First published: Mon Feb 08 2016(Updated: )
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service (STOP mode transition) via crafted packets on TCP port 102.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC S7-1511-1 PN CPU | ||
Siemens SIMATIC s7-1511c-1 pn CPU | ||
Siemens SIMATIC s7-1511f-1 pn CPU | ||
Siemens SIMATIC s7-1512c-1 pn CPU | ||
Siemens SIMATIC s7-1513-1 pn CPU | ||
Siemens SIMATIC S7-1513F-1 PN CPU | ||
Siemens SIMATIC S7-1515-2 PN CPU | ||
Siemens SIMATIC S7-1515F-2 PN CPU | ||
Siemens SIMATIC s7-1516-3 pn/dp CPU | ||
Siemens SIMATIC s7-1516f-3 pn/dp CPU | ||
Siemens SIMATIC S7-1517-3 PN/DP CPU | ||
Siemens SIMATIC s7-1517f-3 pn/dp CPU | ||
Siemens SIMATIC S7-1518-4 PN/DP CPU | ||
Siemens SIMATIC s7-1518f-4 pn/dp CPU | ||
Siemens SIMATIC S7-1500 CPU Firmware | <=1.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.