First published: Mon Feb 08 2016(Updated: )
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens S7-1500 CPU firmware | =1.8.2 | |
Siemens SIMATIC S7-1511-1 PN CPU | ||
Siemens SIMATIC S7-1511C-1 PN CPU | ||
Siemens SIMATIC S7-1500 CPU 1511f-1 PN | ||
Siemens SIMATIC S7-1500 CPU 1512C-1 PN | ||
Siemens SIMATIC S7-1513-1 PN CPU | ||
Siemens SIMATIC S7-1500 CPU 1513f-1 PN | ||
Siemens SIMATIC S7-1515-2 PN CPU | ||
Siemens SIMATIC S7-1515F-2 PN CPU | ||
Siemens SIMATIC s7-1516-3 pn/dp CPU | ||
Siemens SIMATIC s7-1516f-3 pn/dp CPU | ||
Siemens SIMATIC S7-1517-3 PN/DP CPU | ||
Siemens SIMATIC s7-1517f-3 pn/dp CPU | ||
Siemens SIMATIC S7-1518-4 PN/DP CPU | ||
Siemens SIMATIC s7-1518f-4 pn/dp CPU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2201 is classified as a medium severity vulnerability.
To fix CVE-2016-2201, update the Siemens SIMATIC S7-1500 CPU devices to firmware version 1.8.3 or later.
CVE-2016-2201 affects Siemens SIMATIC S7-1500 CPU devices running firmware versions prior to 1.8.3.
CVE-2016-2201 can be exploited by remote attackers to bypass a replay protection mechanism.
The attack vector for CVE-2016-2201 is through packets sent to TCP port 102.