First published: Mon Feb 08 2016(Updated: )
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic S7-1500 Cpu Firmware | =1.8.2 | |
Siemens Simatic S7-1511-1 Pn Cpu | ||
Siemens Simatic S7-1511c-1 Pn Cpu | ||
Siemens Simatic S7-1511f-1 Pn Cpu | ||
Siemens Simatic S7-1512c-1 Pn Cpu | ||
Siemens Simatic S7-1513-1 Pn Cpu | ||
Siemens Simatic S7-1513f-1 Pn Cpu | ||
Siemens Simatic S7-1515-2 Pn Cpu | ||
Siemens Simatic S7-1515f-2 Pn Cpu | ||
Siemens Simatic S7-1516-3 Pn\/dp Cpu | ||
Siemens Simatic S7-1516f-3 Pn\/dp Cpu | ||
Siemens Simatic S7-1517-3 Pn\/dp Cpu | ||
Siemens Simatic S7-1517f-3 Pn\/dp Cpu | ||
Siemens Simatic S7-1518-4 Pn\/dp Cpu | ||
Siemens Simatic S7-1518f-4 Pn\/dp Cpu |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.