Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-19282


A vulnerability has been identified in OpenPCS 7 V8.1 (All versions), OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd3), SIMATIC BATCH V8.1 (All versions), SIMATIC BATCH V8.2 (All versions < V8.2 Upd12), SIMATIC BATCH V9.0 (All versions < V9.0 SP1 Upd5), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Update 1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC Route Control V8.1 (All versions), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions < V9.0 Upd4), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Update 10), SIMATIC WinCC (TIA Portal) V15.1 (All versions < V15.1 Update 5), SIMATIC WinCC (TIA Portal) V16 (All versions < V16 Update 1), SIMATIC WinCC V7.3 (All versions), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 14), SIMATIC WinCC V7.5 (All versions < V7.5 SP1 Update 1). Through specially crafted messages, when encrypted communication is enabled, an attacker with network access could use the vulnerability to compromise the availability of the system by causing a Denial-of-Service condition. Successful exploitation requires no system privileges and no user interaction.


Published

2020-03-10T20:15:18.960

Last Modified

2024-11-21T04:34:29.480

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-131
  • Type: Secondary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application siemens openpcs_7 9.0 Yes
Application siemens openpcs_7 9.0_update_1 Yes
Application siemens simatic_batch 9.0 Yes
Application siemens simatic_batch 9.0 Yes
Application siemens simatic_batch 9.0 Yes
Application siemens simatic_batch 9.0 Yes
Application siemens simatic_batch 9.0 Yes
Application siemens simatic_batch 9.0 Yes
Application siemens simatic_net_pc < 16 Yes
Application siemens simatic_net_pc 16 Yes
Application siemens simatic_pcs_7 8.1 Yes
Application siemens simatic_pcs_7 8.2 Yes
Application siemens simatic_pcs_7 9.0 Yes
Application siemens simatic_pcs_7 9.0 Yes
Application siemens simatic_pcs_7 9.0 Yes
Application siemens simatic_route_control < 9.0 Yes
Application siemens simatic_route_control 9.0 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.4 Yes
Application siemens simatic_wincc 7.5 Yes
Application siemens simatic_wincc 7.5 Yes
Application siemens simatic_wincc 7.5.1 Yes
Application siemens simatic_wincc 13 Yes
Application siemens simatic_wincc 13 Yes
Application siemens simatic_wincc 14.0.1 Yes
Application siemens simatic_wincc 15.1 Yes
Application siemens simatic_wincc 15.1 Yes
Application siemens simatic_wincc 15.1 Yes
Application siemens simatic_wincc 15.1 Yes
Application siemens simatic_wincc 15.1 Yes
Application siemens simatic_wincc 16 Yes

References