204-2 Version-
SiemensScalance Xf206-1 Firmware Version < 5.2.5
   SiemensScalance Xf206-1 Version-
SiemensScalance Xf208 Firmware Version < 5.2.5
   SiemensScalance Xf208 Version-
SiemensScalance Xf-200ba Firmware Version < 4.3
   SiemensScalance Xf-200ba Version-
SiemensScalance Xm400 Firmware Version < 6.3.1
   SiemensScalance Xm400 Version-
SiemensScalance Xp-200 Firmware Version < 4.3
   SiemensScalance Xp-200 Version-
SiemensScalance Xr500 Firmware Version < 6.3.1
   SiemensScalance Xr500 Version-
SiemensScalance Xr-300wg Firmware Version < 4.3
   SiemensScalance Xr-300wg Version-
SiemensSimatic Mv500 Firmware Version < 3.0
   SiemensSimatic Mv500 Version-
SiemensSimatic Net Cp1616 Firmware Version <= 2.7
   SiemensSimatic Net Cp1616 Version-
SiemensSimatic Net Cp1604 Firmware Version <= 2.7
   SiemensSimatic Net Cp1604 Version-
SiemensSimatic S7-1200 Firmware Version < 4.5
   SiemensSimatic S7-1200 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.08% 0.771
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
productcert@siemens.com 8.7 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
productcert@siemens.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.