{"id": "CVE-2023-38380", "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "productcert@siemens.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2023-12-12T12:15:11.477", "references": [{"url": "https://cert-portal.siemens.com/productcert/html/ssa-139628.html", "source": "productcert@siemens.com"}, {"url": "https://cert-portal.siemens.com/productcert/html/ssa-625862.html", "source": "productcert@siemens.com"}, {"url": "https://cert-portal.siemens.com/productcert/html/ssa-693975.html", "source": "productcert@siemens.com"}, {"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-693975.pdf", "tags": ["Vendor Advisory"], "source": "productcert@siemens.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-401"}]}, {"type": "Secondary", "source": "productcert@siemens.com", "description": [{"lang": "en", "value": "CWE-401"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions < V3.4.29), SIMATIC CP 1243-7 LTE (All versions < V3.4.29), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions < V3.4.29), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) (All versions < V3.0.37), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SINAMICS S210 (6SL5...) (All versions >= V6.1 < V6.1 HF2), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) (All versions < V3.0.37). The webserver implementation of the affected products does not correctly release allocated memory after it has been used.\r\n\r\nAn attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product."}, {"lang": "es", "value": "Se ha identificado una vulnerabilidad en:\nSIMATIC CP 1242-7 V2 (incluidas las variantes SIPLUS) (todas las versiones), \nSIMATIC CP 1243-1 (incluidas las variantes SIPLUS) (todas las versiones), \nSIMATIC CP 1243-1 DNP3 (incluidas las variantes SIPLUS) ) (todas las versiones), \nSIMATIC CP 1243-1 IEC (incl. variantes SIPLUS) (todas las versiones), \nSIMATIC CP 1243-7 LTE (todas las versiones), \nSIMATIC CP 1243-8 IRC (todas las versiones), \nSIMATIC CP 1543-1 (Todas las versiones), \nSINAMICS S210 (6SL5...) (Todas las versiones >= V6.1 < V6.1 HF2), \nSIPLUS NET CP 1543-1 (Todas las versiones). \nLa implementaci\u00f3n del servidor web de los productos afectados no libera correctamente la memoria asignada una vez utilizada. Un atacante con acceso a la red podr\u00eda utilizar esta vulnerabilidad para provocar una condici\u00f3n de denegaci\u00f3n de servicio en el servidor web del producto afectado."}], "lastModified": "2024-06-11T12:15:10.630", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:6gk7243-8rx30-0xe0_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBBD0600-DB41-4DE8-97FC-2D180DA1406F"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:6gk7243-8rx30-0xe0:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A50A52E7-D8FE-4071-99B3-3652B0892D07"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:6gk7543-1ax00-0xe0_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF7C15EC-3C83-434B-A313-9035302EEF87"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:6gk7543-1ax00-0xe0:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E42E7B79-A3D2-4AAC-80E2-7E5C19A72CC5"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:6ag1543-1ax00-2xe0_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9373F60E-03D0-4EB2-9774-6479A8F342C7"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:6ag1543-1ax00-2xe0:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F9063778-2B5F-4A32-83C8-6CEB9EE8F9C0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_cp_1242-7_v2_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66A2C7F2-F787-4770-8F56-E2AFF1AFD780"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_cp_1242-7_v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "29D4C72C-4E84-4563-9D66-5C641AB996BA"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "373B769D-0E60-4362-BAE1-90BA6E0B211C"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CA9BB25C-D5E3-43DE-8C73-06BDC43CA960"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_cp_1243-1_dnp3_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1158D559-2A46-4BE4-B16E-C2789AD3C60E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_cp_1243-1_dnp3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2FFBFB96-1A35-4724-831B-68E3A9C32921"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_cp_1243-1_iec_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C3E8B50-07E9-4697-B42D-86B9BE942553"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_cp_1243-1_iec:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DFE96226-A2DF-4A9E-8CBB-8D7CF328E404"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_cp_1243-7_lte_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FC29937-7A70-4A9F-89F8-8D17E285C225"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_cp_1243-7_lte:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BAFC3319-F07C-4784-9873-3E1907FE3080"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEBF14B3-65A0-41E9-B99C-D88548F307CD"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.1:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F151297C-3097-483F-98B5-0261BD547421"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.1:sp1_hotfix8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CEAB952-BBF0-4585-8F12-F25A192FAA1B"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F4D3F85-4CA5-438E-955E-C039F7DE91B1"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:hotfix2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59608DD3-87C3-4ED1-B0C2-AFD31A7A70A3"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:hotfix5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA3D3D7E-CB48-4B8D-8101-CB0DADEEC0B1"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:hotfix6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F8FC52F-3648-410B-8BCB-76129ABC0D4D"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:hotfix7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59BDCF31-2D94-4D7D-9EC8-60726B10DFC7"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D62C3EEA-000C-41CD-8264-4A4B6AE1BAD2"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:sp3_hotfix3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF00EE34-1A68-40F0-A9FC-FBBF268C6400"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:sp3_hotfix5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6BB896A-8C42-416E-AE03-D5A0E122BA79"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:sp3_hotfix6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B18F1100-8157-4E99-AB22-BF51EB1663B3"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:5.2:sp3_hotfix9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA9B1D54-E3A0-4EFF-8EB2-A52B8E1F117F"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:6.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E509394F-9987-41D2-A866-68479FF39DCB"}, {"criteria": "cpe:2.3:o:siemens:sinamics_s210_firmware:6.1:hotfix1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DEB162B-6579-4280-9BCC-403C1B351002"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:sinamics_s210:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7BFA8FB3-12A9-4D2E-BCFD-C66313521C80"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "productcert@siemens.com"}