CVE-2023-29105Missing Standardized Error Handling Mechanism in Siemens Simatic Cloud Connect 7 Cc712

Severity
7.5HIGHNVD
CNA5.9
EPSS
0.3%
top 44.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 9

Description

A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 = V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions < V2.1). The affected device is vulnerable to a denial of service while parsing a random (non-JSON) MQTT payload. This could allow an attacker who can manipulate the communication between the MQTT broker and the affected device to cause a denial of service (DoS).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5siemens/simatic_cloud_connect_7_cc712All versions < V2.1, All versions >= V2.0 < V2.1+1
CVEListV5siemens/simatic_cloud_connect_7_cc716All versions < V2.1, All versions >= V2.0 < V2.1+1

Patches

🔴Vulnerability Details

2
CVEList
CVE-2023-29105: A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V22023-05-09
GHSA
GHSA-fr6w-4xgh-4mgc: A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V22023-05-09
CVE-2023-29105 — Siemens vulnerability | cvebase