Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-50763

CVSS 4.9 · Medium EPSS 0.43% · P63
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-50763

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.4.8), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.4.8). The web server of affected products, if configured to allow the import of PKCS12 containers, could end up in an infinite loop when processing incomplete certificate chains. This could allow an authenticated remote attacker to create a denial of service condition by importing specially crafted PKCS12 containers.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
不可达退出条件的循环(无限循环)
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Siemens产品 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens SIMATIC CP 1542SP-1是德国西门子(Siemens)公司的一款通信处理器。 多款Siemens产品存在安全漏洞,该漏洞源于如果受影响产品的 Web 服务器配置为允许导入 PKCS12 容器,则在处理不完整的证书链时可能会陷入无限循环,导致拒绝服务。以下产品及版本受到影响:SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) V2.3版本、SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) V2.3版本、SIM
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SiemensSIMATIC CP 1542SP-1 0 ~ V2.3 -
SiemensSIMATIC CP 1542SP-1 IRC 0 ~ V2.3 -
SiemensSIMATIC CP 1543SP-1 0 ~ V2.3 -
SiemensSIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL 0 ~ V2.3 -
SiemensSIPLUS ET 200SP CP 1543SP-1 ISEC 0 ~ V2.3 -
SiemensSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL 0 ~ V2.3 -
SiemensSIPLUS TIM 1531 IRC 0 ~ V2.4.8 -
SiemensTIM 1531 IRC 0 ~ V2.4.8 -

II. Public POCs for CVE-2023-50763

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-50763

登录查看更多情报信息。

Same Patch Batch · Siemens · 2024-06-11 · 14 CVEs total

CVE-2024-362669.3 CRITICALSiemens PowerSys 授权问题漏洞
CVE-2024-352928.2 HIGH多款Siemens产品 安全特征问题漏洞
CVE-2024-352077.8 HIGHSiemens SINEC Traffic Analyzer 跨站请求伪造漏洞
CVE-2024-353037.8 HIGHSiemens Tecnomatix Plant Simulation 代码问题漏洞
CVE-2024-352067.7 HIGHSiemens SINEC Traffic Analyzer 代码问题漏洞
CVE-2022-402256.5 MEDIUMSiemens SIPLUS TIM 1531 IRC 安全漏洞
CVE-2024-352086.3 MEDIUMSiemens SINEC Traffic Analyzer 安全漏洞
CVE-2024-352096.2 MEDIUMSiemens SINEC Traffic Analyzer 安全漏洞
CVE-2024-352126.2 MEDIUMSiemens SINEC Traffic Analyzer 输入验证错误漏洞
CVE-2024-335005.9 MEDIUM多款Siemens产品 安全漏洞
CVE-2024-352115.5 MEDIUMSiemens SINEC Traffic Analyzer 安全漏洞
CVE-2024-352105.1 MEDIUMSiemens SINEC Traffic Analyzer 安全漏洞
CVE-2023-385333.3 LOWSiemens TIA Administrator 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2023-50763

No comments yet


Leave a comment