First published: Tue May 09 2023(Updated: )
A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC712 (All versions < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions < V2.1). The affected device is vulnerable to a denial of service while parsing a random (non-JSON) MQTT payload. This could allow an attacker who can manipulate the communication between the MQTT broker and the affected device to cause a denial of service (DoS).
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens 6gk1411-1ac00 Firmware | <2.1 | |
Siemens 6gk1411-1ac00 | ||
Siemens 6gk1411-5ac00 Firmware | <2.1 | |
Siemens 6gk1411-5ac00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-29105 is high.
SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC712 (All versions < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions < V2.1) are affected by CVE-2023-29105.
To fix CVE-2023-29105, it is recommended to update to version 2.1 or above of the affected software.
You can find more information about CVE-2023-29105 in the reference provided: [link](https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf).
The CWE ID of CVE-2023-29105 is 544.