First published: Wed Aug 09 2023(Updated: )
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing edgeConnector Siemens. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
Softing edgeConnector |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-20498 is critical due to its potential for remote denial-of-service attacks.
To fix ZDI-CAN-20498, apply the latest security patches provided by Softing for edgeConnector Siemens.
Yes, ZDI-CAN-20498 can be exploited without authentication, allowing remote attackers to initiate a denial-of-service condition.
The impact of ZDI-CAN-20498 includes potential service outages and disruption of operations for affected edgeConnector Siemens installations.
ZDI-CAN-20498 affects multiple versions of edgeConnector Siemens, and users should check with Softing for detailed version information.