Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-10929


A vulnerability has been identified in SIMATIC CP 1626 (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V20.8), SIMATIC HMI Panel (incl. SIPLUS variants) (All versions), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.4.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.8.1), SIMATIC S7-1500 Software Controller (All versions < V20.8), SIMATIC S7-PLCSIM Advanced (All versions < V3.0), SIMATIC STEP 7 (TIA Portal) (All versions < V16), SIMATIC WinCC (TIA Portal) (All versions < V16), SIMATIC WinCC OA (All versions < V3.16 P013), SIMATIC WinCC Runtime Advanced (All versions < V16), SIMATIC WinCC Runtime Professional (All versions < V16), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions < V2.1). Affected devices contain a message protection bypass vulnerability due to certain properties in the calculation used for integrity protection. This could allow an attacker in a Man-in-the-Middle position to modify network traffic sent on port 102/tcp to the affected devices.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 5.9, indicating it can be exploited remotely over the network but requires specific conditions to be met without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts integrity (unauthorized modifications), for affected systems. Impacting 33 products from siemens, from siemens, from siemens and 30 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

First disclosed in 2019, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.


Published

2019-08-13T19:15:14.860

Last Modified

2024-11-21T04:20:10.487

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-327
  • Type: Secondary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System siemens simatic_et_200sp_open_controller_cpu_1515sp_pc_firmware * Yes
Hardware siemens simatic_et_200sp_open_controller_cpu_1515sp_pc - No
Operating System siemens simatic_et_200sp_open_controller_cpu_1515sp_pc2_firmware * Yes
Hardware siemens simatic_et_200sp_open_controller_cpu_1515sp_pc2 - No
Operating System siemens simatic_s7-1200_cpu_1211c_firmware ≤ 4.0 Yes
Hardware siemens simatic_s7-1200_cpu_1211c - No
Operating System siemens simatic_s7-1200_cpu_1212c_firmware ≤ 4.0 Yes
Hardware siemens simatic_s7-1200_cpu_1212c - No
Operating System siemens simatic_s7-1200_cpu_1214c_firmware ≤ 4.0 Yes
Hardware siemens simatic_s7-1200_cpu_1214c - No
Operating System siemens simatic_s7-1200_cpu_1215c_firmware ≤ 4.0 Yes
Hardware siemens simatic_s7-1200_cpu_1215c - No
Operating System siemens simatic_s7-1200_cpu_1217c_firmware ≤ 4.0 Yes
Hardware siemens simatic_s7-1200_cpu_1217c - No
Operating System siemens simatic_s7-1500_cpu_1518_firmware * Yes
Hardware siemens simatic_s7-1500_cpu_1518 - No
Operating System siemens simatic_s7-1500_cpu_1511c_firmware * Yes
Hardware siemens simatic_s7-1500_cpu_1511c - No
Operating System siemens simatic_s7-1500_cpu_1512c_firmware * Yes
Hardware siemens simatic_s7-1500_cpu_1512c - No
Application siemens simatic_net_pc < 16 Yes
Application siemens simatic_s7-1500 * Yes
Application siemens simatic_s7-plcsim_advanced * Yes
Application siemens simatic_step_7 < 16 Yes
Application siemens simatic_wincc < 16 Yes
Application siemens simatic_wincc_open_architecture ≤ 3.15 Yes
Application siemens simatic_wincc_open_architecture 3.16 Yes
Application siemens simatic_wincc_open_architecture 3.16 Yes
Application siemens simatic_wincc_runtime * Yes
Application siemens simatic_wincc_runtime * Yes
Operating System siemens simatic_cp_1626_firmware * Yes
Hardware siemens simatic_cp_1626 - No
Operating System siemens simatic_tim_1531_irc_firmware < 2.1 Yes
Hardware siemens simatic_tim_1531_irc - No
Operating System siemens simatic_hmi_panel_firmware * Yes
Hardware siemens simatic_hmi_panel - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For siemens's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.