We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-48364



Description

A vulnerability has been identified in OpenPCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 UC05), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 15), SIMATIC WinCC V8.0 (All versions < V8.0 Update 4). The implementation of the RPC (Remote Procedure call) communication protocol in the affected products do not properly handle certain malformed RPC messages. An attacker could use this vulnerability to cause a denial of service condition in the RPC server.

Reserved 2023-11-15 | Published 2024-02-13 | Updated 2024-09-10 | Assigner siemens


MEDIUM: 6.5CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
HIGH: 7.1CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-476: NULL Pointer Dereference

Product status

Default status
unknown

All versions < V9.1 SP2 UC05
affected

Default status
unknown

All versions < V9.1 SP2 UC05
affected

Default status
unknown

Any version before V9.1 SP2 UC05
affected

Default status
unknown

All versions < V9.1 SP2 UC05
affected

Default status
unknown

Any version before V18 Update 4
affected

Default status
unknown

Any version before V19 Update 2
affected

Default status
unknown

Any version before *
affected

Default status
unknown

Any version before V7.5 SP2 Update 15
affected

Default status
unknown

Any version before V8.0 Update 4
affected

References

cert-portal.siemens.com/productcert/html/ssa-753746.html

cve.org (CVE-2023-48364)

nvd.nist.gov (CVE-2023-48364)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-48364

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.