First published: Tue Jan 09 2024(Updated: )
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V2.7). The "intermediate installation" system state of the affected application uses default credential with admin privileges. An attacker could use the credentials to gain complete control of the affected device.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic Cn 4100 | <2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49621 is considered a high severity vulnerability due to the potential for complete control over affected devices.
To fix CVE-2023-49621, upgrade the SIMATIC CN 4100 to version 2.7 or later and ensure that default credentials are changed.
CVE-2023-49621 affects all versions of SIMATIC CN 4100 prior to version 2.7.
An attacker can exploit CVE-2023-49621 by using the default administrative credentials to gain unauthorized access and control over the device.
Yes, the patch for CVE-2023-49621 is included in the upgrade to SIMATIC CN 4100 version 2.7 or higher.