![]() ![]() ![]() SIMATIC WinCC 7.3: All versions prior to WinCC 7.3 Upd16, and.SIMATIC WinCC 7.2 and earlier: All versions prior to WinCC 7.2 Upd 15,.SIMATIC WinCC Runtime Professional v14: All versions prior to v14 SP1 Upd5,.SIMATIC WinCC Runtime Professional v13: All versions prior to v13 SP2 Upd2.SIMATIC Route Control v9.0: All versions prior to v9.0 Upd1,.SIMATIC Route Control v8.2: All versions,.SIMATIC PCS 7 v8.2: All versions prior to v8.2 SP1,.SIMATIC Route Control v8.1: All versions,.SIMATIC Route Control v8.0: All versions,.SIMATIC Route Control v7.1 and earlier,.SIMATIC PCS 7 v9.0: All versions prior to v9.0 SP1,.SIMATIC NET PC-Software: All versions prior to v15 SP1,.SIMATIC BATCH v9.0: All versions prior to v9.0 SP1,.SIMATIC BATCH v8.2: All versions prior to v8.2 Upd10,.SIMATIC BATCH v8.1: All versions prior to v8.1 SP1 Upd16,.SIMATIC BATCH v8.0: All versions prior to v8.0 SP1 Upd21,.OpenPCS 7 v9.0: All versions prior to v9.0 Upd1,.OpenPCS 7 v8.1: All versions prior to v8.1 Upd5,.OpenPCS 7 v8.0: All versions prior to 8.2 SP1,.Siemens reports that the vulnerability affects the following SIMATIC products: Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition on the remote and local communication functionality of the affected products. This updated advisory is a follow-up to the updated advisory titled ICSA-18-088-03 Siemens SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime Professional, and SIMATIC NET PC Software (Update F) that was published February 5, 2019, on the NCCIC/ICS-CERT website. Vulnerability: Improper Input Validation.Equipment: SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime Professional, and SIMATIC NET PC Software.ATTENTION: Exploitable remotely/low skill level to exploit.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |