Siemens

Simatic S7-1500 Cpu 1513f-1 Pn Firmware

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 12.12.2023 12:15:13
  • Last modified 21.11.2024 08:27:59

Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a denial of service condition. A restart is needed to restore normal operations.

  • EPSS 0.43%
  • Published 12.09.2023 10:15:27
  • Last modified 18.08.2025 14:15:26

The OPC UA implementations (ANSI C and C++) in affected products contain an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation. This could allow an unauthenticated remote atta...

  • EPSS 0.12%
  • Published 10.01.2023 12:15:23
  • Last modified 21.11.2024 07:17:03

Affected devices do not contain an Immutable Root of Trust in Hardware. With this the integrity of the code executed on the device can not be validated during load-time. An attacker with physical access to the device could use this to replace the boo...

  • EPSS 0.12%
  • Published 13.12.2022 16:15:14
  • Last modified 21.11.2024 06:23:57

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

  • EPSS 0.09%
  • Published 13.12.2022 16:15:14
  • Last modified 21.11.2024 06:31:23

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

  • EPSS 0.09%
  • Published 13.12.2022 16:15:14
  • Last modified 21.11.2024 06:31:23

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

  • EPSS 0.08%
  • Published 13.12.2022 16:15:14
  • Last modified 21.11.2024 06:31:24

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

  • EPSS 0.19%
  • Published 08.11.2022 11:15:10
  • Last modified 21.11.2024 07:03:11

The login endpoint /FormLogin in affected web services does not apply proper origin checking. This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack.

  • EPSS 0.54%
  • Published 14.04.2020 20:15:14
  • Last modified 08.07.2025 11:15:22

A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, KTK ATE530S, SIDOOR ATD430W, SIDOOR ATE530S COATED, SIDOOR ATE531S, SIMATIC ET 200AL IM 157-...