CVE-2020-15791Insufficiently Protected Credentials in Siemens Simatic S7-300 CPU Family

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 76.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 9
Latest updateMay 24

Description

A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 CPU family (incl. SIPLUS variants) (All versions), SIMATIC WinAC RTX (F) 2010 (All versions), SINUMERIK 840D sl (All versions). The authentication protocol between a client and a PLC via port 102/tcp (ISO-TSAP) insufficiently protects the transmitted password. This could allow an attacker that is able to intercept the network traffic to obtain valid PLC c

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5siemens/simatic_winac_rtx_2010All versions
CVEListV5siemens/simatic_s7-300_cpu_familyAll versions
CVEListV5siemens/simatic_s7-400_cpu_familyAll versions
CVEListV5siemens/sinumerik_840d_slAll versions

🔴Vulnerability Details

2
GHSA
GHSA-8qxp-fp5j-5wxj: A vulnerability has been identified in SIMATIC S7-300 CPU family (incl2022-05-24
CVEList
CVE-2020-15791: A vulnerability has been identified in SIMATIC S7-300 CPU family (incl2020-09-09
CVE-2020-15791 — Insufficiently Protected Credentials | cvebase