A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: siemens
Published: 2022-02-09T15:17:03
Updated: 2022-05-10T09:46:42
Reserved: 2021-09-01T00:00:00
Link: CVE-2021-40360
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-02-09T16:15:13.813
Modified: 2023-07-17T15:15:56.653
Link: CVE-2021-40360
JSON object: View
Redhat Information
No data.