First published: Wed Mar 01 2017(Updated: )
Siemens SINUMERIK Integrate Operate Clients between 2.0.3.00.016 (including) and 2.0.6 (excluding) and between 3.0.4.00.032 (including) and 3.0.6 (excluding) contain a vulnerability that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINUMERIK Integrate access mymachine/ethernet | ||
Siemens SINUMERIK Integrate Operate Client | =2.0.3.00.016 | |
Siemens SINUMERIK Integrate Operate Client | =3.0.4.00.032 | |
Siemens SINUMERIK Operate v4.8 SP8 | =4.5-sp6 | |
Siemens SINUMERIK Operate v4.8 SP8 | =4.7-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2685 has a critical severity rating due to its potential to allow unauthorized data access during TLS sessions.
To fix CVE-2017-2685, update the Siemens SINUMERIK Integrate Operate Clients to a version after 2.0.6 and 3.0.6.
CVE-2017-2685 affects Siemens SINUMERIK Integrate Operate Clients versions 2.0.3.00.016 to 2.0.6 and 3.0.4.00.032 to 3.0.6.
CVE-2017-2685 can be exploited by a man-in-the-middle (MITM) attack.
Currently, there is no official workaround for CVE-2017-2685 recommended by Siemens, so updating is essential.