Description
A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-17931 | A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions. |
References
History
No history.
Subscriptions
Siemens
Subscribe
Simatic Mv420 Sr-b
Subscribe
Simatic Mv420 Sr-b Body
Subscribe
Simatic Mv420 Sr-b Body Firmware
Subscribe
Simatic Mv420 Sr-b Firmware
Subscribe
Simatic Mv420 Sr-p
Subscribe
Simatic Mv420 Sr-p Body
Subscribe
Simatic Mv420 Sr-p Body Firmware
Subscribe
Simatic Mv420 Sr-p Firmware
Subscribe
Simatic Mv440 Hr
Subscribe
Simatic Mv440 Hr Firmware
Subscribe
Simatic Mv440 Sr
Subscribe
Simatic Mv440 Sr Firmware
Subscribe
Simatic Mv440 Ur
Subscribe
Simatic Mv440 Ur Firmware
Subscribe
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2024-08-04T15:33:05.467Z
Reserved: 2020-09-10T00:00:00.000Z
Link: CVE-2020-25241
No data.
Status : Modified
Published: 2021-03-15T17:15:20.097
Modified: 2024-11-21T05:17:44.600
Link: CVE-2020-25241
No data.
OpenCVE Enrichment
No data.
EUVD