4.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
6.9 Medium
CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:N
6.8 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.6%
A vulnerability has been identified in SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.4.8), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.4.8). The web server of affected products, if configured to allow the import of PKCS12 containers, could end up in an infinite loop when processing incomplete certificate chains.
This could allow an authenticated remote attacker to create a denial of service condition by importing specially crafted PKCS12 containers.
[
{
"vendor": "Siemens",
"product": "SIMATIC CP 1542SP-1",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "V2.3",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "SIMATIC CP 1542SP-1 IRC",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "V2.3",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "SIMATIC CP 1543SP-1",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "V2.3",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "V2.3",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "SIPLUS ET 200SP CP 1543SP-1 ISEC",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "V2.3",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "V2.3",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "SIPLUS TIM 1531 IRC",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "V2.4.8",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
},
{
"vendor": "Siemens",
"product": "TIM 1531 IRC",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "V2.4.8",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
4.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
6.9 Medium
CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:N
6.8 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
15.6%