A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application uses default credential with admin privileges. An attacker could use the credentials to gain complete control of the affected device.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 08:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf - Patch, Vendor Advisory |
11 Jan 2024, 22:46
Type | Values Removed | Values Added |
---|---|---|
First Time |
Siemens simatic Cn 4100
Siemens |
|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-777015.pdf - Patch, Vendor Advisory | |
CPE | cpe:2.3:a:siemens:simatic_cn_4100:*:*:*:*:*:*:*:* |
09 Jan 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-09 10:15
Updated : 2024-11-21 08:33
NVD link : CVE-2023-49621
Mitre link : CVE-2023-49621
CVE.ORG link : CVE-2023-49621
JSON object : View
Products Affected
siemens
- simatic_cn_4100
CWE
CWE-1392
Use of Default Credentials