cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-43781,https://securityvulnerability.io/vulnerability/CVE-2024-43781,Insertion of Sensitive Information into Log File Vulnerability Affects SINUMERIK Systems,"A vulnerability has been identified in SINUMERIK 828D V4 (All versions < V4.95 SP3), SINUMERIK 840D sl V4 (All versions < V4.95 SP3 in connection with using Create MyConfig (CMC) <= V4.8 SP1 HF6), SINUMERIK ONE (All versions < V6.23 in connection with using Create MyConfig (CMC) <= V6.6), SINUMERIK ONE (All versions < V6.15 SP4 in connection with using Create MyConfig (CMC) <= V6.6). Affected systems, that have been provisioned with Create MyConfig (CMC), contain a Insertion of Sensitive Information into Log File vulnerability. This could allow a local authenticated user with low privileges to read sensitive information and thus circumvent access restrictions.",Siemens,"Sinumerik 828d V4,Sinumerik 840d Sl V4,Sinumerik One",5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2024-09-10T09:36:51.143Z,0 CVE-2024-41171,https://securityvulnerability.io/vulnerability/CVE-2024-41171,SINUMERIK Devices Vulnerable to Privilege Escalation Attacks,"A vulnerability has been identified in various Siemens SINUMERIK products where access restrictions to scripts executed with elevated privileges are not properly enforced. This flaw affects devices including SINUMERIK 828D, SINUMERIK 840D sl, and SINUMERIK ONE, allowing an authenticated local attacker to escalate privileges, potentially leading to unauthorized control over the system. The issue exists across all versions of SINUMERIK 828D V4 and 840D sl V4, as well as versions of SINUMERIK ONE prior to V6.24, thus posing risks to operational integrity. For more information, visit the official Siemens CERT portal.",Siemens,"Sinumerik 828d V4,Sinumerik 828d V5,Sinumerik 840d Sl V4,Sinumerik One",8.8,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-09-10T09:36:46.244Z,0 CVE-2021-37199,https://securityvulnerability.io/vulnerability/CVE-2021-37199,,"A vulnerability has been identified in SINUMERIK 808D (All versions), SINUMERIK 828D (All versions < V4.95). Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial-of-service in the device.",Siemens,"Sinumerik 808d,Sinumerik 828d",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,false,false,2021-10-12T09:49:37.000Z,0 CVE-2019-10923,https://securityvulnerability.io/vulnerability/CVE-2019-10923,,An attacker with network access to an affected product may cause a denial of service condition by breaking the real-time synchronization (IRT) of the affected installation.,Siemens,"Development/evaluation Kits For Profinet Io: Dk Standard Ethernet Controller,Development/evaluation Kits For Profinet Io: Ek-ertec 200,Development/evaluation Kits For Profinet Io: Ek-ertec 200p,Scalance X-200irt Family (incl. Siplus Net Variants),Simatic Et 200m (incl. Siplus Variants),Simatic Et 200mp Im 155-5 Pn Hf,Simatic Et 200mp Im 155-5 Pn St,Simatic Et 200pro Im 154-3 Pn Hf,Simatic Et 200pro Im 154-4 Pn Hf,Simatic Et 200pro Im 154-8 Pn/dp Cpu,Simatic Et 200pro Im 154-8f Pn/dp Cpu,Simatic Et 200pro Im 154-8fx Pn/dp Cpu,Simatic Et 200s Im 151-8 Pn/dp Cpu,Simatic Et 200s Im 151-8f Pn/dp Cpu,Simatic Et 200sp Im 155-6 Pn Hf,Simatic Et 200sp Im 155-6 Pn St,Simatic Et 200sp Im 155-6 Pn St Ba,Simatic Et200ecopn, 16di, Dc24v, 8xm12,Simatic Et200ecopn, 16do Dc24v/1,3a, 8xm12,Simatic Et200ecopn, 4ao U/i 4xm12,Simatic Et200ecopn, 8 Dio, Dc24v/1,3a, 8xm12,Simatic Et200ecopn, 8 Do, Dc24v/2a, 8xm12,Simatic Et200ecopn, 8ai Rtd/tc 8xm12,Simatic Et200ecopn, 8ai; 4 U/i; 4 Rtd/tc 8xm12,Simatic Et200ecopn, 8di, Dc24v, 4xm12,Simatic Et200ecopn, 8di, Dc24v, 8xm12,Simatic Et200ecopn, 8do, Dc24v/0,5a, 4xm12,Simatic Et200ecopn, 8do, Dc24v/1,3a, 4xm12,Simatic Et200ecopn, 8do, Dc24v/1,3a, 8xm12,Simatic Et200ecopn: Io-link Master,Simatic Et200s (incl. Siplus Variants),Simatic Net Cp 1604,Simatic Net Cp 1616,Simatic Pn/pn Coupler (incl. Siplus Net Variants),Simatic S7-300 Cpu 314c-2 Pn/dp,Simatic S7-300 Cpu 315-2 Pn/dp,Simatic S7-300 Cpu 315f-2 Pn/dp,Simatic S7-300 Cpu 315t-3 Pn/dp,Simatic S7-300 Cpu 317-2 Pn/dp,Simatic S7-300 Cpu 317f-2 Pn/dp,Simatic S7-300 Cpu 317t-3 Pn/dp,Simatic S7-300 Cpu 317tf-3 Pn/dp,Simatic S7-300 Cpu 319-3 Pn/dp,Simatic S7-300 Cpu 319f-3 Pn/dp,Simatic S7-400 Cpu 412-2 Pn V7,Simatic S7-400 Cpu 414-3 Pn/dp V7,Simatic S7-400 Cpu 414f-3 Pn/dp V7,Simatic S7-400 Cpu 416-3 Pn/dp V7,Simatic S7-400 Cpu 416f-3 Pn/dp V7,Simatic S7-400 Pn/dp V6 And Below Cpu Family (incl. Siplus Variants),Simatic Winac Rtx 2010,Simatic Winac Rtx F 2010,Simotion,Sinamics Dcm,Sinamics Dcp,Sinamics G110m V4.7 Control Unit,Sinamics G120 V4.7 Control Unit (incl. Siplus Variants),Sinamics G130 V4.7 Control Unit,Sinamics G150 Control Unit,Sinamics Gh150 V4.7 Control Unit,Sinamics Gl150 V4.7 Control Unit,Sinamics Gm150 V4.7 Control Unit,Sinamics S110 Control Unit,Sinamics S120 V4.7 Control Unit And Cbe20 (incl. Siplus Variants),Sinamics S150 Control Unit,Sinamics Sl150 V4.7 Control Unit,Sinamics Sm120 V4.7 Control Unit,Sinumerik 828d,Sinumerik 840d Sl,Siplus Et 200mp Im 155-5 Pn Hf,Siplus Et 200mp Im 155-5 Pn Hf T1 Rail,Siplus Et 200mp Im 155-5 Pn St,Siplus Et 200mp Im 155-5 Pn St Tx Rail,Siplus Et 200s Im 151-8 Pn/dp Cpu,Siplus Et 200s Im 151-8f Pn/dp Cpu,Siplus Et 200sp Im 155-6 Pn Hf,Siplus Et 200sp Im 155-6 Pn Hf T1 Rail,Siplus Et 200sp Im 155-6 Pn St,Siplus Et 200sp Im 155-6 Pn St Ba,Siplus Et 200sp Im 155-6 Pn St Ba Tx Rail,Siplus Et 200sp Im 155-6 Pn St Tx Rail,Siplus S7-300 Cpu 314c-2 Pn/dp,Siplus S7-300 Cpu 315-2 Pn/dp,Siplus S7-300 Cpu 315f-2 Pn/dp,Siplus S7-300 Cpu 317-2 Pn/dp,Siplus S7-300 Cpu 317f-2 Pn/dp,Siplus S7-400 Cpu 414-3 Pn/dp V7,Siplus S7-400 Cpu 416-3 Pn/dp V7",7.5,HIGH,0.0012000000569969416,false,,false,false,false,,false,false,2019-10-10T13:49:24.000Z,0 CVE-2019-10936,https://securityvulnerability.io/vulnerability/CVE-2019-10936,,"Affected devices improperly handle large amounts of specially crafted UDP packets. This could allow an unauthenticated remote attacker to trigger a denial of service condition.",Siemens,"Development/evaluation Kits For Profinet Io: Dk Standard Ethernet Controller,Development/evaluation Kits For Profinet Io: Ek-ertec 200,Development/evaluation Kits For Profinet Io: Ek-ertec 200p,Simatic Cfu Pa,Simatic Et 200al Im 157-1 Pn,Simatic Et 200m (incl. Siplus Variants),Simatic Et 200mp Im 155-5 Pn Ba,Simatic Et 200mp Im 155-5 Pn Hf,Simatic Et 200mp Im 155-5 Pn St,Simatic Et 200pro Im 154-3 Pn Hf,Simatic Et 200pro Im 154-4 Pn Hf,Simatic Et 200pro Im 154-8 Pn/dp Cpu,Simatic Et 200pro Im 154-8f Pn/dp Cpu,Simatic Et 200pro Im 154-8fx Pn/dp Cpu,Simatic Et 200s Im 151-8 Pn/dp Cpu,Simatic Et 200s Im 151-8f Pn/dp Cpu,Simatic Et 200sp Im 155-6 Pn Ba,Simatic Et 200sp Im 155-6 Pn Ha (incl. Siplus Variants),Simatic Et 200sp Im 155-6 Pn Hf,Simatic Et 200sp Im 155-6 Pn Hs,Simatic Et 200sp Im 155-6 Pn St,Simatic Et 200sp Im 155-6 Pn St Ba,Simatic Et 200sp Im 155-6 Pn/2 Hf,Simatic Et 200sp Im 155-6 Pn/3 Hf,Simatic Et 200sp Open Controller Cpu 1515sp Pc (incl. Siplus Variants),Simatic Et200ecopn, 16di, Dc24v, 8xm12,Simatic Et200ecopn, 16do Dc24v/1,3a, 8xm12,Simatic Et200ecopn, 4ao U/i 4xm12,Simatic Et200ecopn, 8 Dio, Dc24v/1,3a, 8xm12,Simatic Et200ecopn, 8 Do, Dc24v/2a, 8xm12,Simatic Et200ecopn, 8ai Rtd/tc 8xm12,Simatic Et200ecopn, 8ai; 4 U/i; 4 Rtd/tc 8xm12,Simatic Et200ecopn, 8di, Dc24v, 4xm12,Simatic Et200ecopn, 8di, Dc24v, 8xm12,Simatic Et200ecopn, 8do, Dc24v/0,5a, 4xm12,Simatic Et200ecopn, 8do, Dc24v/1,3a, 4xm12,Simatic Et200ecopn, 8do, Dc24v/1,3a, 8xm12,Simatic Et200ecopn: Io-link Master,Simatic Et200s (incl. Siplus Variants),Simatic Hmi Comfort Outdoor Panels (incl. Siplus Variants),Simatic Hmi Comfort Panels (incl. Siplus Variants),Simatic Hmi Ktp Mobile Panels,Simatic Pn/pn Coupler,Simatic Profinet Driver,Simatic S7-1200 Cpu Family (incl. Siplus Variants),Simatic S7-1500 Cpu Family (incl. Related Et200 Cpus And Siplus Variants),Simatic S7-1500 Software Controller,Simatic S7-300 Cpu 314c-2 Pn/dp,Simatic S7-300 Cpu 315-2 Pn/dp,Simatic S7-300 Cpu 315f-2 Pn/dp,Simatic S7-300 Cpu 315t-3 Pn/dp,Simatic S7-300 Cpu 317-2 Pn/dp,Simatic S7-300 Cpu 317f-2 Pn/dp,Simatic S7-300 Cpu 317t-3 Pn/dp,Simatic S7-300 Cpu 317tf-3 Pn/dp,Simatic S7-300 Cpu 319-3 Pn/dp,Simatic S7-300 Cpu 319f-3 Pn/dp,Simatic S7-400 Cpu 412-2 Pn V7,Simatic S7-400 Cpu 414-3 Pn/dp V7,Simatic S7-400 Cpu 414f-3 Pn/dp V7,Simatic S7-400 Cpu 416-3 Pn/dp V7,Simatic S7-400 Cpu 416f-3 Pn/dp V7,Simatic S7-400 H V6 Cpu Family (incl. Siplus Variants),Simatic S7-400 Pn/dp V6 And Below Cpu Family (incl. Siplus Variants),Simatic S7-410 V8 Cpu Family (incl. Siplus Variants),Simatic Tdc Cp51m1,Simatic Tdc Cpu555,Simatic Winac Rtx 2010,Simatic Winac Rtx F 2010,Sinamics Dcm,Sinamics Dcp,Sinamics G110m V4.7 Pn Control Unit,Sinamics G120 V4.7 Pn Control Unit (incl. Siplus Variants),Sinamics G130 V4.7 Control Unit,Sinamics G150 Control Unit,Sinamics Gh150 V4.7 Control Unit,Sinamics Gl150 V4.7 Control Unit,Sinamics Gm150 V4.7 Control Unit,Sinamics S110 Control Unit,Sinamics S120 V4.7 Control Unit (incl. Siplus Variants),Sinamics S150 Control Unit,Sinamics Sl150 V4.7 Control Unit,Sinamics Sm120 V4.7 Control Unit,Sinumerik 828d,Sinumerik 840d Sl,Siplus Et 200mp Im 155-5 Pn Hf,Siplus Et 200mp Im 155-5 Pn Hf T1 Rail,Siplus Et 200mp Im 155-5 Pn St,Siplus Et 200mp Im 155-5 Pn St Tx Rail,Siplus Et 200s Im 151-8 Pn/dp Cpu,Siplus Et 200s Im 151-8f Pn/dp Cpu,Siplus Et 200sp Im 155-6 Pn Hf,Siplus Et 200sp Im 155-6 Pn Hf T1 Rail,Siplus Et 200sp Im 155-6 Pn Hf Tx Rail,Siplus Et 200sp Im 155-6 Pn St,Siplus Et 200sp Im 155-6 Pn St Ba,Siplus Et 200sp Im 155-6 Pn St Ba Tx Rail,Siplus Et 200sp Im 155-6 Pn St Tx Rail,Siplus Net Pn/pn Coupler,Siplus S7-300 Cpu 314c-2 Pn/dp,Siplus S7-300 Cpu 315-2 Pn/dp,Siplus S7-300 Cpu 315f-2 Pn/dp,Siplus S7-300 Cpu 317-2 Pn/dp,Siplus S7-300 Cpu 317f-2 Pn/dp,Siplus S7-400 Cpu 414-3 Pn/dp V7,Siplus S7-400 Cpu 416-3 Pn/dp V7",7.5,HIGH,0.0020699999295175076,false,,false,false,false,,false,false,2019-10-10T00:00:00.000Z,0 CVE-2018-11464,https://securityvulnerability.io/vulnerability/CVE-2018-11464,,"A vulnerability has been identified in SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). The integrated VNC server on port 5900/tcp of the affected products could allow a remote attacker to cause a Denial-of-Service condition of the VNC server. Please note that this vulnerability is only exploitable if port 5900/tcp is manually opened in the firewall configuration of network port X130. The security vulnerability could be exploited by an attacker with network access to the affected devices and port. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise availability of the VNC server. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,"Sinumerik 828d V4.7, Sinumerik 840d Sl V4.7, Sinumerik 840d Sl V4.8",3.7,LOW,0.0012100000167265534,false,,false,false,false,,false,false,2018-12-12T16:00:00.000Z,0 CVE-2018-11465,https://securityvulnerability.io/vulnerability/CVE-2018-11465,,"A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). A local attacker could use ioctl calls to do out of bounds reads, arbitrary writes, or execute code in kernel mode. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,"Sinumerik 808d V4.7, Sinumerik 808d V4.8, Sinumerik 828d V4.7, Sinumerik 840d Sl V4.7, Sinumerik 840d Sl V4.8",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,false,false,2018-12-12T16:00:00.000Z,0 CVE-2018-11463,https://securityvulnerability.io/vulnerability/CVE-2018-11463,,"A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). A buffer overflow in the service command application could allow a local attacker to execute code with elevated privileges. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,"Sinumerik 808d V4.7, Sinumerik 808d V4.8, Sinumerik 828d V4.7, Sinumerik 840d Sl V4.7, Sinumerik 840d Sl V4.8",7.8,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,2018-12-12T16:00:00.000Z,0 CVE-2018-11462,https://securityvulnerability.io/vulnerability/CVE-2018-11462,,"A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). By sending a specially crafted authentication request to the affected systems a remote attacker could escalate his privileges to an elevated user account but not to root. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,"Sinumerik 808d V4.7, Sinumerik 808d V4.8, Sinumerik 828d V4.7, Sinumerik 840d Sl V4.7, Sinumerik 840d Sl V4.8",9.8,CRITICAL,0.003710000077262521,false,,false,false,false,,false,false,2018-12-12T16:00:00.000Z,0 CVE-2018-11461,https://securityvulnerability.io/vulnerability/CVE-2018-11461,,"A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). A local attacker with user privileges could use the service command application for privilege escalation to an elevated user but not root. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,"Sinumerik 808d V4.7, Sinumerik 808d V4.8, Sinumerik 828d V4.7, Sinumerik 840d Sl V4.7, Sinumerik 840d Sl V4.8",6.6,MEDIUM,0.0004199999966658652,false,,false,false,false,,false,false,2018-12-12T16:00:00.000Z,0 CVE-2018-11459,https://securityvulnerability.io/vulnerability/CVE-2018-11459,,"A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). A local attacker could modify a user-writeable configuration file so that after reboot or manual initiation the system reloads the modified configuration file and attacker-controlled code is executed with elevated privileges. The security vulnerability could be exploited by an attacker with local access to the affected system. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,"Sinumerik 808d V4.7, Sinumerik 808d V4.8, Sinumerik 828d V4.7, Sinumerik 840d Sl V4.7, Sinumerik 840d Sl V4.8",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,false,false,2018-12-12T16:00:00.000Z,0 CVE-2018-11458,https://securityvulnerability.io/vulnerability/CVE-2018-11458,,"A vulnerability has been identified in SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). The integrated VNC server on port 5900/tcp of the affected products could allow a remote attacker to execute code with privileged permissions on the system by sending specially crafted network requests to port 5900/tcp. Please note that this vulnerability is only exploitable if port 5900/tcp is manually opened in the firewall configuration of network port X130. The security vulnerability could be exploited by an attacker with network access to the affected devices and port. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the VNC server. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,"Sinumerik 828d V4.7, Sinumerik 840d Sl V4.7, Sinumerik 840d Sl V4.8",8.1,HIGH,0.011989999562501907,false,,false,false,false,,false,false,2018-12-12T16:00:00.000Z,0 CVE-2018-11457,https://securityvulnerability.io/vulnerability/CVE-2018-11457,,"A vulnerability has been identified in SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). The integrated web server on port 4842/tcp of the affected products could allow a remote attacker to execute code with privileged permissions on the system by sending specially crafted network requests to port 4842/tcp. Please note that this vulnerability is only exploitable if port 4842/tcp is manually opened in the firewall configuration of network port X130. The security vulnerability could be exploited by an attacker with network access to the affected devices on port 4842/tcp. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the web server. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,"Sinumerik 828d V4.7, Sinumerik 840d Sl V4.7, Sinumerik 840d Sl V4.8",8.1,HIGH,0.01080000028014183,false,,false,false,false,,false,false,2018-12-12T16:00:00.000Z,0 CVE-2018-11460,https://securityvulnerability.io/vulnerability/CVE-2018-11460,,"A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). A local attacker with elevated user privileges (manufact) could modify a CRAMFS archive so that after reboot the system loads the modified CRAMFS file and attacker-controlled code is executed with root privileges. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires elevated user privileges (manufact) but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.",Siemens,"Sinumerik 808d V4.7, Sinumerik 808d V4.8, Sinumerik 828d V4.7, Sinumerik 840d Sl V4.7, Sinumerik 840d Sl V4.8",7.8,HIGH,0.0004199999966658652,false,,false,false,false,,false,false,2018-12-12T16:00:00.000Z,0 CVE-2018-11466,https://securityvulnerability.io/vulnerability/CVE-2018-11466,,"A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). Specially crafted network packets sent to port 102/tcp (ISO-TSAP) could allow a remote attacker to either cause a Denial-of-Service condition of the integrated software firewall or allow to execute code in the context of the software firewall. The security vulnerability could be exploited by an attacker with network access to the affected systems on port 102/tcp. Successful exploitation requires no user privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known",Siemens,"Sinumerik 808d V4.7, Sinumerik 808d V4.8, Sinumerik 828d V4.7, Sinumerik 840d Sl V4.7, Sinumerik 840d Sl V4.8",9.8,CRITICAL,0.014229999855160713,false,,false,false,false,,false,false,2018-12-12T16:00:00.000Z,0 CVE-2018-4843,https://securityvulnerability.io/vulnerability/CVE-2018-4843,,"A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIMATIC ET 200pro IM154-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8F PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8FX PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V1.7.0), SIMATIC S7-1500 Software Controller (All versions < V1.7.0), SIMATIC S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIMATIC S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317TF-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319F-3 PN/DP (All versions < V3.2.16), SIMATIC S7-400 CPU 412-2 PN V7 (All versions < V7.0.3), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.9), SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.7), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions < V8.1), SIMATIC WinAC RTX 2010 (All versions < V2010 SP3), SIMATIC WinAC RTX F 2010 (All versions < V2010 SP3), SINUMERIK 828D (All versions < V4.7 SP6 HF1), SIPLUS ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIPLUS ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIPLUS S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), Softnet PROFINET IO for PC-based Windows systems (All versions). Responding to a PROFINET DCP request with a specially crafted PROFINET DCP packet could cause a denial of service condition of the requesting system. The security vulnerability could be exploited by an attacker located on the same Ethernet segment (OSI Layer 2) as the targeted device. A manual restart is required to recover the system.",Siemens,"Simatic S7-400 Cpu 414-3 Pn/dp V7,Simatic S7-400 Cpu 414f-3 Pn/dp V7,Simatic S7-400 Cpu 416-3 Pn/dp V7,Simatic S7-400 Cpu 416f-3 Pn/dp V7,Simatic Cp 343-1 (incl. Siplus Variants),Simatic Cp 343-1 Advanced (incl. Siplus Variants),Simatic Cp 443-1,Simatic Cp 443-1 Advanced,Simatic Et 200pro Im154-8 Pn/dp Cpu,Simatic Et 200pro Im154-8f Pn/dp Cpu,Simatic Et 200pro Im154-8fx Pn/dp Cpu,Simatic Et 200s Im151-8 Pn/dp Cpu,Simatic Et 200s Im151-8f Pn/dp Cpu,Simatic S7-1500 Cpu Family (incl. Related Et200 Cpus And Siplus Variants),Simatic S7-1500 Software Controller,Simatic S7-300 Cpu 314c-2 Pn/dp,Simatic S7-300 Cpu 315-2 Pn/dp,Simatic S7-300 Cpu 315f-2 Pn/dp,Simatic S7-300 Cpu 315t-3 Pn/dp,Simatic S7-300 Cpu 317-2 Pn/dp,Simatic S7-300 Cpu 317f-2 Pn/dp,Simatic S7-300 Cpu 317t-3 Pn/dp,Simatic S7-300 Cpu 317tf-3 Pn/dp,Simatic S7-300 Cpu 319-3 Pn/dp,Simatic S7-300 Cpu 319f-3 Pn/dp,Simatic S7-400 Cpu 412-2 Pn V7,Simatic S7-400 H V6 Cpu Family (incl. Siplus Variants),Simatic S7-400 Pn/dp V6 Cpu Family (incl. Siplus Variants),Simatic S7-410 Cpu Family (incl. Siplus Variants),Simatic Winac Rtx 2010,Simatic Winac Rtx F 2010,Sinumerik 828d,Siplus Et 200s Im151-8 Pn/dp Cpu,Siplus Et 200s Im151-8f Pn/dp Cpu,Siplus Net Cp 443-1,Siplus Net Cp 443-1 Advanced,Siplus S7-300 Cpu 314c-2 Pn/dp,Siplus S7-300 Cpu 315-2 Pn/dp,Siplus S7-300 Cpu 315f-2 Pn/dp,Siplus S7-300 Cpu 317-2 Pn/dp,Siplus S7-300 Cpu 317f-2 Pn/dp,Siplus S7-400 Cpu 414-3 Pn/dp V7,Siplus S7-400 Cpu 416-3 Pn/dp V7,Softnet Profinet Io For Pc-based Windows Systems",6.5,MEDIUM,0.000699999975040555,false,,false,false,false,,false,false,2018-03-20T14:00:00.000Z,0 CVE-2017-2681,https://securityvulnerability.io/vulnerability/CVE-2017-2681,,Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.,Siemens,"Development/evaluation Kits For Profinet Io: Dk Standard Ethernet Controller,Development/evaluation Kits For Profinet Io: Ek-ertec 200,Development/evaluation Kits For Profinet Io: Ek-ertec 200p,Ie/as-i Link Pn Io,Ie/pb-link (incl. Siplus Net Variants),Scalance M-800 Family (incl. S615, Mum-800 And Rm1224),Scalance W-700 Ieee 802.11n Family,Scalance X-200 Family (incl. Siplus Net Variants),Scalance X-200irt Family (incl. Siplus Net Variants),Scalance X-300 Family (incl. X408 And Siplus Net Variants),Scalance X408 Family,Scalance X414,Scalance Xm-400 Family,Scalance Xr-500 Family,Simatic Cm 1542-1,Simatic Cm 1542sp-1,Simatic Cp 1243-1 (incl. Siplus Variants),Simatic Cp 1243-1 Dnp3 (incl. Siplus Variants),Simatic Cp 1243-1 Iec (incl. Siplus Variants),Simatic Cp 1243-8 Irc,Simatic Cp 1542sp-1 Irc (incl. Siplus Variants),Simatic Cp 1543-1 (incl. Siplus Variants),Simatic Cp 1543sp-1 (incl. Siplus Variants),Simatic Cp 1604,Simatic Cp 1616,Simatic Cp 343-1 (incl. Siplus Variants),Simatic Cp 343-1 Advanced (incl. Siplus Variants),Simatic Cp 343-1 Lean (incl. Siplus Variants),Simatic Cp 443-1 (incl. Siplus Variants),Simatic Cp 443-1 Advanced (incl. Siplus Variants),Simatic Cp 443-1 Opc Ua,Simatic Dk-16xx Pn Io,Simatic Et 200al Im 157-1 Pn,Simatic Et 200m (incl. Siplus Variants),Simatic Et 200mp Im 155-5 Pn Ba,Simatic Et 200mp Im 155-5 Pn Hf,Simatic Et 200mp Im 155-5 Pn St,Simatic Et 200pro Im 154-3 Pn Hf,Simatic Et 200pro Im 154-4 Pn Hf,Simatic Et 200sp Im 155-6 Pn Ba,Simatic Et 200sp Im 155-6 Pn Hf,Simatic Et 200sp Im 155-6 Pn Hs,Simatic Et 200sp Im 155-6 Pn St,Simatic Et 200sp Im 155-6 Pn St Ba,Simatic Et200ecopn, 16di, Dc24v, 8xm12,Simatic Et200ecopn, 16do Dc24v/1,3a, 8xm12,Simatic Et200ecopn, 4ao U/i 4xm12,Simatic Et200ecopn, 8 Dio, Dc24v/1,3a, 8xm12,Simatic Et200ecopn, 8 Do, Dc24v/2a, 8xm12,Simatic Et200ecopn, 8ai Rtd/tc 8xm12,Simatic Et200ecopn, 8ai; 4 U/i; 4 Rtd/tc 8xm12,Simatic Et200ecopn, 8di, Dc24v, 4xm12,Simatic Et200ecopn, 8di, Dc24v, 8xm12,Simatic Et200ecopn, 8do, Dc24v/0,5a, 4xm12,Simatic Et200ecopn, 8do, Dc24v/1,3a, 4xm12,Simatic Et200ecopn, 8do, Dc24v/1,3a, 8xm12,Simatic Et200ecopn: Io-link Master,Simatic Et200s (incl. Siplus Variants),Simatic Hmi Comfort Panels, Hmi Multi Panels, Hmi Mobile Panels (incl. Siplus Variants),Simatic Mv420 Sr-b,Simatic Mv420 Sr-b Body,Simatic Mv420 Sr-p,Simatic Mv420 Sr-p Body,Simatic Mv440 Hr,Simatic Mv440 Sr,Simatic Mv440 Ur,Simatic Pn/pn Coupler (incl. Siplus Net Variants),Simatic Rf650r,Simatic Rf680r,Simatic Rf685r,Simatic S7-1200 Cpu Family (incl. Siplus Variants),Simatic S7-1500 Cpu Family (incl. Related Et200 Cpus And Siplus Variants),Simatic S7-1500 Software Controller,Simatic S7-200 Smart,Simatic S7-300 Cpu Family (incl. Related Et200 Cpus And Siplus Variants),Simatic S7-400 H V6 Cpu Family (incl. Siplus Variants),Simatic S7-400 Pn/dp V6 Cpu Family (incl. Siplus Variants),Simatic S7-400 Pn/dp V7 Cpu Family (incl. Siplus Variants),Simatic S7-410 Cpu Family (incl. Siplus Variants),Simatic Tdc Cp51m1,Simatic Tdc Cpu555,Simatic Teleservice Adapter Ie Advanced,Simatic Teleservice Adapter Ie Basic,Simatic Teleservice Adapter Ie Standard,Simatic Winac Rtx 2010,Simatic Winac Rtx F 2010,Simocode Pro V Profinet (incl. Siplus Variants),Simotion,Sinamics Dcm W. Pn,Sinamics Dcp W. Pn,Sinamics G110m W. Pn,Sinamics G120(c/p/d) W. Pn (incl. Siplus Variants),Sinamics G130 V4.7 W. Pn,Sinamics G130 V4.8 W. Pn,Sinamics G150 V4.7 W. Pn,Sinamics G150 V4.8 W. Pn,Sinamics S110 W. Pn,Sinamics S120 Prior To V4.7 W. Pn (incl. Siplus Variants),Sinamics S120 V4.7 Sp1 W. Pn (incl. Siplus Variants),Sinamics S120 V4.7 W. Pn (incl. Siplus Variants),Sinamics S120 V4.8 W. Pn (incl. Siplus Variants),Sinamics S150 V4.7 W. Pn,Sinamics S150 V4.8 W. Pn,Sinamics V90 W. Pn,Sinumerik 828d V4.5 And Prior,Sinumerik 828d V4.7,Sinumerik 840d Sl V4.5 And Prior,Sinumerik 840d Sl V4.7,Siplus Et 200mp Im 155-5 Pn Hf,Siplus Et 200mp Im 155-5 Pn Hf T1 Rail,Siplus Et 200mp Im 155-5 Pn St,Siplus Et 200mp Im 155-5 Pn St Tx Rail,Siplus Et 200sp Im 155-6 Pn Hf,Siplus Et 200sp Im 155-6 Pn Hf T1 Rail,Siplus Et 200sp Im 155-6 Pn St,Siplus Et 200sp Im 155-6 Pn St Ba,Siplus Et 200sp Im 155-6 Pn St Ba Tx Rail,Siplus Et 200sp Im 155-6 Pn St Tx Rail,Sirius Act 3su1 Interface Module Profinet,Sirius Motor Starter M200d Profinet,Sirius Soft Starter 3rw44 Pn,Sitop Psu8600 Profinet,Sitop Ups1600 Profinet (incl. Siplus Variants),Softnet Profinet Io For Pc-based Windows Systems",6.5,MEDIUM,0.0019399999873712659,false,,false,false,false,,false,false,2017-05-11T10:00:00.000Z,0 CVE-2017-2680,https://securityvulnerability.io/vulnerability/CVE-2017-2680,,Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected.,Siemens,"Development/evaluation Kits For Profinet Io: Dk Standard Ethernet Controller,Development/evaluation Kits For Profinet Io: Ek-ertec 200,Development/evaluation Kits For Profinet Io: Ek-ertec 200p,Extension Unit 12"" Profinet,Extension Unit 15"" Profinet,Extension Unit 19"" Profinet,Extension Unit 22"" Profinet,Ie/as-i Link Pn Io,Ie/pb-link (incl. Siplus Net Variants),Scalance M-800 Family (incl. S615, Mum-800 And Rm1224),Scalance W-700 Ieee 802.11n Family,Scalance X-200 Family (incl. Siplus Net Variants),Scalance X-200irt Family (incl. Siplus Net Variants),Scalance X-300 Family (incl. X408 And Siplus Net Variants),Scalance X408 Family,Scalance X414,Scalance Xm-400 Family,Scalance Xr-500 Family,Simatic Cm 1542-1,Simatic Cm 1542sp-1,Simatic Cp 1242-7 V2 (incl. Siplus Variants),Simatic Cp 1243-1 (incl. Siplus Variants),Simatic Cp 1243-1 Dnp3 (incl. Siplus Variants),Simatic Cp 1243-1 Iec (incl. Siplus Variants),Simatic Cp 1243-7 Lte Us,Simatic Cp 1243-8 Irc,Simatic Cp 1542sp-1 Irc (incl. Siplus Variants),Simatic Cp 1543-1 (incl. Siplus Variants),Simatic Cp 1543sp-1 (incl. Siplus Variants),Simatic Cp 1604,Simatic Cp 1616,Simatic Cp 1626,Simatic Cp 343-1 (incl. Siplus Variants),Simatic Cp 343-1 Advanced (incl. Siplus Variants),Simatic Cp 343-1 Lean (incl. Siplus Variants),Simatic Cp 443-1 (incl. Siplus Variants),Simatic Cp 443-1 Advanced (incl. Siplus Variants),Simatic Cp 443-1 Opc Ua,Simatic Dk-16xx Pn Io,Simatic Et 200al Im 157-1 Pn,Simatic Et 200m (incl. Siplus Variants),Simatic Et 200mp Im 155-5 Pn Ba,Simatic Et 200mp Im 155-5 Pn Hf,Simatic Et 200mp Im 155-5 Pn St,Simatic Et 200pro Im 154-3 Pn Hf,Simatic Et 200pro Im 154-4 Pn Hf,Simatic Et 200sp Im 155-6 Pn Ba,Simatic Et 200sp Im 155-6 Pn Hf,Simatic Et 200sp Im 155-6 Pn Hs,Simatic Et 200sp Im 155-6 Pn St,Simatic Et 200sp Im 155-6 Pn St Ba,Simatic Et200ecopn, 16di, Dc24v, 8xm12,Simatic Et200ecopn, 16do Dc24v/1,3a, 8xm12,Simatic Et200ecopn, 4ao U/i 4xm12,Simatic Et200ecopn, 8 Dio, Dc24v/1,3a, 8xm12,Simatic Et200ecopn, 8 Do, Dc24v/2a, 8xm12,Simatic Et200ecopn, 8ai Rtd/tc 8xm12,Simatic Et200ecopn, 8ai; 4 U/i; 4 Rtd/tc 8xm12,Simatic Et200ecopn, 8di, Dc24v, 4xm12,Simatic Et200ecopn, 8di, Dc24v, 8xm12,Simatic Et200ecopn, 8do, Dc24v/0,5a, 4xm12,Simatic Et200ecopn, 8do, Dc24v/1,3a, 4xm12,Simatic Et200ecopn, 8do, Dc24v/1,3a, 8xm12,Simatic Et200ecopn: Io-link Master,Simatic Et200s (incl. Siplus Variants),Simatic Hmi Comfort Panels, Hmi Multi Panels, Hmi Mobile Panels (incl. Siplus Variants),Simatic Mv420 Sr-b,Simatic Mv420 Sr-b Body,Simatic Mv420 Sr-p,Simatic Mv420 Sr-p Body,Simatic Mv440 Hr,Simatic Mv440 Sr,Simatic Mv440 Ur,Simatic Pn/pn Coupler (incl. Siplus Net Variants),Simatic Rf650r,Simatic Rf680r,Simatic Rf685r,Simatic S7-1200 Cpu Family (incl. Siplus Variants),Simatic S7-1500 Cpu Family (incl. Related Et200 Cpus And Siplus Variants),Simatic S7-1500 Software Controller,Simatic S7-200 Smart,Simatic S7-300 Cpu Family (incl. Related Et200 Cpus And Siplus Variants),Simatic S7-400 H V6 Cpu Family (incl. Siplus Variants),Simatic S7-400 Pn/dp V6 Cpu Family (incl. Siplus Variants),Simatic S7-400 Pn/dp V7 Cpu Family (incl. Siplus Variants),Simatic S7-410 Cpu Family (incl. Siplus Variants),Simatic Tdc Cp51m1,Simatic Tdc Cpu555,Simatic Teleservice Adapter Ie Advanced,Simatic Teleservice Adapter Ie Basic,Simatic Teleservice Adapter Ie Standard,Simatic Winac Rtx 2010,Simatic Winac Rtx F 2010,Simocode Pro V Profinet (incl. Siplus Variants),Simotion,Simotion D4xx V4.4 For Sinamics Sm150i-2 W. Profinet (incl. Siplus Variants),Sinamics Dcm W. Pn,Sinamics Dcp W. Pn,Sinamics G110m W. Pn,Sinamics G120(c/p/d) W. Pn (incl. Siplus Variants),Sinamics G130 V4.7 W. Pn,Sinamics G130 V4.8 W. Pn,Sinamics G150 V4.7 W. Pn,Sinamics G150 V4.8 W. Pn,Sinamics Gh150 V4.7 W. Profinet,Sinamics Gl150 V4.7 W. Profinet,Sinamics Gm150 V4.7 W. Profinet,Sinamics S110 W. Pn,Sinamics S120 Prior To V4.7 W. Pn (incl. Siplus Variants),Sinamics S120 V4.7 Sp1 W. Pn (incl. Siplus Variants),Sinamics S120 V4.7 W. Pn (incl. Siplus Variants),Sinamics S120 V4.8 W. Pn (incl. Siplus Variants),Sinamics S150 V4.7 W. Pn,Sinamics S150 V4.8 W. Pn,Sinamics Sl150 V4.7.0 W. Profinet,Sinamics Sl150 V4.7.4 W. Profinet,Sinamics Sl150 V4.7.5 W. Profinet,Sinamics Sm120 V4.7 W. Profinet,Sinamics V90 W. Pn,Sinumerik 828d V4.5 And Prior,Sinumerik 828d V4.7,Sinumerik 840d Sl V4.5 And Prior,Sinumerik 840d Sl V4.7,Siplus Et 200mp Im 155-5 Pn Hf,Siplus Et 200mp Im 155-5 Pn Hf T1 Rail,Siplus Et 200mp Im 155-5 Pn St,Siplus Et 200mp Im 155-5 Pn St Tx Rail,Siplus Et 200sp Im 155-6 Pn Hf,Siplus Et 200sp Im 155-6 Pn Hf T1 Rail,Siplus Et 200sp Im 155-6 Pn St,Siplus Et 200sp Im 155-6 Pn St Ba,Siplus Et 200sp Im 155-6 Pn St Ba Tx Rail,Siplus Et 200sp Im 155-6 Pn St Tx Rail,Sirius Act 3su1 Interface Module Profinet,Sirius Motor Starter M200d Profinet,Sirius Soft Starter 3rw44 Pn,Sitop Psu8600 Profinet,Sitop Ups1600 Profinet (incl. Siplus Variants),Softnet Profinet Io For Pc-based Windows Systems",6.5,MEDIUM,0.0024999999441206455,false,,false,false,false,,false,false,2017-05-11T01:00:00.000Z,0