First published: Sat Mar 07 2015(Updated: )
Siemens SIMATIC S7-300 CPU devices allow remote attackers to cause a denial of service (defect-mode transition) via crafted packets on (1) TCP port 102 or (2) Profibus.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC S7-300 CPU Firmware | ||
Siemens SIMATIC S7-300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2177 has been classified as a high severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2015-2177, ensure that your Siemens SIMATIC S7-300 CPU devices are updated to the latest firmware version provided by Siemens.
CVE-2015-2177 affects Siemens SIMATIC S7-300 CPU devices that are exposed to crafted packets over TCP port 102 or Profibus.
Attackers can exploit CVE-2015-2177 to send crafted packets that trigger a defect-mode transition in affected devices, leading to a denial of service.
CVE-2015-2177 was disclosed in 2015, highlighting vulnerabilities in Siemens SIMATIC S7-300 products.