CVE-2021-41769

A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MU85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7KE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SA86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ81 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SK82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SK85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SL86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SS85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7ST85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SX85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UM85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7UT85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VK87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 Compact 7SX800 devices (CPU variant CP050) (All versions < V8.83). An improper input validation vulnerability in the web server could allow an unauthenticated user to access device information.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:6md85_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6md85:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:6md86_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6md86:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:6md89_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6md89:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:6mu85_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:6mu85:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:7ke85_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7ke85:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:siemens:7sa82_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sa82:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:siemens:7sa86_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sa86:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:siemens:7sa87_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sa87:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:siemens:7sd82_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sd82:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:siemens:7sd86_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sd86:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:siemens:7sd87_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sd87:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:siemens:7sj81_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sj81:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:siemens:7sj82_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sj82:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:siemens:7sj85_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sj85:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:siemens:7sj86_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sj86:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:siemens:7sk82_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sk82:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:siemens:7sk85_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sk85:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:siemens:7sl82_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sl82:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:siemens:7sl86_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sl86:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:siemens:7sl87_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sl87:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:siemens:7ss85_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7ss85:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:siemens:7st85_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7st85:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:siemens:7sx800_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sx800:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:siemens:7sx85_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7sx85:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:siemens:7um85_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7um85:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:siemens:7ut82_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7ut82:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:siemens:7ut85_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7ut85:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:siemens:7ut86_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7ut86:-:*:*:*:*:*:*:*

Configuration 29 (hide)

AND
cpe:2.3:o:siemens:7ut87_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7ut87:-:*:*:*:*:*:*:*

Configuration 30 (hide)

AND
cpe:2.3:o:siemens:7ve85_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7ve85:-:*:*:*:*:*:*:*

Configuration 31 (hide)

AND
cpe:2.3:o:siemens:7vk87_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:7vk87:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:26

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-439673.pdf - Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-439673.pdf - Vendor Advisory

Information

Published : 2022-01-11 12:15

Updated : 2024-11-21 06:26


NVD link : CVE-2021-41769

Mitre link : CVE-2021-41769

CVE.ORG link : CVE-2021-41769


JSON object : View

Products Affected

siemens

  • 7sl87
  • 7ss85_firmware
  • 7sx85_firmware
  • 7sj86_firmware
  • 7sj86
  • 7st85
  • 7ke85_firmware
  • 7sx85
  • 7st85_firmware
  • 7ut86_firmware
  • 6mu85_firmware
  • 7sk82_firmware
  • 7sx800_firmware
  • 7sd82_firmware
  • 7sk82
  • 7sj82_firmware
  • 7sa82
  • 7ut85_firmware
  • 7ut86
  • 7ss85
  • 6md85_firmware
  • 7sa87_firmware
  • 7sd86
  • 6md85
  • 6mu85
  • 7sd87_firmware
  • 7sl82_firmware
  • 7sj85
  • 7ut85
  • 7sl82
  • 6md89_firmware
  • 6md86_firmware
  • 7sd87
  • 7sa86
  • 7sd82
  • 7sj85_firmware
  • 7vk87
  • 7sk85_firmware
  • 6md86
  • 7vk87_firmware
  • 7sk85
  • 7sa82_firmware
  • 7sj82
  • 7um85
  • 7sj81
  • 7sl86_firmware
  • 7sx800
  • 7ut87
  • 7ve85_firmware
  • 7ve85
  • 7sj81_firmware
  • 7sd86_firmware
  • 7ke85
  • 7sa86_firmware
  • 7sl87_firmware
  • 7ut82_firmware
  • 7ut82
  • 6md89
  • 7um85_firmware
  • 7ut87_firmware
  • 7sl86
  • 7sa87
CWE
CWE-20

Improper Input Validation