Lucene search

K
cve[email protected]CVE-2023-50763
HistoryJun 11, 2024 - 12:15 p.m.

CVE-2023-50763

2024-06-1112:15:13
CWE-835
web.nvd.nist.gov
22
simatic cp 1542sp-1
simatic cp 1542sp-1 irc
simatic cp 1543sp-1
siplus et 200sp
siplus tim 1531 irc
pkcs12 containers
denial of service

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

6.9 Medium

CVSS4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:N

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.6%

A vulnerability has been identified in SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.4.8), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.4.8). The web server of affected products, if configured to allow the import of PKCS12 containers, could end up in an infinite loop when processing incomplete certificate chains.

This could allow an authenticated remote attacker to create a denial of service condition by importing specially crafted PKCS12 containers.

CNA Affected

[
  {
    "vendor": "Siemens",
    "product": "SIMATIC CP 1542SP-1",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "V2.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "SIMATIC CP 1542SP-1 IRC",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "V2.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "SIMATIC CP 1543SP-1",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "V2.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "V2.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "SIPLUS ET 200SP CP 1543SP-1 ISEC",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "V2.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "V2.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "SIPLUS TIM 1531 IRC",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "V2.4.8",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "TIM 1531 IRC",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "V2.4.8",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

6.9 Medium

CVSS4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:N

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.6%

Related for CVE-2023-50763