Home

Description

A vulnerability has been identified in SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC04), SIMATIC WinCC Runtime Professional V17 (All versions < V17 Update 8), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 1), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 16), SIMATIC WinCC V8.0 (All versions < V8.0 Update 5). The affected products do not properly validate the input provided in the login dialog box. An attacker could leverage this vulnerability to cause a persistent denial of service condition.

PUBLISHED Reserved 2023-12-14 | Published 2024-04-09 | Updated 2025-02-26 | Assigner siemens




MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unknown

Any version before V9.1 SP2 UC04
affected

Default status
unknown

Any version before V17 Update 8
affected

Default status
unknown

Any version before V18 Update 4
affected

Default status
unknown

Any version before V19 Update 1
affected

Default status
unknown

Any version before V7.5 SP2 Update 16
affected

Default status
unknown

Any version before V8.0 Update 5
affected

References

cert-portal.siemens.com/productcert/html/ssa-730482.html

cert-portal.siemens.com/productcert/html/ssa-730482.html

cve.org (CVE-2023-50821)

nvd.nist.gov (CVE-2023-50821)

Download JSON