Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2019-10936
Disclosure Date: October 10, 2019 (last updated November 27, 2024)
Affected devices improperly handle large amounts of specially crafted UDP packets.
This could allow an unauthenticated remote attacker to trigger a denial of service condition.
0
Attacker Value
Unknown
CVE-2019-10923
Disclosure Date: October 10, 2019 (last updated November 27, 2024)
An attacker with network access to an affected product may cause a denial of service condition by breaking the real-time synchronization (IRT) of the affected installation.
0
Attacker Value
Unknown
CVE-2019-6568
Disclosure Date: April 17, 2019 (last updated November 27, 2024)
The webserver of the affected devices contains a vulnerability that may lead to
a denial of service condition. An attacker may cause a denial of service
situation which leads to a restart of the webserver of the affected device.
The security vulnerability could be exploited by an attacker with network
access to the affected systems. Successful exploitation requires no system
privileges and no user interaction. An attacker could use the vulnerability
to compromise availability of the device.
0
Attacker Value
Unknown
CVE-2017-12741
Disclosure Date: December 26, 2017 (last updated July 10, 2024)
Specially crafted packets sent to port 161/udp could cause a denial of service condition. The affected devices must be restarted manually.
0
Attacker Value
Unknown
CVE-2017-2681
Disclosure Date: May 11, 2017 (last updated September 10, 2024)
Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.
0
Attacker Value
Unknown
CVE-2017-2680
Disclosure Date: May 11, 2017 (last updated September 10, 2024)
Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected.
0
Attacker Value
Unknown
CVE-2013-6920
Disclosure Date: December 07, 2013 (last updated October 05, 2023)
Siemens SINAMICS S/G controllers with firmware before 4.6.11 do not require authentication for FTP and TELNET sessions, which allows remote attackers to bypass intended access restrictions via TCP traffic to port (1) 21 or (2) 23.
0