A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The affected application allows IP configuration change without authentication to the device. This could allow an attacker to cause denial of service condition.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 08:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf - Patch, Vendor Advisory |
11 Jan 2024, 22:43
Type | Values Removed | Values Added |
---|---|---|
First Time |
Siemens simatic Cn 4100
Siemens |
|
CPE | cpe:2.3:a:siemens:simatic_cn_4100:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-noinfo | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf - Patch, Vendor Advisory |
09 Jan 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-09 10:15
Updated : 2024-11-21 08:33
NVD link : CVE-2023-49252
Mitre link : CVE-2023-49252
CVE.ORG link : CVE-2023-49252
JSON object : View
Products Affected
siemens
- simatic_cn_4100
CWE