First published: Tue Apr 14 2020(Updated: )
A vulnerability has been identified in TIM 3V-IE (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-IE Advanced (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-IE DNP3 (incl. SIPLUS NET variants) (All versions < V3.3), TIM 4R-IE (incl. SIPLUS NET variants) (All versions < V2.8), TIM 4R-IE DNP3 (incl. SIPLUS NET variants) (All versions < V3.3). The affected versions contain an open debug port that is available under certain specific conditions. The vulnerability is only available if the IP address is configured to 192.168.1.2. If available, the debug port could be exploited by an attacker with network access to the device. No user interaction is required to exploit this vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the affected device. At the stage of publishing this security advisory no public exploitation is known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Tim 3v-ie Firmware | <2.8 | |
Siemens Tim 3v-ie | ||
Siemens Tim 3v-ie Advanced Firmware | <2.8 | |
Siemens Tim 3v-ie Advanced | ||
Siemens Tim 4r-ie Firmware | <3.3 | |
Siemens Tim 4r-ie | ||
Siemens Tim 3v-ie Dnp3 Firmware | <2.8 | |
Siemens Tim 3v-ie Dnp3 | ||
Siemens Tim 4r-ie Dnp3 Firmware | <3.3 | |
Siemens Tim 4r-ie Dnp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.