First published: Wed May 12 2021(Updated: )
A vulnerability has been identified in SIMATIC NET CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 Lean (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 Standard (incl. SIPLUS variants) (All versions). Specially crafted packets sent to TCP port 102 could cause a Denial-of-Service condition on the affected devices. A cold restart might be necessary in order to recover.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC NET CP 343-1 Advanced firmware | ||
Siemens SIMATIC NET CP 343-1 Lean Firmware | ||
Siemens SIMATIC NET CP 343-1 Standard | ||
Siemens SIMATIC CP343-1 Advanced Firmware | ||
siemens SIMATIC NET CP 343-1 Advanced | ||
Siemens SIPLUS NET CP 343-1 Lean firmware | ||
Siemens SIMATIC NET CP 343-1 Lean Firmware | ||
Siemens SIMATIC NET CP 343-1 Standard | ||
Siemens SIMATIC NET CP 343-1 Standard |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-25242 is classified as high due to the potential remote code execution risk.
To fix CVE-2020-25242, apply the latest firmware updates provided by Siemens for the affected SIMATIC NET CP 343-1 devices.
CVE-2020-25242 affects all versions of Siemens SIMATIC NET CP 343-1 Advanced, Lean, and Standard including SIPLUS variants.
CVE-2020-25242 allows attackers to send specially crafted packets to TCP port 102, potentially causing a denial of service.
A temporary workaround for CVE-2020-25242 includes disabling TCP port 102 communication until the firmware update can be applied.