A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.

Project Subscriptions

Vendors Products
Siemens Subscribe
Simatic Mv420 Sr-b Subscribe
Simatic Mv420 Sr-b Body Subscribe
Simatic Mv420 Sr-b Body Firmware Subscribe
Simatic Mv420 Sr-b Firmware Subscribe
Simatic Mv420 Sr-p Subscribe
Simatic Mv420 Sr-p Body Subscribe
Simatic Mv420 Sr-p Body Firmware Subscribe
Simatic Mv420 Sr-p Firmware Subscribe
Simatic Mv440 Hr Subscribe
Simatic Mv440 Hr Firmware Subscribe
Simatic Mv440 Sr Subscribe
Simatic Mv440 Sr Firmware Subscribe
Simatic Mv440 Ur Subscribe
Simatic Mv440 Ur Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-17931 A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2024-08-04T15:33:05.467Z

Reserved: 2020-09-10T00:00:00

Link: CVE-2020-25241

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-15T17:15:20.097

Modified: 2024-11-21T05:17:44.600

Link: CVE-2020-25241

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses