var-202107-1608
Vulnerability from variot

Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large amount of DCP reset packets are sent to the device. Multiple Siemens products contain vulnerabilities in resource allocation without restrictions or throttling.Service operation interruption (DoS) It may be in a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Siemens SCALANCE S602是德国西门子(Siemens)公司的一款工业安全设备. Siemens多款产品 存在安全漏洞,该漏洞允许攻击者执行拒绝服务攻击。以下产品和版本受到影响:Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions), RUGGEDCOM RM1224 (All Versions < 6.4), SCALANCE M-800 (All Versions < 6.4), SCALANCE S615 (All Versions < 6.4), SCALANCE W1700 IEEE 802.11ac (All versions), SCALANCE W700 IEEE 802.11n (All versions), SCALANCE X200-4 P IRT (All Versions < V5.5.0), SCALANCE X201-3P IRT (All Versions < V5.5.0), SCALANCE X201-3P IRT PRO (All Versions < V5.5.0), SCALANCE X202-2 IRT (All Versions < V5.5.0), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All Versions < V5.5.0), SCALANCE X202-2P IRT PRO (All Versions < V5.5.0), SCALANCE X204 IRT (All Versions < V5.5.0), SCALANCE X204 IRT PRO (All Versions < V5.5.0), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions), SCALANCE X204-2FM (All versions), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions), SCALANCE X204-2LD TS (All versions), SCALANCE X204-2TS (All versions), SCALANCE X206-1 (All versions), SCALANCE X206-1LD (incl. SIPLUS NET variant) (All versions), SCALANCE X208 (incl. SIPLUS NET variant) (All versions), SCALANCE X208PRO (All versions), SCALANCE X212-2 (All versions), SCALANCE X212-2LD (All versions), SCALANCE X216 (All versions), SCALANCE X224 (All versions), SCALANCE X302-7EEC (All versions), SCALANCE X304-2FE (All versions), SCALANCE X306-1LDFE (All versions), SCALANCE X307-2EEC (All versions), SCALANCE X307-3 (All versions), SCALANCE X307-3LD (All versions), SCALANCE X308-2 (incl. SIPLUS NET variant) (All versions), SCALANCE X308-2LD (All versions), SCALANCE X308-2LH (All versions), SCALANCE X308-2LH+ (All versions), SCALANCE X308-2M (All versions), SCALANCE X308-2M POE (All versions), SCALANCE X308-2M TS (All versions), SCALANCE X310 (All versions), SCALANCE X310FE (All versions), SCALANCE X320-1FE (All versions), SCALANCE X320-3LDFE (All versions), SCALANCE XB-200 (All versions), SCALANCE XC-200 (All versions), SCALANCE XF-200BA (All versions), SCALANCE XF201-3P IRT (All Versions < V5.5.0), SCALANCE XF202-2P IRT (All Versions < V5.5.0), SCALANCE XF204 (All versions), SCALANCE XF204 IRT (All Versions < V5.5.0), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions), SCALANCE XF204-2BA IRT (All Versions < V5.5.0), SCALANCE XF206-1 (All versions), SCALANCE XF208 (All versions), SCALANCE XM400 (All versions < V6.3.1), SCALANCE XP-200 (All versions), SCALANCE XR-300WG (All versions), SCALANCE XR324-12M (All versions), SCALANCE XR324-12M TS (All versions), SCALANCE XR324-4M EEC (All versions), SCALANCE XR324-4M POE (All versions), SCALANCE XR324-4M POE TS (All versions), SCALANCE XR500 (All versions < V6.3.1), SIMATIC CFU PA (All versions), SIMATIC IE/PB-LINK V3 (All versions), SIMATIC MV500 family (All versions < V3.0), SIMATIC NET CM 1542-1 (All versions), SIMATIC NET CP1616/CP1604 (All Versions >= V2.7), SIMATIC NET CP1626 (All versions), SIMATIC NET DK-16xx PN IO (All Versions >= V2.7), SIMATIC PROFINET Driver (All versions), SIMATIC Power Line Booster PLB, Base Module (MLFB: 6ES7972-5AA10-0AB0) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All Versions < V4.5), SIMOCODE proV Ethernet/IP (All versions < V1.1.3), SIMOCODE proV PROFINET (All versions < V2.1.3), SOFTNET-IE PNIO (All versions)

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1608",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "scalance x206-1",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance x201-3p irt pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.5.0",
         },
         {
            model: "softnet-ie pnio",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance x310fe",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic net cp1604",
            scope: "lte",
            trust: 1,
            vendor: "siemens",
            version: "2.7",
         },
         {
            model: "scalance xr324-12m",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance x306-1ldfe",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance x304-2fe",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simocode prov profinet",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "2.1.3",
         },
         {
            model: "simatic net cm 1542-1",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance w1700",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance x206-1ld",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance x308-2m poe",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance xf204-2",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance x202-2p irt pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.5.0",
         },
         {
            model: "scalance x310",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance xr324-4m poe ts",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simocode prov ethernet\\/ip",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.1.3",
         },
         {
            model: "scalance x204 irt",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.5.0",
         },
         {
            model: "dk standard ethernet controller evaluation kit",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance x308-2lh\\+",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance xf204-2ba irt",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.5.0",
         },
         {
            model: "scalance x308-2m",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance x204-2",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance xf204",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance x307-3ld",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance xr324-4m poe",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance xf206-1",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance x204 irt pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.5.0",
         },
         {
            model: "simatic ie\\/pb-link v3",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance x308-2lh",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance x308-2",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance x307-2eec",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "ek-ertec 200 evaulation kit",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance x320-1fe",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance xr324-12m ts",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic power line booster plb",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic profinet driver",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "2.3",
         },
         {
            model: "scalance x201-3p irt",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.5.0",
         },
         {
            model: "scalance x208",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance m-800",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.4",
         },
         {
            model: "scalance x308-2ld",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic mv500",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "3.0",
         },
         {
            model: "scalance x212-2",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance xb-200",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "4.3",
         },
         {
            model: "scalance xf-200ba",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "4.3",
         },
         {
            model: "scalance x208pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance x204-2ts",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance x308-2m ts",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance xf204 irt",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.5.0",
         },
         {
            model: "scalance w700",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic net dk-16xx pn io",
            scope: "lte",
            trust: 1,
            vendor: "siemens",
            version: "2.7",
         },
         {
            model: "scalance xf202-2p irt",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.5.0",
         },
         {
            model: "scalance x307-3",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic s7-1200",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "4.5",
         },
         {
            model: "simatic cfu pa",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance xr500",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.3.1",
         },
         {
            model: "scalance x302-7eec",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "ek-ertec 200p evaluation kit",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "4.7",
         },
         {
            model: "scalance xf201-3p irt",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.5.0",
         },
         {
            model: "scalance xc-200",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "4.3",
         },
         {
            model: "scalance x200-4 p irt",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.5.0",
         },
         {
            model: "scalance x204-2ld ts",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance x204-2ld",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance xr-300wg",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "4.3",
         },
         {
            model: "scalance xp-200",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "4.3",
         },
         {
            model: "scalance x320-3ldfe",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance s615",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.4",
         },
         {
            model: "scalance x224",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "simatic net cp1626",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance xr324-4m eec",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "scalance xf208",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance x216",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance x212-2ld",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "simatic net cp1616",
            scope: "lte",
            trust: 1,
            vendor: "siemens",
            version: "2.7",
         },
         {
            model: "scalance xm400",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.3.1",
         },
         {
            model: "ruggedcom rm1224",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.4",
         },
         {
            model: "scalance x202-2 irt",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.5.0",
         },
         {
            model: "scalance x204-2fm",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "5.2.5",
         },
         {
            model: "scalance x200-4p irt",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "dk standard ethernet controller evaluation kit",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "scalance w1700",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "scalance s615",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "ek-ertec 200p evaluation kit",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "scalance x201-3p irt",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "ek-ertec 200 evaluation kit",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "scalance w700",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "scalance m-800",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
         {
            model: "ruggedcom rm1224",
            scope: null,
            trust: 0.8,
            vendor: "シーメンス",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-010133",
         },
         {
            db: "NVD",
            id: "CVE-2020-28400",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens reported this vulnerability to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202107-901",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-28400",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CVE-2020-28400",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-28400",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 2,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2020-28400",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2020-28400",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "productcert@siemens.com",
                  id: "CVE-2020-28400",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2020-28400",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202107-901",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-010133",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-901",
         },
         {
            db: "NVD",
            id: "CVE-2020-28400",
         },
         {
            db: "NVD",
            id: "CVE-2020-28400",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large amount of DCP reset packets are sent to the device. Multiple Siemens products contain vulnerabilities in resource allocation without restrictions or throttling.Service operation interruption (DoS) It may be in a state. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Siemens SCALANCE S602是德国西门子(Siemens)公司的一款工业安全设备. \nSiemens多款产品 存在安全漏洞,该漏洞允许攻击者执行拒绝服务攻击。以下产品和版本受到影响:Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions), RUGGEDCOM RM1224 (All Versions < 6.4), SCALANCE M-800 (All Versions < 6.4), SCALANCE S615 (All Versions < 6.4), SCALANCE W1700 IEEE 802.11ac (All versions), SCALANCE W700 IEEE 802.11n (All versions), SCALANCE X200-4 P IRT (All Versions < V5.5.0), SCALANCE X201-3P IRT (All Versions < V5.5.0), SCALANCE X201-3P IRT PRO (All Versions < V5.5.0), SCALANCE X202-2 IRT (All Versions < V5.5.0), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All Versions < V5.5.0), SCALANCE X202-2P IRT PRO (All Versions < V5.5.0), SCALANCE X204 IRT (All Versions < V5.5.0), SCALANCE X204 IRT PRO (All Versions < V5.5.0), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions), SCALANCE X204-2FM (All versions), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions), SCALANCE X204-2LD TS (All versions), SCALANCE X204-2TS (All versions), SCALANCE X206-1 (All versions), SCALANCE X206-1LD (incl. SIPLUS NET variant) (All versions), SCALANCE X208 (incl. SIPLUS NET variant) (All versions), SCALANCE X208PRO (All versions), SCALANCE X212-2 (All versions), SCALANCE X212-2LD (All versions), SCALANCE X216 (All versions), SCALANCE X224 (All versions), SCALANCE X302-7EEC (All versions), SCALANCE X304-2FE (All versions), SCALANCE X306-1LDFE (All versions), SCALANCE X307-2EEC (All versions), SCALANCE X307-3 (All versions), SCALANCE X307-3LD (All versions), SCALANCE X308-2 (incl. SIPLUS NET variant) (All versions), SCALANCE X308-2LD (All versions), SCALANCE X308-2LH (All versions), SCALANCE X308-2LH+ (All versions), SCALANCE X308-2M (All versions), SCALANCE X308-2M POE (All versions), SCALANCE X308-2M TS (All versions), SCALANCE X310 (All versions), SCALANCE X310FE (All versions), SCALANCE X320-1FE (All versions), SCALANCE X320-3LDFE (All versions), SCALANCE XB-200 (All versions), SCALANCE XC-200 (All versions), SCALANCE XF-200BA (All versions), SCALANCE XF201-3P IRT (All Versions < V5.5.0), SCALANCE XF202-2P IRT (All Versions < V5.5.0), SCALANCE XF204 (All versions), SCALANCE XF204 IRT (All Versions < V5.5.0), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions), SCALANCE XF204-2BA IRT (All Versions < V5.5.0), SCALANCE XF206-1 (All versions), SCALANCE XF208 (All versions), SCALANCE XM400 (All versions < V6.3.1), SCALANCE XP-200 (All versions), SCALANCE XR-300WG (All versions), SCALANCE XR324-12M (All versions), SCALANCE XR324-12M TS (All versions), SCALANCE XR324-4M EEC (All versions), SCALANCE XR324-4M POE (All versions), SCALANCE XR324-4M POE TS (All versions), SCALANCE XR500 (All versions < V6.3.1), SIMATIC CFU PA (All versions), SIMATIC IE/PB-LINK V3 (All versions), SIMATIC MV500 family (All versions < V3.0), SIMATIC NET CM 1542-1 (All versions), SIMATIC NET CP1616/CP1604 (All Versions >= V2.7), SIMATIC NET CP1626 (All versions), SIMATIC NET DK-16xx PN IO (All Versions >= V2.7), SIMATIC PROFINET Driver (All versions), SIMATIC Power Line Booster PLB, Base Module (MLFB: 6ES7972-5AA10-0AB0) (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All Versions < V4.5), SIMOCODE proV Ethernet/IP (All versions < V1.1.3), SIMOCODE proV PROFINET (All versions < V2.1.3), SOFTNET-IE PNIO (All versions)",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-28400",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-010133",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-901",
         },
         {
            db: "VULMON",
            id: "CVE-2020-28400",
         },
      ],
      trust: 2.79,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-28400",
            trust: 3.3,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-194-03",
            trust: 2.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-599968",
            trust: 1.7,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-010133",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2401",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021071416",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-901",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-28400",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-28400",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-010133",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-901",
         },
         {
            db: "NVD",
            id: "CVE-2020-28400",
         },
      ],
   },
   id: "VAR-202107-1608",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5447269509677419,
   },
   last_update_date: "2024-08-14T12:06:49.974000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSA-599968",
            trust: 0.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf",
         },
         {
            title: "Siemens Various product security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=156594",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=77fc0ba2dcd8966c9a1f7eb47b8603ca",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-28400",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-010133",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-901",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-770",
            trust: 1,
         },
         {
            problemtype: "Allocation of resources without limits or throttling (CWE-770) [NVD evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-010133",
         },
         {
            db: "NVD",
            id: "CVE-2020-28400",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.2,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-03",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf",
         },
         {
            trust: 1,
            url: "https://cert-portal.siemens.com/productcert/html/ssa-599968.html",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-28400",
         },
         {
            trust: 0.8,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-21-194-03",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/siemens-ruggedcom-simatic-denial-of-service-via-profinet-dcp-reset-35890",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021071416",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2401",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/770.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-599968.txt",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-28400",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-010133",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-901",
         },
         {
            db: "NVD",
            id: "CVE-2020-28400",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2020-28400",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-010133",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-901",
         },
         {
            db: "NVD",
            id: "CVE-2020-28400",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-07-13T00:00:00",
            db: "VULMON",
            id: "CVE-2020-28400",
         },
         {
            date: "2022-06-22T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-010133",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-07-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202107-901",
         },
         {
            date: "2021-07-13T11:15:08.960000",
            db: "NVD",
            id: "CVE-2020-28400",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-07-13T00:00:00",
            db: "VULMON",
            id: "CVE-2020-28400",
         },
         {
            date: "2022-06-22T02:38:00",
            db: "JVNDB",
            id: "JVNDB-2021-010133",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2022-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202107-901",
         },
         {
            date: "2024-06-11T09:15:09.487000",
            db: "NVD",
            id: "CVE-2020-28400",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202107-901",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Vulnerability in limiting or non-slotting resource allocation in multiple Siemens products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-010133",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202107-901",
         },
      ],
      trust: 1.2,
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.