Publication Date: |
|
Last Update: |
|
Current Version: | V2.1 |
CVSS v3.1 Base Score: | 7.5 |
Affected Product and Versions | Remediation |
---|---|
All versions < V4.1.1 Patch 05 affected by CVE-2019-10923 |
Update to V4.1.1 Patch 05 or later version
|
All versions < V4.5.0 Patch 01 affected by CVE-2019-10923 |
Update to V4.5.0 Patch 01 or later version
|
All versions < V4.5.0 affected by CVE-2019-10923 |
Update to V4.5.0 or later version
|
All versions < V5.2.1 affected by CVE-2019-10923 |
Update to V5.4.2
|
|
Currently no fix is planned
|
All versions affected by CVE-2019-10923 |
Currently no fix is planned
|
All versions affected by CVE-2019-10923 |
Currently no fix is planned
|
|
Update to V4.2.0 or later version
|
|
Update to V4.1.0 or later version
|
All versions affected by CVE-2019-10923 |
Currently no fix is planned
|
All versions affected by CVE-2019-10923 |
Currently no fix is planned
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
|
Update to V4.2.0 or later version
|
|
Update to V4.1.0 or later version
|
All versions < V2.8 affected by CVE-2019-10923 |
Update to V2.8 or later version
|
All versions < V2.8 affected by CVE-2019-10923 |
Update to V2.8
|
All versions affected by CVE-2019-10923 |
Currently no fix is planned
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V7.0.3 affected by CVE-2019-10923 |
Update to V7.0.3 or later version
|
All versions < V7.0.3 affected by CVE-2019-10923 |
Update to V7.0.3 or later version
|
All versions < V7.0.3 affected by CVE-2019-10923 |
Update to V7.0.3 or later version
|
All versions < V7.0.3 affected by CVE-2019-10923 |
Update to V7.0.3 or later version
|
All versions < V7.0.3 affected by CVE-2019-10923 |
Update to V7.0.3 or later version
|
All versions affected by CVE-2019-10923 |
Currently no fix is planned
|
All versions < V2010 SP3 affected by CVE-2019-10923 |
Update to V2010 SP3 or later version and apply BIOS and Microsoft Windows updates
|
All versions < V2010 SP3 affected by CVE-2019-10923 |
Update to V2010 SP3 or later version and apply BIOS and Microsoft Windows updates
|
All versions affected by CVE-2019-10923 |
Currently no fix is planned
|
All versions < V1.5 HF1 affected by CVE-2019-10923 |
Update to V1.5 HF1 or later version
|
All versions < V1.3 affected by CVE-2019-10923 |
Update to V1.3
|
All versions < V4.7 SP10 HF5 affected by CVE-2019-10923 |
Update to V4.7 SP10 HF5
|
All versions < V4.7 SP10 HF5 affected by CVE-2019-10923 |
Update to V4.7 SP10 HF5
|
All versions < V4.7 HF29 affected by CVE-2019-10923 |
Update to V4.7 HF29 or upgrade to V5.2 HF2
|
All versions < V4.8 affected by CVE-2019-10923 |
Currently no fix is planned
|
All versions affected by CVE-2019-10923 |
Update to V4.8 SP2 HF9
|
All versions affected by CVE-2019-10923 |
Update to V4.8 SP2 HF9
|
All versions affected by CVE-2019-10923 |
Update to V4.8 SP2 HF9
|
All versions affected by CVE-2019-10923 |
Currently no fix is planned
|
All versions < V4.7 HF34 affected by CVE-2019-10923 |
Update to V4.7 HF34 or upgrade to V5.2 HF2
|
All versions < V4.8 affected by CVE-2019-10923 |
Currently no fix is planned
|
All versions < V4.7 HF33 affected by CVE-2019-10923 |
Update to V4.7 HF33
|
All versions affected by CVE-2019-10923 |
Currently no fix is planned
|
All versions < V4.8 SP5 affected by CVE-2019-10923 |
Update to V4.8 SP5 or later version
|
All versions < V4.8 SP5 affected by CVE-2019-10923 |
Update to V4.8 SP5 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.3.17 affected by CVE-2019-10923 |
Update to V3.3.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V3.2.17 affected by CVE-2019-10923 |
Update to V3.2.17 or later version
|
All versions < V7.0.3 affected by CVE-2019-10923 |
Update to V7.0.3 or later version
|
All versions < V7.0.3 affected by CVE-2019-10923 |
Update to V7.0.3 or later version
|
Siemens has identified the following specific workarounds and mitigations that customers can apply to reduce the risk:
Product-specific remediations or mitigations can be found in the section
Affected Products and Solution.
Please follow the General Security Recommendations.
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.
CVSS v3.1 Base Score | 7.5 |
CVSS v3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
CWE | CWE-400: Uncontrolled Resource Consumption |
V1.0 (2019-10-08): | Publication Date |
V1.1 (2020-01-14): | Added solution for SINAMICS SL150 V4.7, SIPLUS devices now explicitly mentioned in the list of affected products, correction in section "Workarounds and Mitigations" |
V1.2 (2020-02-11): | Added solution for SINAMICS DCP |
V1.3 (2020-03-10): | Added solution for SIMATIC S7-300 CPU family |
V1.4 (2020-08-11): | Added SIMATIC ET200ecoPN product variants (MLFB IDs) that are not affected |
V1.5 (2021-02-09): | Added additional SIMATIC ET200ecoPN model (6ES7148-6JG00-0BB0) as not affected |
V1.6 (2021-10-12): | Clarified affected ET200ecoPN models |
V1.7 (2022-02-08): | Clarified that no remediation is planned for ET200 devices |
V1.8 (2023-01-10): | SIMATIC S7-300 CPU family expanded with product specific designations, patch links and MLFBs. Added fix for SINUMERIK 840D sl. |
V1.9 (2023-04-11): | SIMATIC S7-400 CPU family expanded and fix added for supported versions, no fix planned for other S7-400 versions |
V2.0 (2023-05-09): | Removed SIMATIC S7-400 CPU devices without fix, as they do not support PROFINET and are not affected |
V2.1 (2024-09-10): | Listed affected products individually instead of product families (e.g., for SIMATIC ET 200AL/MP/SP/pro IM families); added affected SIPLUS devices (e.g., SIPLUS ET 200xx IM) |