Product:

Sinumerik_828d_firmware

(Siemens)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 5
Date Id Summary Products Score Patch Annotated
2018-03-20 CVE-2018-4843 A vulnerability has been identified in SIMATIC CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 Advanced (incl. SIPLUS NET variants) (All versions), SIMATIC NET CP 343-1 Standard (incl. SIPLUS NET variants) (All versions), SIMATIC NET CP 443-1 Advanced (incl. SIPLUS NET variants) (All... Simatic_cp_343\-1_firmware, Simatic_cp_443\-1_firmware, Simatic_s7\-1500_firmware, Simatic_s7\-300_firmware, Simatic_s7\-400_h_v6_firmware, Simatic_s7\-400_pn\/dp_v6_firmware, Simatic_s7\-400_pn\/dp_v7_firmware, Simatic_s7\-410_firmware, Simatic_winac_rtx_2010_firmware, Sinumerik_828d_firmware, Softnet_pn\-Io_linux_firmware 6.5
2017-05-11 CVE-2017-2680 Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected. Dk_standard_ethernet_controller_firmware, Ek\-Ertec_200_pn_io_firmware, Ek\-Ertec_200p_pn_io_firmware, Extension_unit_12_profinet_firmware, Extension_unit_15_profinet_firmware, Extension_unit_19_profinet_firmware, Extension_unit_22_profinet_firmware, Ie\/as\-I_link_pn_io_firmware, Ie\/pb\-Link_firmware, Pn\/pn_coupler_firmware, Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_w700_firmware, Scalance_x200_firmware, Scalance_x200_irt_firmware, Scalance_x300_firmware, Scalance_x408_firmware, Scalance_x414_firmware, Scalance_xm400_firmware, Scalance_xr500_firmware, Simatic_cm_1542\-1_firmware, Simatic_cp_1242\-7_gprs_firmware, Simatic_cp_1243\-1_dnp3_firmware, Simatic_cp_1243\-1_firmware, Simatic_cp_1243\-1_iec_firmware, Simatic_cp_1243\-1_irc_firmware, Simatic_cp_1243\-7_lte\/us_firmware, Simatic_cp_1243\-8_firmware, Simatic_cp_1542sp\-1_firmware, Simatic_cp_1542sp\-1_irc_firmware, Simatic_cp_1543\-1_firmware, Simatic_cp_1543sp\-1_firmware, Simatic_cp_1604_firmware, Simatic_cp_1616_firmware, Simatic_cp_1626_firmware, Simatic_cp_343\-1_adv_firmware, Simatic_cp_343\-1_lean_firmware, Simatic_cp_343\-1_std_firmware, Simatic_cp_443\-1_adv_firmware, Simatic_cp_443\-1_opc\-Ua_firmware, Simatic_cp_443\-1_std_firmware, Simatic_dk\-1604_pn_io_firmware, Simatic_dk\-1616_pn_io_firmware, Simatic_et_200al_firmware, Simatic_et_200ecopn_firmware, Simatic_et_200m_firmware, Simatic_et_200mp_firmware, Simatic_et_200pro_firmware, Simatic_et_200s_firmware, Simatic_et_200sp_firmware, Simatic_hmi_comfort_panels, Simatic_hmi_mobile_panels, Simatic_hmi_multi_panels, Simatic_rf650r_firmware, Simatic_rf680r_firmware, Simatic_rf685r_firmware, Simatic_s7\-1200_firmware, Simatic_s7\-1500_firmware, Simatic_s7\-1500_software_controller_firmware, Simatic_s7\-200_smart_firmware, Simatic_s7\-300_firmware, Simatic_s7\-400_firmware, Simatic_tdc_cp51m1_firmware, Simatic_tdc_cpu555_firmware, Simatic_teleservice_adapter_ie_advanced_firmware, Simatic_teleservice_adapter_ie_basic_firmware, Simatic_teleservice_adapter_ie_standard_firmware, Simatic_winac_rtx_firmware, Simocode_pro_v_profinet_firmware, Simotion_firmware, Sinamics__s110_pn_firmware, Sinamics_dcm_firmware, Sinamics_dcp_firmware, Sinamics_g110m_firmware, Sinamics_g120\(C\/p\/d\)_w\._pn_firmware, Sinamics_g130_firmware, Sinamics_g150_firmware, Sinamics_gh150_firmware, Sinamics_gl150_firmware, Sinamics_gm150_firmware, Sinamics_s120_firmware, Sinamics_s150_firmware, Sinamics_sl150_firmware, Sinamics_sm120_firmware, Sinamics_v90_pn_firmware, Sinumerik_828d_firmware, Sinumerik_840d_sl_firmware, Sirius_act_3su1_firmware, Sirius_motor_starter_m200d_profinet_firmware, Sirius_soft_starter_3rw44_pn_firmware, Sitop_psu8600_firmware, Softnet_profinet_io_firmware, Ups1600_profinet_firmware 6.5
2017-05-11 CVE-2017-2681 Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected. This vulnerability affects only SIMATIC HMI Multi Panels and HMI Mobile Panels, and S7-300/S7-400 devices. Dk_standard_ethernet_controller_firmware, Ek\-Ertec_200_pn_io_firmware, Ek\-Ertec_200p_pn_io_firmware, Ie\/as\-I_link_pn_io_firmware, Ie\/pb\-Link_firmware, Pn\/pn_coupler_firmware, Scalance_m\-800_firmware, Scalance_s615_firmware, Scalance_w700_firmware, Scalance_x200_firmware, Scalance_x200_irt_firmware, Scalance_x300_firmware, Scalance_x408_firmware, Scalance_x414_firmware, Scalance_xm400_firmware, Scalance_xr500_firmware, Simatic_cm_1542\-1_firmware, Simatic_cm_1542sp\-1_firmware, Simatic_cp_1243\-1_dnp3_firmware, Simatic_cp_1243\-1_firmware, Simatic_cp_1243\-1_iec_firmware, Simatic_cp_1243\-1_irc_firmware, Simatic_cp_1542sp\-1_irc_firmware, Simatic_cp_1543\-1_firmware, Simatic_cp_1543sp\-1_firmware, Simatic_cp_1604_firmware, Simatic_cp_1616_firmware, Simatic_cp_343\-1_adv_firmware, Simatic_cp_343\-1_lean_firmware, Simatic_cp_343\-1_std_firmware, Simatic_cp_443\-1_adv_firmware, Simatic_cp_443\-1_opc\-Ua_firmware, Simatic_cp_443\-1_std_firmware, Simatic_dk\-16xx_pn_io_firmware, Simatic_et_200al_firmware, Simatic_et_200ecopn_firmware, Simatic_et_200m_firmware, Simatic_et_200mp_firmware, Simatic_et_200pro_firmware, Simatic_et_200s_firmware, Simatic_et_200sp_firmware, Simatic_hmi_comfort_panels, Simatic_hmi_mobile_panels, Simatic_hmi_multi_panels, Simatic_rf650r_firmware, Simatic_rf680r_firmware, Simatic_rf685r_firmware, Simatic_s7\-1200_firmware, Simatic_s7\-1500_firmware, Simatic_s7\-1500_software_controller, Simatic_s7\-200_smart_firmware, Simatic_s7\-300_firmware, Simatic_s7\-400_firmware, Simatic_tdc_cp51m1_firmware, Simatic_tdc_cpu555_firmware, Simatic_teleservice_adapter_ie_advanced_modem_firmware, Simatic_teleservice_adapter_ie_basic_modem_firmware, Simatic_teleservice_adapter_standard_modem_firmware, Simatic_winac_rtx_firmware, Simocode_pro_v_profinet_firmware, Simotion_firmware, Sinamics_dcm_firmware, Sinamics_dcp_firmware, Sinamics_g110m_firmware, Sinamics_g120\(C\/p\/d\)_pn_firmware, Sinamics_g130_firmware, Sinamics_g150_firmware, Sinamics_s110_pn_firmware, Sinamics_s120_firmware, Sinamics_s150_firmware, Sinamics_v90_pn_firmware, Sinumerik_828d_firmware, Sinumerik_840d_sl_firmware, Sirius_act_3su1_firmware, Sirius_motor_starter_m200d_profinet_firmware, Sirius_soft_starter_3rw44_pn_firmware, Sitop_psu8600_firmware, Softnet_profinet_io_firmware, Ups1600_profinet_firmware 6.5
2021-10-12 CVE-2021-37199 A vulnerability has been identified in SINUMERIK 808D (All versions), SINUMERIK 828D (All versions < V4.95). Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial-of-service in the device. Sinumerik_808d_firmware, Sinumerik_828d_firmware 7.5
2018-12-12 CVE-2018-11464 A vulnerability has been identified in SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). The integrated VNC server on port 5900/tcp of the affected products could allow a remote attacker to cause a Denial-of-Service condition of the VNC server. Please note that this vulnerability is only exploitable if port 5900/tcp is manually opened in the firewall configuration of network port X130.... Sinumerik_828d_firmware, Sinumerik_840d_sl_firmware 3.7