A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application allows an attacker to add their own login credentials to the device. This allows an attacker to remotely login as root and take control of the device even after the affected device is fully set up.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 08:33
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf - Patch, Vendor Advisory |
12 Jan 2024, 15:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf - Patch, Vendor Advisory | |
CPE | cpe:2.3:a:siemens:simatic_cn_4100:*:*:*:*:*:*:*:* | |
First Time |
Siemens simatic Cn 4100
Siemens |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
09 Jan 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-09 10:15
Updated : 2024-11-21 08:33
NVD link : CVE-2023-49251
Mitre link : CVE-2023-49251
CVE.ORG link : CVE-2023-49251
JSON object : View
Products Affected
siemens
- simatic_cn_4100
CWE
CWE-639
Authorization Bypass Through User-Controlled Key