First published: Mon Mar 15 2021(Updated: )
A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC MV440 SR | <7.0.6 | |
Siemens SIMATIC MV440 SR Firmware | ||
Siemens SIMATIC MV440 HR | <7.0.6 | |
Siemens SIMATIC MV440 HR Firmware | ||
Siemens SIMATIC MV440 UR | <7.0.6 | |
Siemens SIMATIC MV440 | ||
Siemens SIMATIC MV420 SR-B Body Firmware | <7.0.6 | |
Siemens SIMATIC MV420 SR-B Body Firmware | ||
Siemens Simatic MV420 Firmware | <7.0.6 | |
Siemens Simatic MV420 | ||
Siemens Simatic MV420 Firmware | <7.0.6 | |
Siemens SIMATIC MV420 SR-B Body Firmware | ||
Siemens Simatic MV420 Firmware | <7.0.6 | |
Siemens SIMATIC MV420 SR-P |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25241 is rated as a medium severity vulnerability due to the potential for an attacker to disrupt TCP sessions.
To fix CVE-2020-25241, users should upgrade their SIMATIC MV400 family devices to versions 7.0.6 or higher.
CVE-2020-25241 affects all versions of the SIMATIC MV400 family prior to 7.0.6.
CVE-2020-25241 enables an attacker to terminate arbitrary TCP sessions using malformed TCP RST packets.
Yes, CVE-2020-25241 can be exploited remotely due to the nature of the TCP stack vulnerability.