TROYANOSYVIRUS
Retour aux CVEs

CVE-2020-15791

MEDIUM
6.5

Description

A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 CPU family (incl. SIPLUS variants) (All versions), SIMATIC WinAC RTX (F) 2010 (All versions), SINUMERIK 840D sl (All versions). The authentication protocol between a client and a PLC via port 102/tcp (ISO-TSAP) insufficiently protects the transmitted password. This could allow an attacker that is able to intercept the network traffic to obtain valid PLC credentials.

Details CVE

Score CVSS v3.16.5
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vecteur d'attaqueADJACENT_NETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie9/9/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

siemens:simatic_s7-300_cpu_312siemens:simatic_s7-300_cpu_312_firmwaresiemens:simatic_s7-300_cpu_314siemens:simatic_s7-300_cpu_314_firmwaresiemens:simatic_s7-300_cpu_315-2_dpsiemens:simatic_s7-300_cpu_315-2_dp_firmwaresiemens:simatic_s7-300_cpu_315-2_pnsiemens:simatic_s7-300_cpu_315-2_pn_firmwaresiemens:simatic_s7-300_cpu_315f-2_dpsiemens:simatic_s7-300_cpu_315f-2_dp_firmwaresiemens:simatic_s7-300_cpu_315f-2_pnsiemens:simatic_s7-300_cpu_315f-2_pn_firmwaresiemens:simatic_s7-300_cpu_317-2_dpsiemens:simatic_s7-300_cpu_317-2_dp_firmwaresiemens:simatic_s7-300_cpu_317-2_pnsiemens:simatic_s7-300_cpu_317-2_pn_firmwaresiemens:simatic_s7-300_cpu_317f-2_dpsiemens:simatic_s7-300_cpu_317f-2_dp_firmwaresiemens:simatic_s7-300_cpu_317f-2_pnsiemens:simatic_s7-300_cpu_317f-2_pn_firmwaresiemens:simatic_s7-400_cpu_412siemens:simatic_s7-400_cpu_412_firmwaresiemens:simatic_s7-400_cpu_414siemens:simatic_s7-400_cpu_414_firmwaresiemens:simatic_s7-400_cpu_416siemens:simatic_s7-400_cpu_416_firmwaresiemens:simatic_s7-400_cpu_417siemens:simatic_s7-400_cpu_417_firmware

Faiblesses (CWE)

CWE-522CWE-522

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.