Siemens

Simatic S7-1500 Cpu 1517-3 Pn/dp Firmware

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 12.12.2023 12:15:13
  • Last modified 21.11.2024 08:27:59

Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a denial of service condition. A restart is needed to restore normal operations.

  • EPSS 0.12%
  • Published 10.01.2023 12:15:23
  • Last modified 21.11.2024 07:17:03

Affected devices do not contain an Immutable Root of Trust in Hardware. With this the integrity of the code executed on the device can not be validated during load-time. An attacker with physical access to the device could use this to replace the boo...

  • EPSS 0.12%
  • Published 13.12.2022 16:15:14
  • Last modified 21.11.2024 06:23:57

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

  • EPSS 0.09%
  • Published 13.12.2022 16:15:14
  • Last modified 21.11.2024 06:31:23

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

  • EPSS 0.09%
  • Published 13.12.2022 16:15:14
  • Last modified 21.11.2024 06:31:23

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

  • EPSS 0.08%
  • Published 13.12.2022 16:15:14
  • Last modified 21.11.2024 06:31:24

Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial of service in the device.

  • EPSS 0.19%
  • Published 08.11.2022 11:15:10
  • Last modified 21.11.2024 07:03:11

The login endpoint /FormLogin in affected web services does not apply proper origin checking. This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack.