We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-50821



Description

A vulnerability has been identified in SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC04), SIMATIC WinCC Runtime Professional V17 (All versions < V17 Update 8), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 1), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 16), SIMATIC WinCC V8.0 (All versions < V8.0 Update 5). The affected products do not properly validate the input provided in the login dialog box. An attacker could leverage this vulnerability to cause a persistent denial of service condition.

Reserved 2023-12-14 | Published 2024-04-09 | Updated 2025-02-26 | Assigner siemens


MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unknown

Any version before V9.1 SP2 UC04
affected

Default status
unknown

Any version before V17 Update 8
affected

Default status
unknown

Any version before V18 Update 4
affected

Default status
unknown

Any version before V19 Update 1
affected

Default status
unknown

Any version before V7.5 SP2 Update 16
affected

Default status
unknown

Any version before V8.0 Update 5
affected

References

cert-portal.siemens.com/productcert/html/ssa-730482.html

cve.org (CVE-2023-50821)

nvd.nist.gov (CVE-2023-50821)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-50821

Support options

Helpdesk Chat, Email, Knowledgebase