Siemens Simatic Winac Rtx 2010 vulnerabilities

12 known vulnerabilities affecting siemens/simatic_winac_rtx_2010.

Total CVEs
12
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH10MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2022-25622HIGHCVSS 7.5vAll versions2022-04-12
CVE-2022-25622 [HIGH] CWE-400 CVE-2022-25622: The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined. This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments.
cvelistv5nvd
CVE-2020-15791MEDIUMCVSS 6.5vAll versions2020-09-09
CVE-2020-15791 [MEDIUM] CWE-522 CVE-2020-15791: A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLU A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 CPU family (incl. SIPLUS variants) (All versions), SIMATIC WinAC RTX (F) 2010 (All versions), SINUMERIK 840D sl (All versions). The authentication protocol between a client and a PLC via port 102/tcp (ISO-TSA
cvelistv5nvd
CVE-2019-19300HIGHCVSS 7.5fixed in *2020-04-14
CVE-2019-19300 [HIGH] CWE-400 CVE-2019-19300: A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, De A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, KTK ATE530S, SIDOOR ATD430W, SIDOOR ATE530S COATED, SIDOOR ATE531S, SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0), SIMATIC ET 200eco PN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET 20
cvelistv5nvd
CVE-2019-13940HIGHCVSS 7.5vAll versions2020-02-11
CVE-2019-13940 [HIGH] CWE-400 CVE-2019-13940: A vulnerability has been identified in SIMATIC ET 200pro IM154-8 PN/DP CPU (All versions < V3.X.17), A vulnerability has been identified in SIMATIC ET 200pro IM154-8 PN/DP CPU (All versions < V3.X.17), SIMATIC ET 200pro IM154-8F PN/DP CPU (All versions < V3.X.17), SIMATIC ET 200pro IM154-8FX PN/DP CPU (All versions < V3.X.17), SIMATIC ET 200S IM151-8 PN/DP CPU (All versions < V3.X.17), SIMATIC ET 200S IM151-8F PN/DP CPU (All versions < V3.X.17), SIMA
cvelistv5nvd
CVE-2019-10936HIGHCVSS 7.5vAll versions < V2010 SP32019-10-10
CVE-2019-10936 [HIGH] CWE-400 CVE-2019-10936: Affected devices improperly handle large amounts of specially crafted UDP packets. This could all Affected devices improperly handle large amounts of specially crafted UDP packets. This could allow an unauthenticated remote attacker to trigger a denial of service condition.
cvelistv5nvd
CVE-2019-13921HIGHCVSS 7.5vsp1vsp22019-10-10
CVE-2019-13921 [HIGH] CWE-410 CVE-2019-13921: A vulnerability has been identified in SIMATIC WinAC RTX (F) 2010 (All versions < SP3 Update 1). Aff A vulnerability has been identified in SIMATIC WinAC RTX (F) 2010 (All versions < SP3 Update 1). Affected versions of the software contain a vulnerability that could allow an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large HTTP request is sent to the executing service. The security vulne
nvd
CVE-2019-10923HIGHCVSS 7.5vAll versions < V2010 SP32019-10-10
CVE-2019-10923 [HIGH] CWE-400 CVE-2019-10923: An attacker with network access to an affected product may cause a denial of service condition by br An attacker with network access to an affected product may cause a denial of service condition by breaking the real-time synchronization (IRT) of the affected installation.
cvelistv5nvd
CVE-2019-6568HIGHCVSS 7.5vAll versions < V2010 SP32019-04-17
CVE-2019-6568 [HIGH] CWE-125 CVE-2019-6568: The webserver of the affected devices contains a vulnerability that may lead to a denial of service The webserver of the affected devices contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation which leads to a restart of the webserver of the affected device. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploita
cvelistv5nvd
CVE-2018-4843MEDIUMCVSS 6.5vAll versions < V2010 SP32018-03-20
CVE-2018-4843 [MEDIUM] CWE-20 CVE-2018-4843: A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 Advan
cvelistv5nvd
CVE-2017-12741HIGHCVSS 8.7vAll versions < V2010 SP32017-12-26
CVE-2017-12741 [HIGH] CWE-400 CVE-2017-12741: Specially crafted packets sent to port 161/udp could cause a denial of service condition. The affect Specially crafted packets sent to port 161/udp could cause a denial of service condition. The affected devices must be restarted manually.
cvelistv5nvd
CVE-2017-2681HIGHCVSS 7.1vAll versions < V2010 SP32017-05-11
CVE-2017-2681 [HIGH] CWE-400 CVE-2017-2681: Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected pro Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.
cvelistv5nvd
CVE-2017-2680HIGHCVSS 7.1vAll versions < V2010 SP32017-05-11
CVE-2017-2680 [HIGH] CWE-400 CVE-2017-2680: Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affect Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected.
cvelistv5nvd