THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2023-50821

Assignersiemens
Reserved2023-12-14
Published2024-04-09
Updated2024-07-09

Description

A vulnerability has been identified in SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC04), SIMATIC WinCC Runtime Professional V17 (All versions), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 1), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 16), SIMATIC WinCC V8.0 (All versions < V8.0 Update 5). The affected products do not properly validate the input provided in the login dialog box. An attacker could leverage this vulnerability to cause a persistent denial of service condition.



MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unknown

Any version before V9.1 SP2 UC04
affected

Default status
unknown

All versions
affected

Default status
unknown

Any version before V18 Update 4
affected

Default status
unknown

Any version before V19 Update 1
affected

Default status
unknown

Any version before V7.5 SP2 Update 16
affected

Default status
unknown

Any version before V8.0 Update 5
affected

References

https://cert-portal.siemens.com/productcert/html/ssa-730482.html

cve.org CVE-2023-50821

nvd.nist.gov CVE-2023-50821

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-50821
© Copyright 2024 THREATINT. Made in Cyprus with +