A vulnerability has been identified in SIMATIC TDC CP51M1 (All versions < V1.1.7). An attacker with network access to the device could cause a Denial-of-Service condition by sending a specially crafted UDP packet. The vulnerability affects the UDP communication of the device. The security vulnerability could be exploited without authentication. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-250618.pdf | Patch Vendor Advisory |
https://www.us-cert.gov/ics/advisories/icsa-19-253-05 | |
https://cert-portal.siemens.com/productcert/pdf/ssa-250618.pdf | Patch Vendor Advisory |
https://www.us-cert.gov/ics/advisories/icsa-19-253-05 |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-250618.pdf - Patch, Vendor Advisory | |
References | () https://www.us-cert.gov/ics/advisories/icsa-19-253-05 - |
Information
Published : 2019-09-13 17:15
Updated : 2024-11-21 04:20
NVD link : CVE-2019-10937
Mitre link : CVE-2019-10937
CVE.ORG link : CVE-2019-10937
JSON object : View
Products Affected
siemens
- simatic_tdc_cp51m1_firmware
- simatic_tdc_cp51m1
CWE
CWE-20
Improper Input Validation