Description
Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again.
Reserved 2023-09-28 | Published 2023-11-14 | Updated 2024-08-13 | Assigner
siemensLOW: 2.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Problem types
CWE-400: Uncontrolled Resource Consumption
Product status
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before V8.1
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
Default status
unknown
Any version before *
affected
References
cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf
cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf
cert-portal.siemens.com/productcert/html/ssa-699386.html
cert-portal.siemens.com/productcert/html/ssa-180704.html
cert-portal.siemens.com/productcert/html/ssa-602936.html
cert-portal.siemens.com/productcert/html/ssa-353002.html
cert-portal.siemens.com/productcert/html/ssa-087301.html
cve.org (CVE-2023-44321)
nvd.nist.gov (CVE-2023-44321)
Download JSON