CVE-2021-40363

A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions <= V17 Update 4), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update10:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update11:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update12:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update13:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update14:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update15:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update16:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update17:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update18:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update7:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update8:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update9:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:13:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:13:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:13:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:14.0.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:update1:*:*:*:*:*:*

History

06 Oct 2022, 16:46

Type Values Removed Values Added
CPE cpe:2.3:a:siemens:simatic_wincc:17:update2:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update12:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update14:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update11:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update18:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update8:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update16:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update15:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update10:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update13:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update9:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update17:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update7:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update6:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15.1:update_1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*

10 Aug 2022, 12:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions >= V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system. A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions <= V17 Update 4), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system.
CWE CWE-312 CWE-538

20 May 2022, 13:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions >= V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system. A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions >= V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system.

12 Apr 2022, 09:15

Type Values Removed Values Added
Summary A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions >= V17 Update 2), SIMATIC WinCC V7.4 and earlier (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system. A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions >= V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system.

14 Feb 2022, 16:39

Type Values Removed Values Added
First Time Siemens simatic Wincc
Siemens simatic Pcs 7
Siemens
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 7.8
References (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf - (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf - Patch, Vendor Advisory
CWE CWE-312
CPE cpe:2.3:a:siemens:simatic_wincc:13:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:13:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update5:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:14.0.1:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.1:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update4:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:13:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:17:update2:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:16:update1:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*
cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*

09 Feb 2022, 16:26

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-09 16:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-40363

Mitre link : CVE-2021-40363

CVE.ORG link : CVE-2021-40363


JSON object : View

Products Affected

siemens

  • simatic_pcs_7
  • simatic_wincc
CWE
CWE-538

Insertion of Sensitive Information into Externally-Accessible File or Directory

CWE-312

Cleartext Storage of Sensitive Information