Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Siprotec_5_with_cpu_variant_cp050
(Siemens)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-09-14 | CVE-2021-33719 | A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Specially crafted packets sent to port 4443/tcp could cause a Denial-of-Service condition or potential remote code execution. | Siprotec_5_with_cpu_variant_cp050, Siprotec_5_with_cpu_variant_cp100, Siprotec_5_with_cpu_variant_cp300 | 9.8 | ||
2021-09-14 | CVE-2021-33720 | A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Specially crafted packets sent to port 4443/tcp could cause a Denial-of-Service condition. | Siprotec_5_with_cpu_variant_cp050, Siprotec_5_with_cpu_variant_cp100, Siprotec_5_with_cpu_variant_cp300 | 7.5 | ||
2021-09-14 | CVE-2021-37206 | A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Received webpackets are not properly processed. An unauthenticated remote attacker with access to any of the Ethernet interfaces could send specially crafted packets to force a restart of the target device. | Siprotec_5_with_cpu_variant_cp050, Siprotec_5_with_cpu_variant_cp100, Siprotec_5_with_cpu_variant_cp300 | 7.5 |