First published: Sat Dec 07 2013(Updated: )
Siemens SINAMICS S/G controllers with firmware before 4.6.11 do not require authentication for FTP and TELNET sessions, which allows remote attackers to bypass intended access restrictions via TCP traffic to port (1) 21 or (2) 23.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINAMICS s/g family firmware | <=4.6 | |
Siemens SINAMICS G110 | ||
Siemens SINAMICS G110D | ||
Siemens SINAMICS G120 firmware | ||
Siemens SINAMICS G120C | ||
Siemens SINAMICS G120D | ||
Siemens SINAMICS G120P | ||
Siemens Sinamics G130 | ||
Siemens Sinamics G150 Firmware | ||
Siemens SINAMICS G180 | ||
Siemens SINAMICS S110 firmware | ||
Siemens Sinamics S120 Firmware | ||
Siemens SINAMICS S120CM | ||
Siemens SINAMICS S150 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6920 is classified as a high severity vulnerability due to the lack of authentication for FTP and TELNET sessions.
To fix CVE-2013-6920, users should upgrade to firmware version 4.6.11 or later for affected Siemens SINAMICS S/G controllers.
CVE-2013-6920 affects Siemens SINAMICS S/G controllers with firmware versions prior to 4.6.11, including models like G110, G120, and others.
CVE-2013-6920 allows remote attackers to bypass access restrictions, potentially compromising system integrity and security.
There are no documented workarounds for CVE-2013-6920; the recommended action is to update to the patched firmware.