Impact
Based on the description, it is inferred that the vulnerability in Siemens SIMATIC CN 4100 occurs because the system fails to enforce authentication for clients that attempt to connect. As a result, unauthenticated users can send requests that consume significant system resources, leading to a denial of service condition and possibly allowing unauthorized commands to be executed. This weakness maps to CWE-306, Improper Restriction of Resources, and carries the risk of impacting both system availability and integrity.
Affected Systems
The affected product is Siemens SIMATIC CN 4100, all build versions prior to V5.0. This includes the entire range of versions that do not implement authentication thereby exposing the device to potential resource exhaustion attacks.
Risk and Exploitability
With a CVSS score of 8.8 the vulnerability is considered high severity. The EPSS score is not available, but the lack of public exploit code and the fact that the device does not require any privileged access suggest that exploitation is likely remote through unauthenticated network traffic. Based on the description, it is inferred that the vulnerability is not listed in the CISA KEV catalog, indicating no confirmed large-scale attacks have been reported. Nevertheless, an attacker who discovers the device on the network can intentionally consume resources and disrupt operations, and may leverage the same unauthenticated access for further unauthorized actions if the system lacks strict access controls.
OpenCVE Enrichment