We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-48364



Assignersiemens
Reserved2023-11-15
Published2024-02-13
Updated2024-09-10

Description

A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain malformed RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server.



MEDIUM: 6.5CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
HIGH: 7.1CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-476: NULL Pointer Dereference

Product status

Default status
unknown

All versions < V9.1 SP2 UC05
affected

Default status
unknown

All versions < V9.1 SP2 UC05
affected

Default status
unknown

Any version before V9.1 SP2 UC05
affected

Default status
unknown

All versions < V9.1 SP2 UC05
affected

Default status
unknown

Any version before V18 Update 4
affected

Default status
unknown

Any version before V19 Update 2
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V7.5 SP2 Update 15
affected

Default status
unknown

Any version before V8.0 Update 4
affected

References

https://cert-portal.siemens.com/productcert/html/ssa-753746.html

cve.org CVE-2023-48364

nvd.nist.gov CVE-2023-48364

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.