A vulnerability has been identified in LOGO! CMR2020 (All versions < V2.2), LOGO! CMR2040 (All versions < V2.2), SIMATIC RTU3010C (All versions < V4.0.9), SIMATIC RTU3030C (All versions < V4.0.9), SIMATIC RTU3031C (All versions < V4.0.9), SIMATIC RTU3041C (All versions < V4.0.9). The underlying TCP/IP stack does not properly calculate the random numbers used as ISN (Initial Sequence Numbers). An adjacent attacker with network access to the LAN interface could interfere with traffic, spoof the connection and gain access to sensitive information.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
21 Nov 2024, 06:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf - Patch, Vendor Advisory |
Information
Published : 2021-09-14 11:15
Updated : 2024-11-21 06:14
NVD link : CVE-2021-37186
Mitre link : CVE-2021-37186
CVE.ORG link : CVE-2021-37186
JSON object : View
Products Affected
siemens
- logo\!_cmr2020
- simatic_rtu3031c_firmware
- simatic_rtu3010c_firmware
- simatic_rtu3030c
- simatic_rtu3041c_firmware
- logo\!_cmr2020_firmware
- simatic_rtu3041c
- simatic_rtu3030c_firmware
- simatic_rtu3031c
- simatic_rtu3010c
- logo\!_cmr2040_firmware
- logo\!_cmr2040
CWE
CWE-330
Use of Insufficiently Random Values