First published: Mon Dec 14 2020(Updated: )
A vulnerability has been identified in SIMATIC ET 200SP Open Controller (incl. SIPLUS variants) (V20.8), SIMATIC S7-1500 Software Controller (V20.8). The web server of the affected products contains a vulnerability that could allow a remote attacker to trigger a denial-of-service condition by sending a specially crafted HTTP request.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic Et 200sp Open Controller Firmware | <=20.8 | |
Siemens Simatic Et 200sp Open Controller | ||
Siemens Simatic S7-1500 Software Controller Firmware | <=20.8 | |
Siemens SIMATIC S7-1500 Software Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15796 is a vulnerability identified in SIMATIC ET 200SP Open Controller (incl. SIPLUS variants) (V20.8) and SIMATIC S7-1500 Software Controller (V20.8), where the web server of the affected products contains a vulnerability that could allow a remote attacker to trigger a denial-of-service condition.
CVE-2020-15796 has a severity rating of 7.5 (high).
SIMATIC ET 200SP Open Controller (incl. SIPLUS variants) (V20.8) and SIMATIC S7-1500 Software Controller (V20.8) are affected by CVE-2020-15796.
A remote attacker can exploit CVE-2020-15796 by sending specially crafted requests to the web server, triggering a denial-of-service condition.
Yes, Siemens has provided a security advisory with mitigation measures for CVE-2020-15796. Please refer to the official reference link for more information.