A vulnerability has been identified in LOGO! CMR2020 (All versions < V2.2), LOGO! CMR2040 (All versions < V2.2), SIMATIC RTU3010C (All versions < V4.0.9), SIMATIC RTU3030C (All versions < V4.0.9), SIMATIC RTU3031C (All versions < V4.0.9), SIMATIC RTU3041C (All versions < V4.0.9). The underlying TCP/IP stack does not properly calculate the random numbers used as ISN (Initial Sequence Numbers). An adjacent attacker with network access to the LAN interface could interfere with traffic, spoof the connection and gain access to sensitive information.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: siemens
Published: 2021-09-14T10:47:49
Updated: 2022-02-09T15:16:46
Reserved: 2021-07-21T00:00:00
Link: CVE-2021-37186
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-09-14T11:15:25.850
Modified: 2022-04-29T17:19:40.967
Link: CVE-2021-37186
JSON object: View
Redhat Information
No data.
CWE