First published: Tue Jul 11 2023(Updated: )
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.5). Affected device consists of an incorrect default value in the SSH configuration. This could allow an attacker to bypass network isolation.
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic Cn 4100 | <2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29131 has been rated as a medium severity vulnerability due to potential network isolation bypass.
To remediate CVE-2023-29131, update the SIMATIC CN 4100 to version 2.5 or later to correct the default SSH configuration.
CVE-2023-29131 affects all versions of SIMATIC CN 4100 prior to 2.5.
Yes, an attacker can potentially exploit CVE-2023-29131 remotely by bypassing network isolation.
The incorrect default value in the SSH configuration allows unauthorized access, making the device vulnerable to exploitation.