An attacker with network access to an affected product may cause a denial of service condition by breaking the real-time synchronization (IRT) of the affected installation.

Project Subscriptions

Vendors Products
Siemens Subscribe
Cp1604 Firmware Subscribe
Cp1616 Firmware Subscribe
Dk Standard Ethernet Controller Subscribe
Dk Standard Ethernet Controller Firmware Subscribe
Ek-ertec 200 Subscribe
Ek-ertec 200 Firmware Subscribe
Ek-ertec 200p Subscribe
Ek-ertec 200p Firmware Subscribe
Scalance X-200irt Subscribe
Scalance X-200irt Firmware Subscribe
Simatic Et 200ecopn Subscribe
Simatic Et 200ecopn Firmware Subscribe
Simatic Et 200m Subscribe
Simatic Et 200m Firmware Subscribe
Simatic Et 200s Subscribe
Simatic Et 200s Firmware Subscribe
Simatic Pn\/pn Coupler 6es7158-3ad01-0xa0 Subscribe
Simatic Pn\/pn Coupler 6es7158-3ad01-0xa0 Firmware Subscribe
Simatic S7-300 Cpu Subscribe
Simatic S7-300 Cpu 312 Ifm Subscribe
Simatic S7-300 Cpu 312 Ifm Firmware Subscribe
Simatic S7-300 Cpu 313 Subscribe
Simatic S7-300 Cpu 313 Firmware Subscribe
Simatic S7-300 Cpu 314 Subscribe
Simatic S7-300 Cpu 314 Firmware Subscribe
Simatic S7-300 Cpu 314 Ifm Subscribe
Simatic S7-300 Cpu 314 Ifm Firmware Subscribe
Simatic S7-300 Cpu 315 Subscribe
Simatic S7-300 Cpu 315-2 Dp Subscribe
Simatic S7-300 Cpu 315-2 Dp Firmware Subscribe
Simatic S7-300 Cpu 315 Firmware Subscribe
Simatic S7-300 Cpu 316-2 Dp Subscribe
Simatic S7-300 Cpu 316-2 Dp Firmware Subscribe
Simatic S7-300 Cpu 318-2 Subscribe
Simatic S7-300 Cpu 318-2 Firmware Subscribe
Simatic S7-300 Cpu Firmware Subscribe
Simatic S7-400 Dp V7 Subscribe
Simatic S7-400 Dp V7 Firmware Subscribe
Simatic S7-400 Pn V7 Subscribe
Simatic S7-400 Pn V7 Firmware Subscribe
Simatic S7-400 V6 Subscribe
Simatic S7-400 V6 Firmware Subscribe
Simatic Winac Rtx \(f\) Subscribe
Simatic Winac Rtx \(f\) Firmware Subscribe
Simotion Subscribe
Simotion Firmware Subscribe
Sinamics Dcm Subscribe
Sinamics Dcm Firmware Subscribe
Sinamics Dcp Subscribe
Sinamics Dcp Firmware Subscribe
Sinamics G110m Subscribe
Sinamics G110m Firmware Subscribe
Sinamics G120 Subscribe
Sinamics G120 Firmware Subscribe
Sinamics G130 Subscribe
Sinamics G130 Firmware Subscribe
Sinamics G150 Subscribe
Sinamics G150 Firmware Subscribe
Sinamics Gh150 Subscribe
Sinamics Gh150 Firmware Subscribe
Sinamics Gl150 Subscribe
Sinamics Gl150 Firmware Subscribe
Sinamics Gm150 Subscribe
Sinamics Gm150 Firmware Subscribe
Sinamics S110 Subscribe
Sinamics S110 Firmware Subscribe
Sinamics S120 Subscribe
Sinamics S120 Firmware Subscribe
Sinamics S150 Subscribe
Sinamics S150 Firmware Subscribe
Sinamics Sl150 Subscribe
Sinamics Sl150 Firmware Subscribe
Sinamics Sm120 Subscribe
Sinamics Sm120 Firmware Subscribe
Sinumerik 828d Subscribe
Sinumerik 840d Sl Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-2637 An attacker with network access to an affected product may cause a denial of service condition by breaking the real-time synchronization (IRT) of the affected installation.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 10 Sep 2024 09:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7, SIMATIC S7-400 CPU 414F-3 PN/DP V7, SIMATIC S7-400 CPU 416-3 PN/DP V7, SIMATIC S7-400 CPU 416F-3 PN/DP V7, Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, SCALANCE X-200IRT switch family (incl. SIPLUS NET variants), SIMATIC ET 200pro IM154-8 PN/DP CPU, SIMATIC ET 200pro IM154-8F PN/DP CPU, SIMATIC ET 200pro IM154-8FX PN/DP CPU, SIMATIC ET 200S IM151-8 PN/DP CPU, SIMATIC ET 200S IM151-8F PN/DP CPU, SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 4AO U/I 4xM12, SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12, SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12, SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN: IO-Link Master, SIMATIC ET200M (incl. SIPLUS variants), SIMATIC ET200pro, SIMATIC ET200S (incl. SIPLUS variants), SIMATIC NET CP 1604, SIMATIC NET CP 1616, SIMATIC PN/PN Coupler (incl. SIPLUS NET variants), SIMATIC S7-300 CPU 314C-2 PN/DP, SIMATIC S7-300 CPU 315-2 PN/DP, SIMATIC S7-300 CPU 315F-2 PN/DP, SIMATIC S7-300 CPU 315T-3 PN/DP, SIMATIC S7-300 CPU 317-2 PN/DP, SIMATIC S7-300 CPU 317F-2 PN/DP, SIMATIC S7-300 CPU 317T-3 PN/DP, SIMATIC S7-300 CPU 317TF-3 PN/DP, SIMATIC S7-300 CPU 319-3 PN/DP, SIMATIC S7-300 CPU 319F-3 PN/DP, SIMATIC S7-400 CPU 412-2 PN V7, SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants), SIMATIC WinAC RTX 2010, SIMATIC WinAC RTX F 2010, SIMOTION, SINAMICS DCM, SINAMICS DCP, SINAMICS G110M V4.7 Control Unit, SINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants), SINAMICS G130 V4.7 Control Unit, SINAMICS G150 Control Unit, SINAMICS GH150 V4.7 Control Unit, SINAMICS GL150 V4.7 Control Unit, SINAMICS GM150 V4.7 Control Unit, SINAMICS S110 Control Unit, SINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants), SINAMICS S150 Control Unit, SINAMICS SL150 V4.7 Control Unit, SINAMICS SM120 V4.7 Control Unit, SINUMERIK 828D, SINUMERIK 840D sl, SIPLUS ET 200S IM151-8 PN/DP CPU, SIPLUS ET 200S IM151-8F PN/DP CPU, SIPLUS S7-300 CPU 314C-2 PN/DP, SIPLUS S7-300 CPU 315-2 PN/DP, SIPLUS S7-300 CPU 315F-2 PN/DP, SIPLUS S7-300 CPU 317-2 PN/DP, SIPLUS S7-300 CPU 317F-2 PN/DP, SIPLUS S7-400 CPU 414-3 PN/DP V7, SIPLUS S7-400 CPU 416-3 PN/DP V7. An attacker with network access to an affected product may cause a denial of service condition by breaking the real-time synchronization (IRT) of the affected installation. An attacker with network access to an affected product may cause a denial of service condition by breaking the real-time synchronization (IRT) of the affected installation.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-02-11T10:26:23.281Z

Reserved: 2019-04-08T00:00:00

Link: CVE-2019-10923

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-10T14:15:14.503

Modified: 2024-11-21T04:20:09.600

Link: CVE-2019-10923

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses