CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:N/I:N/A:C
AI Score
Confidence
High
EPSS
Percentile
92.9%
Stack-based buffer overflow in the Profinet DCP protocol implementation on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 allows remote attackers to cause a denial of service (device outage) or possibly execute arbitrary code via a crafted DCP frame.
Vendor | Product | Version | CPE |
---|---|---|---|
siemens | scalance_s_firmware | * | cpe:2.3:a:siemens:scalance_s_firmware:*:*:*:*:*:*:*:* |
siemens | scalance_s_firmware | 2.1.0 | cpe:2.3:a:siemens:scalance_s_firmware:2.1.0:*:*:*:*:*:*:* |
siemens | scalance_s_firmware | 2.2.0 | cpe:2.3:a:siemens:scalance_s_firmware:2.2.0:*:*:*:*:*:*:* |
siemens | scalance_s602 | v2 | cpe:2.3:h:siemens:scalance_s602:v2:*:*:*:*:*:*:* |
siemens | scalance_s612 | v2 | cpe:2.3:h:siemens:scalance_s612:v2:*:*:*:*:*:*:* |
siemens | scalance_s613 | v2 | cpe:2.3:h:siemens:scalance_s613:v2:*:*:*:*:*:*:* |