Количество 3
Количество 3
CVE-2018-13815
A vulnerability has been identified in SIMATIC S7-1200 (All versions), SIMATIC S7-1500 (All Versions < V2.6). An attacker could exhaust the available connection pool of an affected device by opening a sufficient number of connections to the device. Successful exploitation requires an attacker to be able to send packets to port 102/tcp of the affected device. No user interaction and no user privileges are required to exploit the vulnerability. The vulnerability, if exploited, could cause a Denial-of-Service condition impacting the availability of the system. At the time of advisory publication no public exploitation of this vulnerability was known.
GHSA-jwv4-wwvg-5p94
A vulnerability has been identified in SIMATIC S7-1200 (All versions), SIMATIC S7-1500 (All Versions < V2.6). An attacker could exhaust the available connection pool of an affected device by opening a sufficient number of connections to the device. Successful exploitation requires an attacker to be able to send packets to port 102/tcp of the affected device. No user interaction and no user privileges are required to exploit the vulnerability. The vulnerability, if exploited, could cause a Denial-of-Service condition impacting the availability of the system. At the time of advisory publication no public exploitation of this vulnerability was known.
BDU:2019-00118
Уязвимость микропрограммного обеспечения программируемых логических контроллеров Siemens Simatic S7-1200, связанная с превышением заданного объема ресурсов, позволяющая нарушителю исчерпать доступные сетевые подключения и вызвать отказ в обслуживании сетевого взаимодействия устройства
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-13815 A vulnerability has been identified in SIMATIC S7-1200 (All versions), SIMATIC S7-1500 (All Versions < V2.6). An attacker could exhaust the available connection pool of an affected device by opening a sufficient number of connections to the device. Successful exploitation requires an attacker to be able to send packets to port 102/tcp of the affected device. No user interaction and no user privileges are required to exploit the vulnerability. The vulnerability, if exploited, could cause a Denial-of-Service condition impacting the availability of the system. At the time of advisory publication no public exploitation of this vulnerability was known. | CVSS3: 7.5 | 0% Низкий | около 7 лет назад | |
GHSA-jwv4-wwvg-5p94 A vulnerability has been identified in SIMATIC S7-1200 (All versions), SIMATIC S7-1500 (All Versions < V2.6). An attacker could exhaust the available connection pool of an affected device by opening a sufficient number of connections to the device. Successful exploitation requires an attacker to be able to send packets to port 102/tcp of the affected device. No user interaction and no user privileges are required to exploit the vulnerability. The vulnerability, if exploited, could cause a Denial-of-Service condition impacting the availability of the system. At the time of advisory publication no public exploitation of this vulnerability was known. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
BDU:2019-00118 Уязвимость микропрограммного обеспечения программируемых логических контроллеров Siemens Simatic S7-1200, связанная с превышением заданного объема ресурсов, позволяющая нарушителю исчерпать доступные сетевые подключения и вызвать отказ в обслуживании сетевого взаимодействия устройства | CVSS3: 5.3 | 0% Низкий | около 7 лет назад |
Уязвимостей на страницу