A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf - Patch, Vendor Advisory |
17 Jul 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-522 |
Information
Published : 2022-02-09 16:15
Updated : 2024-11-21 06:23
NVD link : CVE-2021-40360
Mitre link : CVE-2021-40360
CVE.ORG link : CVE-2021-40360
JSON object : View
Products Affected
siemens
- simatic_pcs_7
- simatic_wincc