Product:

6ed1052\-1cc01\-0ba8_firmware

(Siemens)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 3
Date Id Summary Products Score Patch Annotated
2019-04-17 CVE-2019-10953 ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple versions. Researchers have found some controllers are susceptible to a denial-of-service attack due to a flood of network packets. Pm554\-Tp\-Eth_firmware, Ilc_151_eth_firmware, Modicon_m221_firmware, 6ed1052\-1cc01\-0ba8_firmware, 6es7211\-1ae40\-0xb0_firmware, 6es7314\-6eh04\-0ab0_firmware, Bacnet\/ip_firmware, Ethernet_firmware, Knx_ip_firmware, Pfc100_firmware 7.5
2019-06-12 CVE-2019-6584 A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version < V1.82.02). The integrated webserver does not invalidate the Session ID upon user logout. An attacker that successfully extracted a valid Session ID is able to use it even after the user logs out. The security vulnerability could be exploited by an attacker in a privileged network position who is able... 6ed1052\-1cc01\-0ba8_firmware, 6ed1052\-1cc08\-0ba0_firmware, 6ed1052\-1fb00\-0ba8_firmware, 6ed1052\-1fb08\-0ba0_firmware, 6ed1052\-1hb00\-0ba8_firmware, 6ed1052\-1hb08\-0ba0_firmware, 6ed1052\-1md00\-0ba8_firmware, 6ed1052\-1md08\-0ba0_firmware, 6ed1052\-2cc01\-0ba8_firmware, 6ed1052\-2cc08\-0ba0_firmware, 6ed1052\-2fb00\-0ba8_firmware, 6ed1052\-2fb08\-0ba0_firmware, 6ed1052\-2hb00\-0ba8_firmware, 6ed1052\-2hb08\-0ba0_firmware, 6ed1052\-2md00\-0ba8_firmware, 6ed1052\-2md08\-0ba0_firmware 7.5
2019-06-12 CVE-2019-6571 A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version < V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction... 6ed1052\-1cc01\-0ba8_firmware, 6ed1052\-1cc08\-0ba0_firmware, 6ed1052\-1fb00\-0ba8_firmware, 6ed1052\-1fb08\-0ba0_firmware, 6ed1052\-1hb00\-0ba8_firmware, 6ed1052\-1hb08\-0ba0_firmware, 6ed1052\-1md00\-0ba8_firmware, 6ed1052\-1md08\-0ba0_firmware, 6ed1052\-2cc01\-0ba8_firmware, 6ed1052\-2cc08\-0ba0_firmware, 6ed1052\-2fb00\-0ba8_firmware, 6ed1052\-2fb08\-0ba0_firmware, 6ed1052\-2hb00\-0ba8_firmware, 6ed1052\-2hb08\-0ba0_firmware, 6ed1052\-2md00\-0ba8_firmware, 6ed1052\-2md08\-0ba0_firmware 7.5