A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.
2021-03-15T17:15:20.097
2024-11-21T05:17:44.600
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | siemens | simatic_mv440_sr_firmware | < 7.0.6 | Yes |
Hardware | siemens | simatic_mv440_sr | - | No |
Operating System | siemens | simatic_mv440_hr_firmware | < 7.0.6 | Yes |
Hardware | siemens | simatic_mv440_hr | - | No |
Operating System | siemens | simatic_mv440_ur_firmware | < 7.0.6 | Yes |
Hardware | siemens | simatic_mv440_ur | - | No |
Operating System | siemens | simatic_mv420_sr-b_firmware | < 7.0.6 | Yes |
Hardware | siemens | simatic_mv420_sr-b | - | No |
Operating System | siemens | simatic_mv420_sr-p_firmware | < 7.0.6 | Yes |
Hardware | siemens | simatic_mv420_sr-p | - | No |
Operating System | siemens | simatic_mv420_sr-b_body_firmware | < 7.0.6 | Yes |
Hardware | siemens | simatic_mv420_sr-b_body | - | No |
Operating System | siemens | simatic_mv420_sr-p_body_firmware | < 7.0.6 | Yes |
Hardware | siemens | simatic_mv420_sr-p_body | - | No |