Search criteria

156 vulnerabilities found for N/A by Siemens

CERTFR-2025-AVI-0765

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SIMATIC Virtualization as a Service (SIVaaS) toutes versions
Siemens N/A SIMATIC Technology Package TPCamGen (6ES7823-0FE30-1AA0) toutes versions pour la vulnérabilité CVE-2025-43715
Siemens N/A SIMATIC PCS neo V4.1 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2025-40795, CVE-2025-40796, CVE-2025-40797 et CVE-2025-40798.
Siemens N/A SIMATIC PCS neo V5.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2025-40795, CVE-2025-40796, CVE-2025-40797 et CVE-2025-40798.
References
Bulletin de sécurité Siemens SSA-563922 2025-09-09 vendor-advisory
Bulletin de sécurité Siemens SSA-534283 2025-09-09 vendor-advisory
Bulletin de sécurité Siemens SSA-722410 2025-09-09 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC Virtualization as a Service (SIVaaS) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Technology Package TPCamGen (6ES7823-0FE30-1AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-43715",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V4.1 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2025-40795, CVE-2025-40796, CVE-2025-40797 et CVE-2025-40798.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V5.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2025-40795, CVE-2025-40796, CVE-2025-40797 et CVE-2025-40798.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-40804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40804"
    },
    {
      "name": "CVE-2025-40795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40795"
    },
    {
      "name": "CVE-2025-40797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40797"
    },
    {
      "name": "CVE-2025-40798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40798"
    },
    {
      "name": "CVE-2025-40796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40796"
    },
    {
      "name": "CVE-2025-43715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43715"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0765",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2025-09-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-563922",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-563922.html"
    },
    {
      "published_at": "2025-09-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-534283",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-534283.html"
    },
    {
      "published_at": "2025-09-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-722410",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-722410.html"
    }
  ]
}

CERTFR-2025-AVI-0704

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été découverte dans les produits Siemens. Elle permet à un attaquant de provoquer une élévation de privilèges.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SENTRON Powermanager toutes versions
Siemens N/A Desigo CC toutes versions
References
Bulletin de sécurité Siemens SSA-201595 2025-08-14 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": " SENTRON Powermanager toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Desigo CC toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-47809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47809"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0704",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Siemens. Elle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2025-08-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-201595",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-201595.html"
    }
  ]
}

CERTFR-2025-AVI-0677

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SIMATIC PCS neo V6.0 versions antérieures à V6.0 SP1
Siemens N/A SIMATIC WinCC V17, v18 et V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759
Siemens N/A SIMATIC Control Function Library (CFL) toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIPROTEC 5 versions antérieures à 10.0
Siemens N/A SIMATIC MTP Integrator toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC ProSave V17 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC WinCC Unified Line Coordination toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC WinCC TeleControl toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC WinCC OA V3.19 versions antérieures à V3.19 P020
Siemens N/A SIMATIC WinCC flexible ES toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-54678.
Siemens N/A SIMATIC S7-Fail-safe Configuration Tool (S7-FCT) versions antérieures à 4.0.1
Siemens N/A SIMATIC PCS neo V6.0 toutes versions pour la vulnérabilité CVE-2024-54678
Siemens N/A SIMATIC eaSie Core Package (6DL5424-0AX00-0AV8) toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC MTP CREATOR V2.x et V3.x toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033.
Siemens N/A SIMATIC WinCC OA V3.18 versions antérieures à V3.18 P032
Siemens N/A TIA Portal Cloud V19 versions antérieures à 5.2.1.1
Siemens N/A SIMATIC D7-SYS toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC BATCH V10.0 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC ODK 1500S toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC Process Historian 2020 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2025-30033 et CVE-2025-47809
Siemens N/A SIMATIC S7-1500 Software Controller V2 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A TIA Portal Cloud Connector toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC WinCC Unified Sequence toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-40759.
Siemens N/A SIMATIC WinCC Runtime Advanced toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC Logon V2.0 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC ProSave V19 versions antérieures à V19 Update 4
Siemens N/A SIMATIC PDM Maintenance Station V5.0 toutes versions pour les vulnérabilités CVE-2025-30033 et CVE-2025-47809
Siemens N/A SIMATIC Safety Matrix toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC Management Console toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SCALANCE XCM-/XRM-/XCH-/XRH-300 family versions antérieures à 3.2
Siemens N/A SIMATIC BATCH V9.1 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033.
Siemens N/A SIMATIC Process Function Library (PFL) V4.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033.
Siemens N/A SIMATIC S7-1500 Software Controller V3 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC STEP 7 CFC V20 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033.
Siemens N/A SIMATIC NET PC Software toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC Route Control V9.1 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC Process Historian 2022 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC WinCC OA V3.20 versions antérieures à V3.20 P008
Siemens N/A SIMATIC RTLS Locating Manager versions antérieures à 3.3
Siemens N/A Siprotec 4 7SA6, 7SD5 et 7SD610 versions antérieures à 4.78
Siemens N/A SIMATIC Automation Tool toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A TIA Portal Cloud V18 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759
Siemens N/A SIMATIC PDM V9.2 et V9.3 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC WinCC Runtime Professional toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC WinCC Visualization Architect (SiVArc) toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC eaSie Workflow Skills toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC STEP 7 CFC V19 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033.
Siemens N/A SIMATIC WinCC V19 versions antérieures à V19 Update 4
Siemens N/A SIMATIC Management Agent toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC WinCC V7.5 et V8.0 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC STEP 7 V5.7 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC Automation Tool SDK Windows toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC Process Historian 2022 toutes versions pour la vulnérabilité CVE-2025-47809
Siemens N/A SIMATIC S7-PLCSIM V20 versions antérieures à V20 Update 1
Siemens N/A TIA Portal Cloud V17 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759
Siemens N/A SIMATIC Energy Suite toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC PCS 7 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC Process Historian 2024 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC STEP 7 V19 versions antérieures à V19 Update 4
Siemens N/A TIA Portal Test Suite V17, v18, v19 et v20 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC S7-PCT toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC Target toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC ProSave V18 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033.
Siemens N/A SIMATIC Logon V1.6 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033.
Siemens N/A SIMATIC STEP 7 V17 et V18 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759
Siemens N/A SIMATIC RTLS Locating Manager versions antérieures à 3.2
Siemens N/A SIMATIC S7-PLCSIM Advanced versions antérieures à V7.0 Update 1
Siemens N/A SIMATIC PCS neo V5.0 toutes versions pour la vulnérabilité CVE-2024-54678
Siemens N/A SIMATIC STEP 7 V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759
Siemens N/A TIA Portal Cloud V20 toutes versions pour les vulnérabilités CVE-2024-54678 et CVE-2025-40759
Siemens N/A Siprotec 4 toutes versions et tous modèles exceptés 7SA6, 7SD5, 7SD610 pour la vulnérabilité CVE-2024-52504.
Siemens N/A SIMATIC eaSie PCS 7 Skill Package (6DL5424-0BX00-0AV8) toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 versions antérieures à 3.2
Siemens N/A SIMATIC S7-PLCSIM V17, V18 et V19 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC WinCC Unified PC Runtime V18, V19 et V20 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC PCS 7 Advanced Process Faceplates V9.1 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC S7 F Systems V6.4 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC Information Server toutes versions pour la vulnérabilité CVE-2025-47809
Siemens N/A SIMATIC S7 F Systems V6.3 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-30033.
Siemens N/A SIMATIC ProSave V20 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC PCS 7 Logic Matrix V9.1 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A WinCC Panel Image Setup toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC PCS neo V4.1 et V5.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-54678.
Siemens N/A SIMATIC Route Control V10.0 toutes versions pour la vulnérabilité CVE-2025-30033
Siemens N/A SIMATIC WinCC V8.1 versions antérieures à V8.1 Update 3
References
Bulletin de sécurité Siemens SSA-707630 2025-08-12 vendor-advisory
Bulletin de sécurité Siemens SSA-331739 2025-08-12 vendor-advisory
Bulletin de sécurité Siemens SSA-693808 2025-08-12 vendor-advisory
Bulletin de sécurité Siemens SSA-613116 2025-08-12 vendor-advisory
Bulletin de sécurité Siemens SSA-493396 2025-08-12 vendor-advisory
Bulletin de sécurité Siemens ssa-400089 2025-08-11 vendor-advisory
Bulletin de sécurité Siemens SSA-493787 2025-08-12 vendor-advisory
Bulletin de sécurité Siemens SSA-894058 2025-08-12 vendor-advisory
Bulletin de sécurité Siemens SSA-355557 2025-08-12 vendor-advisory
Bulletin de sécurité Siemens SSA-529291 2025-08-12 vendor-advisory
Bulletin de sécurité Siemens SSA-282044 2025-08-12 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC PCS neo V6.0 versions ant\u00e9rieures \u00e0 V6.0 SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V17, v18 et V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Control Function Library (CFL) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 versions ant\u00e9rieures \u00e0 10.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MTP Integrator toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ProSave V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified Line Coordination toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC TeleControl toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC OA V3.19 versions ant\u00e9rieures \u00e0 V3.19 P020",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC flexible ES toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-Fail-safe Configuration Tool (S7-FCT) versions ant\u00e9rieures \u00e0 4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V6.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC eaSie Core Package (6DL5424-0AX00-0AV8) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MTP CREATOR V2.x et V3.x toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC OA V3.18 versions ant\u00e9rieures \u00e0 V3.18 P032",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V19 versions ant\u00e9rieures \u00e0 5.2.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC D7-SYS toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC BATCH V10.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ODK 1500S toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Process Historian 2020 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2025-30033 et CVE-2025-47809",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 Software Controller V2 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud Connector toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified Sequence toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40759.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Advanced toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Logon V2.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ProSave V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PDM Maintenance Station V5.0 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2025-30033 et CVE-2025-47809",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Safety Matrix toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Management Console toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM-/XRM-/XCH-/XRH-300 family versions ant\u00e9rieures \u00e0 3.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC BATCH V9.1 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Process Function Library (PFL) V4.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 Software Controller V3 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 CFC V20 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC NET PC Software toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Route Control V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Process Historian 2022 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC OA V3.20 versions ant\u00e9rieures \u00e0 V3.20 P008",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RTLS Locating Manager versions ant\u00e9rieures \u00e0 3.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Siprotec 4 7SA6, 7SD5 et 7SD610 versions ant\u00e9rieures \u00e0 4.78",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Automation Tool toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V18 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PDM V9.2 et V9.3 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Professional toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Visualization Architect (SiVArc) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC eaSie Workflow Skills toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 CFC V19 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Management Agent toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V7.5 et V8.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V5.7 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Automation Tool SDK Windows toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Process Historian 2022 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-47809",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM V20 versions ant\u00e9rieures \u00e0 V20 Update 1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V17 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Energy Suite toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS 7  toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Process Historian 2024 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Test Suite V17, v18, v19 et v20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PCT toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Target toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ProSave V18 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Logon V1.6 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V17 et V18 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RTLS Locating Manager versions ant\u00e9rieures \u00e0 3.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM Advanced versions ant\u00e9rieures \u00e0 V7.0 Update 1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V5.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V20 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-54678 et CVE-2025-40759",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Siprotec 4 toutes versions et tous mod\u00e8les except\u00e9s 7SA6, 7SD5, 7SD610 pour la vuln\u00e9rabilit\u00e9 CVE-2024-52504. ",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC eaSie PCS 7 Skill Package (6DL5424-0BX00-0AV8) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 versions ant\u00e9rieures \u00e0 3.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM V17, V18 et V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified PC Runtime V18, V19 et V20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS 7 Advanced Process Faceplates V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7 F Systems V6.4 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Information Server toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-47809",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7 F Systems V6.3 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ProSave V20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS 7 Logic Matrix V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "WinCC Panel Image Setup toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V4.1 et V5.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-54678.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Route Control V10.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-30033",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V8.1 versions ant\u00e9rieures \u00e0 V8.1 Update 3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-35827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35827"
    },
    {
      "name": "CVE-2024-40931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
    },
    {
      "name": "CVE-2024-56596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56596"
    },
    {
      "name": "CVE-2024-43907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43907"
    },
    {
      "name": "CVE-2024-56645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56645"
    },
    {
      "name": "CVE-2024-56659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56659"
    },
    {
      "name": "CVE-2024-46755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46755"
    },
    {
      "name": "CVE-2024-47748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47748"
    },
    {
      "name": "CVE-2024-26825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
    },
    {
      "name": "CVE-2024-49863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49863"
    },
    {
      "name": "CVE-2024-41022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41022"
    },
    {
      "name": "CVE-2024-49907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49907"
    },
    {
      "name": "CVE-2024-53061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53061"
    },
    {
      "name": "CVE-2024-53052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53052"
    },
    {
      "name": "CVE-2023-52477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
    },
    {
      "name": "CVE-2024-53097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
    },
    {
      "name": "CVE-2024-46713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46713"
    },
    {
      "name": "CVE-2023-52622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
    },
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2024-46844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46844"
    },
    {
      "name": "CVE-2024-43914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43914"
    },
    {
      "name": "CVE-2024-26696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
    },
    {
      "name": "CVE-2024-56670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56670"
    },
    {
      "name": "CVE-2024-41009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
    },
    {
      "name": "CVE-2024-47697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47697"
    },
    {
      "name": "CVE-2024-46815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46815"
    },
    {
      "name": "CVE-2024-39503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
    },
    {
      "name": "CVE-2025-40759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40759"
    },
    {
      "name": "CVE-2022-48666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48666"
    },
    {
      "name": "CVE-2024-49890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49890"
    },
    {
      "name": "CVE-2024-50262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50262"
    },
    {
      "name": "CVE-2024-40988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
    },
    {
      "name": "CVE-2024-50268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
    },
    {
      "name": "CVE-2024-49903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49903"
    },
    {
      "name": "CVE-2024-49969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49969"
    },
    {
      "name": "CVE-2023-52804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52804"
    },
    {
      "name": "CVE-2024-41004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41004"
    },
    {
      "name": "CVE-2024-46676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46676"
    },
    {
      "name": "CVE-2024-41070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
    },
    {
      "name": "CVE-2024-46740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46740"
    },
    {
      "name": "CVE-2023-52845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
    },
    {
      "name": "CVE-2021-44879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44879"
    },
    {
      "name": "CVE-2024-46798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46798"
    },
    {
      "name": "CVE-2024-50195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
    },
    {
      "name": "CVE-2024-53172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53172"
    },
    {
      "name": "CVE-2024-46707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46707"
    },
    {
      "name": "CVE-2024-49967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49967"
    },
    {
      "name": "CVE-2024-41000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41000"
    },
    {
      "name": "CVE-2024-36974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36974"
    },
    {
      "name": "CVE-2023-52818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
    },
    {
      "name": "CVE-2024-56606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56606"
    },
    {
      "name": "CVE-2023-52637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
    },
    {
      "name": "CVE-2024-46747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46747"
    },
    {
      "name": "CVE-2024-49858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49858"
    },
    {
      "name": "CVE-2023-52873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52873"
    },
    {
      "name": "CVE-2024-49948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49948"
    },
    {
      "name": "CVE-2024-56594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56594"
    },
    {
      "name": "CVE-2024-26754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26754"
    },
    {
      "name": "CVE-2023-52858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52858"
    },
    {
      "name": "CVE-2024-46738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46738"
    },
    {
      "name": "CVE-2023-45863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45863"
    },
    {
      "name": "CVE-2024-56756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
    },
    {
      "name": "CVE-2024-52332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52332"
    },
    {
      "name": "CVE-2024-46679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46679"
    },
    {
      "name": "CVE-2024-56724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56724"
    },
    {
      "name": "CVE-2024-53194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53194"
    },
    {
      "name": "CVE-2024-49878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49878"
    },
    {
      "name": "CVE-2023-51782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51782"
    },
    {
      "name": "CVE-2024-46673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46673"
    },
    {
      "name": "CVE-2024-41034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41034"
    },
    {
      "name": "CVE-2024-56723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56723"
    },
    {
      "name": "CVE-2024-53226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53226"
    },
    {
      "name": "CVE-2024-49884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49884"
    },
    {
      "name": "CVE-2024-46724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46724"
    },
    {
      "name": "CVE-2024-56569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56569"
    },
    {
      "name": "CVE-2024-50074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
    },
    {
      "name": "CVE-2024-26790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26790"
    },
    {
      "name": "CVE-2024-46791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46791"
    },
    {
      "name": "CVE-2024-50024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50024"
    },
    {
      "name": "CVE-2024-47684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47684"
    },
    {
      "name": "CVE-2024-49965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49965"
    },
    {
      "name": "CVE-2024-44969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44969"
    },
    {
      "name": "CVE-2024-56634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56634"
    },
    {
      "name": "CVE-2024-43098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43098"
    },
    {
      "name": "CVE-2024-42236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42236"
    },
    {
      "name": "CVE-2024-56548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56548"
    },
    {
      "name": "CVE-2024-39469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39469"
    },
    {
      "name": "CVE-2024-39509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39509"
    },
    {
      "name": "CVE-2024-50202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50202"
    },
    {
      "name": "CVE-2023-5178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
    },
    {
      "name": "CVE-2024-26845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26845"
    },
    {
      "name": "CVE-2024-26704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26704"
    },
    {
      "name": "CVE-2024-26671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
    },
    {
      "name": "CVE-2024-46800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46800"
    },
    {
      "name": "CVE-2023-52810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52810"
    },
    {
      "name": "CVE-2024-46750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46750"
    },
    {
      "name": "CVE-2024-39484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39484"
    },
    {
      "name": "CVE-2024-53181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53181"
    },
    {
      "name": "CVE-2024-46722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46722"
    },
    {
      "name": "CVE-2024-26600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
    },
    {
      "name": "CVE-2024-47701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47701"
    },
    {
      "name": "CVE-2024-40971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40971"
    },
    {
      "name": "CVE-2023-52847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
    },
    {
      "name": "CVE-2024-39505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39505"
    },
    {
      "name": "CVE-2023-52864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
    },
    {
      "name": "CVE-2024-0646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
    },
    {
      "name": "CVE-2024-50302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
    },
    {
      "name": "CVE-2024-47713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47713"
    },
    {
      "name": "CVE-2024-49936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49936"
    },
    {
      "name": "CVE-2024-50267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
    },
    {
      "name": "CVE-2024-56637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56637"
    },
    {
      "name": "CVE-2024-47663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47663"
    },
    {
      "name": "CVE-2024-40932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40932"
    },
    {
      "name": "CVE-2024-49881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49881"
    },
    {
      "name": "CVE-2023-52478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
    },
    {
      "name": "CVE-2024-41006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41006"
    },
    {
      "name": "CVE-2023-46343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
    },
    {
      "name": "CVE-2024-46745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46745"
    },
    {
      "name": "CVE-2024-46819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46819"
    },
    {
      "name": "CVE-2024-49896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49896"
    },
    {
      "name": "CVE-2024-40904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
    },
    {
      "name": "CVE-2024-42084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42084"
    },
    {
      "name": "CVE-2024-49959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
    },
    {
      "name": "CVE-2024-49913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49913"
    },
    {
      "name": "CVE-2024-56691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56691"
    },
    {
      "name": "CVE-2024-46721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46721"
    },
    {
      "name": "CVE-2024-50045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50045"
    },
    {
      "name": "CVE-2024-26805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26805"
    },
    {
      "name": "CVE-2024-42153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42153"
    },
    {
      "name": "CVE-2024-46822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46822"
    },
    {
      "name": "CVE-2024-40960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
    },
    {
      "name": "CVE-2024-49995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49995"
    },
    {
      "name": "CVE-2024-56643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56643"
    },
    {
      "name": "CVE-2025-40570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40570"
    },
    {
      "name": "CVE-2024-56661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56661"
    },
    {
      "name": "CVE-2024-49977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
    },
    {
      "name": "CVE-2024-42154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
    },
    {
      "name": "CVE-2024-49900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49900"
    },
    {
      "name": "CVE-2024-46685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46685"
    },
    {
      "name": "CVE-2024-47679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47679"
    },
    {
      "name": "CVE-2024-36484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36484"
    },
    {
      "name": "CVE-2024-43889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
    },
    {
      "name": "CVE-2024-44998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44998"
    },
    {
      "name": "CVE-2024-46723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46723"
    },
    {
      "name": "CVE-2024-42229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42229"
    },
    {
      "name": "CVE-2024-26839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26839"
    },
    {
      "name": "CVE-2024-46828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46828"
    },
    {
      "name": "CVE-2024-50269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50269"
    },
    {
      "name": "CVE-2024-53150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53150"
    },
    {
      "name": "CVE-2024-47735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47735"
    },
    {
      "name": "CVE-2024-49952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49952"
    },
    {
      "name": "CVE-2024-49981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49981"
    },
    {
      "name": "CVE-2024-56595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56595"
    },
    {
      "name": "CVE-2024-42086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42086"
    },
    {
      "name": "CVE-2024-26581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26581"
    },
    {
      "name": "CVE-2022-48935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48935"
    },
    {
      "name": "CVE-2023-52433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52433"
    },
    {
      "name": "CVE-2024-41007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41007"
    },
    {
      "name": "CVE-2024-41095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
    },
    {
      "name": "CVE-2024-56601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56601"
    },
    {
      "name": "CVE-2023-52600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52600"
    },
    {
      "name": "CVE-2024-53057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53057"
    },
    {
      "name": "CVE-2024-26910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
    },
    {
      "name": "CVE-2024-50181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50181"
    },
    {
      "name": "CVE-2023-52507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52507"
    },
    {
      "name": "CVE-2024-56571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56571"
    },
    {
      "name": "CVE-2023-52764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
    },
    {
      "name": "CVE-2023-52587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52587"
    },
    {
      "name": "CVE-2023-52887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52887"
    },
    {
      "name": "CVE-2024-46675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46675"
    },
    {
      "name": "CVE-2024-26645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26645"
    },
    {
      "name": "CVE-2024-26702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
    },
    {
      "name": "CVE-2024-46783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46783"
    },
    {
      "name": "CVE-2023-51779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
    },
    {
      "name": "CVE-2024-42076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42076"
    },
    {
      "name": "CVE-2024-26673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26673"
    },
    {
      "name": "CVE-2024-49997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49997"
    },
    {
      "name": "CVE-2024-42092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42092"
    },
    {
      "name": "CVE-2024-26720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
    },
    {
      "name": "CVE-2024-0584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0584"
    },
    {
      "name": "CVE-2024-42093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
    },
    {
      "name": "CVE-2024-42247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42247"
    },
    {
      "name": "CVE-2024-43871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43871"
    },
    {
      "name": "CVE-2024-53066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53066"
    },
    {
      "name": "CVE-2023-52784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
    },
    {
      "name": "CVE-2024-43880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
    },
    {
      "name": "CVE-2024-27413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27413"
    },
    {
      "name": "CVE-2024-56629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56629"
    },
    {
      "name": "CVE-2024-50304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50304"
    },
    {
      "name": "CVE-2024-40959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
    },
    {
      "name": "CVE-2024-26615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
    },
    {
      "name": "CVE-2023-52853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52853"
    },
    {
      "name": "CVE-2024-46689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46689"
    },
    {
      "name": "CVE-2024-50295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50295"
    },
    {
      "name": "CVE-2024-26801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
    },
    {
      "name": "CVE-2024-50051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50051"
    },
    {
      "name": "CVE-2024-41078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
    },
    {
      "name": "CVE-2024-53063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53063"
    },
    {
      "name": "CVE-2024-53171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53171"
    },
    {
      "name": "CVE-2024-56602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56602"
    },
    {
      "name": "CVE-2024-46781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46781"
    },
    {
      "name": "CVE-2024-56770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56770"
    },
    {
      "name": "CVE-2024-53157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53157"
    },
    {
      "name": "CVE-2025-30034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30034"
    },
    {
      "name": "CVE-2024-46777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
    },
    {
      "name": "CVE-2023-52340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
    },
    {
      "name": "CVE-2024-50199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50199"
    },
    {
      "name": "CVE-2024-26779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
    },
    {
      "name": "CVE-2024-40916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40916"
    },
    {
      "name": "CVE-2024-0193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0193"
    },
    {
      "name": "CVE-2023-52604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52604"
    },
    {
      "name": "CVE-2024-50040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50040"
    },
    {
      "name": "CVE-2024-38586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
    },
    {
      "name": "CVE-2024-56739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56739"
    },
    {
      "name": "CVE-2024-50292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50292"
    },
    {
      "name": "CVE-2024-53103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53103"
    },
    {
      "name": "CVE-2024-46714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46714"
    },
    {
      "name": "CVE-2024-40976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40976"
    },
    {
      "name": "CVE-2024-41081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
    },
    {
      "name": "CVE-2025-40746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40746"
    },
    {
      "name": "CVE-2024-49983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49983"
    },
    {
      "name": "CVE-2023-52601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52601"
    },
    {
      "name": "CVE-2024-41072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
    },
    {
      "name": "CVE-2024-44960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44960"
    },
    {
      "name": "CVE-2024-26773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26773"
    },
    {
      "name": "CVE-2024-26722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
    },
    {
      "name": "CVE-2024-54678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54678"
    },
    {
      "name": "CVE-2024-26598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
    },
    {
      "name": "CVE-2024-53197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
    },
    {
      "name": "CVE-2024-26679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
    },
    {
      "name": "CVE-2024-39468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39468"
    },
    {
      "name": "CVE-2024-26763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26763"
    },
    {
      "name": "CVE-2024-49889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49889"
    },
    {
      "name": "CVE-2023-52435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
    },
    {
      "name": "CVE-2024-40980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40980"
    },
    {
      "name": "CVE-2023-52654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
    },
    {
      "name": "CVE-2024-36938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
    },
    {
      "name": "CVE-2024-40974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40974"
    },
    {
      "name": "CVE-2023-52855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52855"
    },
    {
      "name": "CVE-2024-56779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56779"
    },
    {
      "name": "CVE-2024-26749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26749"
    },
    {
      "name": "CVE-2024-44971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44971"
    },
    {
      "name": "CVE-2023-52603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52603"
    },
    {
      "name": "CVE-2024-43894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43894"
    },
    {
      "name": "CVE-2023-52486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52486"
    },
    {
      "name": "CVE-2024-43867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43867"
    },
    {
      "name": "CVE-2023-52868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52868"
    },
    {
      "name": "CVE-2023-52619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
    },
    {
      "name": "CVE-2023-52796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
    },
    {
      "name": "CVE-2023-52475",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
    },
    {
      "name": "CVE-2024-50013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50013"
    },
    {
      "name": "CVE-2024-50185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50185"
    },
    {
      "name": "CVE-2024-53239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53239"
    },
    {
      "name": "CVE-2023-52617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52617"
    },
    {
      "name": "CVE-2024-49957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49957"
    },
    {
      "name": "CVE-2024-49962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49962"
    },
    {
      "name": "CVE-2024-46731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46731"
    },
    {
      "name": "CVE-2024-39502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
    },
    {
      "name": "CVE-2024-46674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46674"
    },
    {
      "name": "CVE-2023-52836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52836"
    },
    {
      "name": "CVE-2024-26804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
    },
    {
      "name": "CVE-2024-26593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
    },
    {
      "name": "CVE-2024-26751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26751"
    },
    {
      "name": "CVE-2024-49958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49958"
    },
    {
      "name": "CVE-2024-50082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50082"
    },
    {
      "name": "CVE-2024-47723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47723"
    },
    {
      "name": "CVE-2024-49955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49955"
    },
    {
      "name": "CVE-2024-42087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42087"
    },
    {
      "name": "CVE-2024-44944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44944"
    },
    {
      "name": "CVE-2024-43893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43893"
    },
    {
      "name": "CVE-2024-50095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50095"
    },
    {
      "name": "CVE-2024-40983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
    },
    {
      "name": "CVE-2024-50296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50296"
    },
    {
      "name": "CVE-2024-57874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57874"
    },
    {
      "name": "CVE-2024-53145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53145"
    },
    {
      "name": "CVE-2024-50006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50006"
    },
    {
      "name": "CVE-2022-49034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49034"
    },
    {
      "name": "CVE-2024-50049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50049"
    },
    {
      "name": "CVE-2024-27412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27412"
    },
    {
      "name": "CVE-2024-26636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
    },
    {
      "name": "CVE-2024-56642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56642"
    },
    {
      "name": "CVE-2024-50007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50007"
    },
    {
      "name": "CVE-2024-56586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56586"
    },
    {
      "name": "CVE-2023-39198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39198"
    },
    {
      "name": "CVE-2024-40963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40963"
    },
    {
      "name": "CVE-2025-40752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40752"
    },
    {
      "name": "CVE-2024-41041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
    },
    {
      "name": "CVE-2024-50096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50096"
    },
    {
      "name": "CVE-2023-52789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52789"
    },
    {
      "name": "CVE-2024-49868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49868"
    },
    {
      "name": "CVE-2024-40947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40947"
    },
    {
      "name": "CVE-2024-53173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53173"
    },
    {
      "name": "CVE-2024-50237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50237"
    },
    {
      "name": "CVE-2023-52867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
    },
    {
      "name": "CVE-2024-44995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44995"
    },
    {
      "name": "CVE-2024-46757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46757"
    },
    {
      "name": "CVE-2024-42232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42232"
    },
    {
      "name": "CVE-2024-47699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47699"
    },
    {
      "name": "CVE-2024-56581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56581"
    },
    {
      "name": "CVE-2024-46677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46677"
    },
    {
      "name": "CVE-2024-50059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50059"
    },
    {
      "name": "CVE-2024-50264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50264"
    },
    {
      "name": "CVE-2024-26606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
    },
    {
      "name": "CVE-2024-35833",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35833"
    },
    {
      "name": "CVE-2024-41005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41005"
    },
    {
      "name": "CVE-2024-43883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43883"
    },
    {
      "name": "CVE-2024-56623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56623"
    },
    {
      "name": "CVE-2024-26625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
    },
    {
      "name": "CVE-2024-44935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
    },
    {
      "name": "CVE-2024-44999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44999"
    },
    {
      "name": "CVE-2024-47712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47712"
    },
    {
      "name": "CVE-2024-56610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56610"
    },
    {
      "name": "CVE-2024-26748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26748"
    },
    {
      "name": "CVE-2023-52809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52809"
    },
    {
      "name": "CVE-2024-42223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
    },
    {
      "name": "CVE-2024-49963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49963"
    },
    {
      "name": "CVE-2024-49971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49971"
    },
    {
      "name": "CVE-2024-56562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56562"
    },
    {
      "name": "CVE-2024-26635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
    },
    {
      "name": "CVE-2023-52805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52805"
    },
    {
      "name": "CVE-2024-41097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41097"
    },
    {
      "name": "CVE-2024-49875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
    },
    {
      "name": "CVE-2024-47739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47739"
    },
    {
      "name": "CVE-2024-47705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47705"
    },
    {
      "name": "CVE-2024-53161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53161"
    },
    {
      "name": "CVE-2023-52919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52919"
    },
    {
      "name": "CVE-2024-50035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50035"
    },
    {
      "name": "CVE-2024-56600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56600"
    },
    {
      "name": "CVE-2024-36978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
    },
    {
      "name": "CVE-2024-44988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44988"
    },
    {
      "name": "CVE-2024-47660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47660"
    },
    {
      "name": "CVE-2024-56690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56690"
    },
    {
      "name": "CVE-2024-56597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56597"
    },
    {
      "name": "CVE-2024-40905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40905"
    },
    {
      "name": "CVE-2024-56574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56574"
    },
    {
      "name": "CVE-2024-47740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47740"
    },
    {
      "name": "CVE-2024-41063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
    },
    {
      "name": "CVE-2024-41017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
    },
    {
      "name": "CVE-2024-26697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
    },
    {
      "name": "CVE-2024-42244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
    },
    {
      "name": "CVE-2024-49924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49924"
    },
    {
      "name": "CVE-2024-46758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46758"
    },
    {
      "name": "CVE-2024-53217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53217"
    },
    {
      "name": "CVE-2024-53183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53183"
    },
    {
      "name": "CVE-2024-49938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49938"
    },
    {
      "name": "CVE-2024-41012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
    },
    {
      "name": "CVE-2024-40902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
    },
    {
      "name": "CVE-2024-47756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47756"
    },
    {
      "name": "CVE-2024-40934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40934"
    },
    {
      "name": "CVE-2024-47667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47667"
    },
    {
      "name": "CVE-2024-46756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46756"
    },
    {
      "name": "CVE-2024-56615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56615"
    },
    {
      "name": "CVE-2024-47737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47737"
    },
    {
      "name": "CVE-2024-46739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46739"
    },
    {
      "name": "CVE-2024-47669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47669"
    },
    {
      "name": "CVE-2024-56705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56705"
    },
    {
      "name": "CVE-2024-50290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50290"
    },
    {
      "name": "CVE-2024-50008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50008"
    },
    {
      "name": "CVE-2024-42082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42082"
    },
    {
      "name": "CVE-2024-26685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
    },
    {
      "name": "CVE-2024-56704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56704"
    },
    {
      "name": "CVE-2024-45006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45006"
    },
    {
      "name": "CVE-2024-46725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46725"
    },
    {
      "name": "CVE-2024-46829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46829"
    },
    {
      "name": "CVE-2024-40912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
    },
    {
      "name": "CVE-2023-52599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52599"
    },
    {
      "name": "CVE-2024-56589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56589"
    },
    {
      "name": "CVE-2024-50265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50265"
    },
    {
      "name": "CVE-2024-56636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56636"
    },
    {
      "name": "CVE-2024-41089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
    },
    {
      "name": "CVE-2024-39487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
    },
    {
      "name": "CVE-2024-56567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56567"
    },
    {
      "name": "CVE-2024-44954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44954"
    },
    {
      "name": "CVE-2024-43908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43908"
    },
    {
      "name": "CVE-2023-3567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3567"
    },
    {
      "name": "CVE-2024-50033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50033"
    },
    {
      "name": "CVE-2024-43890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43890"
    },
    {
      "name": "CVE-2024-26688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26688"
    },
    {
      "name": "CVE-2023-52865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52865"
    },
    {
      "name": "CVE-2024-49901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
    },
    {
      "name": "CVE-2024-36901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
    },
    {
      "name": "CVE-2024-56688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56688"
    },
    {
      "name": "CVE-2024-41090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
    },
    {
      "name": "CVE-2024-50180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50180"
    },
    {
      "name": "CVE-2024-26663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
    },
    {
      "name": "CVE-2024-50282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
    },
    {
      "name": "CVE-2024-50273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50273"
    },
    {
      "name": "CVE-2024-26675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
    },
    {
      "name": "CVE-2024-56532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56532"
    },
    {
      "name": "CVE-2024-41077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41077"
    },
    {
      "name": "CVE-2024-47143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47143"
    },
    {
      "name": "CVE-2024-49949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
    },
    {
      "name": "CVE-2023-52509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52509"
    },
    {
      "name": "CVE-2024-44952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44952"
    },
    {
      "name": "CVE-2023-52753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52753"
    },
    {
      "name": "CVE-2024-26840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
    },
    {
      "name": "CVE-2024-50046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50046"
    },
    {
      "name": "CVE-2023-52583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52583"
    },
    {
      "name": "CVE-2024-50099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50099"
    },
    {
      "name": "CVE-2024-50193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50193"
    },
    {
      "name": "CVE-2024-46743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46743"
    },
    {
      "name": "CVE-2024-49944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49944"
    },
    {
      "name": "CVE-2023-52602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52602"
    },
    {
      "name": "CVE-2024-50198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50198"
    },
    {
      "name": "CVE-2023-52832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
    },
    {
      "name": "CVE-2024-56746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56746"
    },
    {
      "name": "CVE-2024-47749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47749"
    },
    {
      "name": "CVE-2024-41092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
    },
    {
      "name": "CVE-2024-49966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49966"
    },
    {
      "name": "CVE-2024-40995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
    },
    {
      "name": "CVE-2024-41087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
    },
    {
      "name": "CVE-2023-52819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52819"
    },
    {
      "name": "CVE-2023-52876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52876"
    },
    {
      "name": "CVE-2024-42095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42095"
    },
    {
      "name": "CVE-2024-49902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49902"
    },
    {
      "name": "CVE-2024-47757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47757"
    },
    {
      "name": "CVE-2025-30033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30033"
    },
    {
      "name": "CVE-2024-27417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27417"
    },
    {
      "name": "CVE-2024-48881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48881"
    },
    {
      "name": "CVE-2024-47692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47692"
    },
    {
      "name": "CVE-2024-46744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46744"
    },
    {
      "name": "CVE-2024-0841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
    },
    {
      "name": "CVE-2025-40753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40753"
    },
    {
      "name": "CVE-2024-50184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50184"
    },
    {
      "name": "CVE-2024-40929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
    },
    {
      "name": "CVE-2024-39501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
    },
    {
      "name": "CVE-2024-52504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52504"
    },
    {
      "name": "CVE-2024-50287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50287"
    },
    {
      "name": "CVE-2024-56747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56747"
    },
    {
      "name": "CVE-2024-49851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49851"
    },
    {
      "name": "CVE-2023-6040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
    },
    {
      "name": "CVE-2023-52510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52510"
    },
    {
      "name": "CVE-2023-51781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51781"
    },
    {
      "name": "CVE-2024-56603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56603"
    },
    {
      "name": "CVE-2024-53158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53158"
    },
    {
      "name": "CVE-2024-43882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43882"
    },
    {
      "name": "CVE-2024-41068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41068"
    },
    {
      "name": "CVE-2024-56644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56644"
    },
    {
      "name": "CVE-2024-46780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46780"
    },
    {
      "name": "CVE-2024-46817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46817"
    },
    {
      "name": "CVE-2024-42101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42101"
    },
    {
      "name": "CVE-2025-40751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40751"
    },
    {
      "name": "CVE-2024-50278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50278"
    },
    {
      "name": "CVE-2024-50201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50201"
    },
    {
      "name": "CVE-2024-35835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
    },
    {
      "name": "CVE-2024-56701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56701"
    },
    {
      "name": "CVE-2024-42077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42077"
    },
    {
      "name": "CVE-2023-52670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52670"
    },
    {
      "name": "CVE-2024-40943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40943"
    },
    {
      "name": "CVE-2024-26735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
    },
    {
      "name": "CVE-2024-49933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49933"
    },
    {
      "name": "CVE-2024-53184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53184"
    },
    {
      "name": "CVE-2024-47685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47685"
    },
    {
      "name": "CVE-2024-40901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
    },
    {
      "name": "CVE-2022-48829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48829"
    },
    {
      "name": "CVE-2024-53174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53174"
    },
    {
      "name": "CVE-2024-49879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49879"
    },
    {
      "name": "CVE-2024-39495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39495"
    },
    {
      "name": "CVE-2024-50044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50044"
    },
    {
      "name": "CVE-2024-49894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49894"
    },
    {
      "name": "CVE-2024-56700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56700"
    },
    {
      "name": "CVE-2024-47718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47718"
    },
    {
      "name": "CVE-2024-49867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49867"
    },
    {
      "name": "CVE-2023-51780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
    },
    {
      "name": "CVE-2024-49985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49985"
    },
    {
      "name": "CVE-2024-50001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50001"
    },
    {
      "name": "CVE-2023-52881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
    },
    {
      "name": "CVE-2024-49993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49993"
    },
    {
      "name": "CVE-2024-56728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56728"
    },
    {
      "name": "CVE-2024-43861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43861"
    },
    {
      "name": "CVE-2024-53241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
    },
    {
      "name": "CVE-2023-52838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52838"
    },
    {
      "name": "CVE-2024-47710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47710"
    },
    {
      "name": "CVE-2024-46771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46771"
    },
    {
      "name": "CVE-2024-50083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50083"
    },
    {
      "name": "CVE-2023-52774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52774"
    },
    {
      "name": "CVE-2024-56531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56531"
    },
    {
      "name": "CVE-2024-49892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49892"
    },
    {
      "name": "CVE-2024-49930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49930"
    },
    {
      "name": "CVE-2024-53148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53148"
    },
    {
      "name": "CVE-2024-47698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47698"
    },
    {
      "name": "CVE-2023-52879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
    },
    {
      "name": "CVE-2024-56681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56681"
    },
    {
      "name": "CVE-2024-26602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
    },
    {
      "name": "CVE-2023-52799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52799"
    },
    {
      "name": "CVE-2024-38619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
    },
    {
      "name": "CVE-2024-50039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50039"
    },
    {
      "name": "CVE-2024-50251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50251"
    },
    {
      "name": "CVE-2024-56754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56754"
    },
    {
      "name": "CVE-2024-49973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49973"
    },
    {
      "name": "CVE-2024-53214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53214"
    },
    {
      "name": "CVE-2024-39476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39476"
    },
    {
      "name": "CVE-2024-46804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46804"
    },
    {
      "name": "CVE-2024-56619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56619"
    },
    {
      "name": "CVE-2024-47668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
    },
    {
      "name": "CVE-2024-49883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49883"
    },
    {
      "name": "CVE-2024-53165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53165"
    },
    {
      "name": "CVE-2024-50236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50236"
    },
    {
      "name": "CVE-2024-46840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46840"
    },
    {
      "name": "CVE-2022-48828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48828"
    },
    {
      "name": "CVE-2024-56568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56568"
    },
    {
      "name": "CVE-2024-46763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763"
    },
    {
      "name": "CVE-2024-41059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
    },
    {
      "name": "CVE-2024-42094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42094"
    },
    {
      "name": "CVE-2024-53146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53146"
    },
    {
      "name": "CVE-2024-46759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
    },
    {
      "name": "CVE-2024-27416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27416"
    },
    {
      "name": "CVE-2023-52598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
    },
    {
      "name": "CVE-2024-46737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46737"
    },
    {
      "name": "CVE-2024-41040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
    },
    {
      "name": "CVE-2023-6606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
    },
    {
      "name": "CVE-2024-40987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40987"
    },
    {
      "name": "CVE-2024-56539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56539"
    },
    {
      "name": "CVE-2023-52806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
    },
    {
      "name": "CVE-2024-56662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56662"
    },
    {
      "name": "CVE-2024-46814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46814"
    },
    {
      "name": "CVE-2024-56572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56572"
    },
    {
      "name": "CVE-2024-56570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56570"
    },
    {
      "name": "CVE-2024-26793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26793"
    },
    {
      "name": "CVE-2024-40945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40945"
    },
    {
      "name": "CVE-2024-46818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46818"
    },
    {
      "name": "CVE-2023-6932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
    },
    {
      "name": "CVE-2024-50602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
    },
    {
      "name": "CVE-2024-40941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
    },
    {
      "name": "CVE-2022-48827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48827"
    },
    {
      "name": "CVE-2023-52594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
    },
    {
      "name": "CVE-2024-53198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53198"
    },
    {
      "name": "CVE-2024-44965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44965"
    },
    {
      "name": "CVE-2024-49860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49860"
    },
    {
      "name": "CVE-2024-45003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45003"
    },
    {
      "name": "CVE-2024-41055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
    },
    {
      "name": "CVE-2023-52595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
    },
    {
      "name": "CVE-2025-47809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47809"
    },
    {
      "name": "CVE-2024-50234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50234"
    },
    {
      "name": "CVE-2024-56720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56720"
    },
    {
      "name": "CVE-2024-26752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26752"
    },
    {
      "name": "CVE-2024-41015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
    },
    {
      "name": "CVE-2024-53155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53155"
    },
    {
      "name": "CVE-2024-40984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
    },
    {
      "name": "CVE-2024-42224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42224"
    },
    {
      "name": "CVE-2024-50194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50194"
    },
    {
      "name": "CVE-2024-46832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46832"
    },
    {
      "name": "CVE-2023-52871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52871"
    },
    {
      "name": "CVE-2024-49895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49895"
    },
    {
      "name": "CVE-2024-56785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56785"
    },
    {
      "name": "CVE-2023-52623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
    },
    {
      "name": "CVE-2024-26736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26736"
    },
    {
      "name": "CVE-2024-56587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56587"
    },
    {
      "name": "CVE-2024-45021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45021"
    },
    {
      "name": "CVE-2023-52655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52655"
    },
    {
      "name": "CVE-2024-49882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49882"
    },
    {
      "name": "CVE-2024-47659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
    },
    {
      "name": "CVE-2024-42161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
    },
    {
      "name": "CVE-2023-52813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
    },
    {
      "name": "CVE-2024-56741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56741"
    },
    {
      "name": "CVE-2023-52504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52504"
    },
    {
      "name": "CVE-2024-39506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
    },
    {
      "name": "CVE-2024-40990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40990"
    },
    {
      "name": "CVE-2024-40978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
    },
    {
      "name": "CVE-2024-53104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
    },
    {
      "name": "CVE-2023-52615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
    },
    {
      "name": "CVE-2024-40968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40968"
    },
    {
      "name": "CVE-2024-45025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45025"
    },
    {
      "name": "CVE-2024-27414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27414"
    },
    {
      "name": "CVE-2024-56748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56748"
    },
    {
      "name": "CVE-2024-41035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41035"
    },
    {
      "name": "CVE-2024-56648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56648"
    },
    {
      "name": "CVE-2024-26777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26777"
    },
    {
      "name": "CVE-2024-41049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
    },
    {
      "name": "CVE-2024-26764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26764"
    },
    {
      "name": "CVE-2024-42143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42143"
    },
    {
      "name": "CVE-2021-47316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
    },
    {
      "name": "CVE-2024-56558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56558"
    },
    {
      "name": "CVE-2024-41065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41065"
    },
    {
      "name": "CVE-2024-43879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43879"
    },
    {
      "name": "CVE-2024-46761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46761"
    },
    {
      "name": "CVE-2023-52606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
    },
    {
      "name": "CVE-2024-50301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50301"
    },
    {
      "name": "CVE-2024-26778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26778"
    },
    {
      "name": "CVE-2024-37078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37078"
    },
    {
      "name": "CVE-2024-49975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49975"
    },
    {
      "name": "CVE-2024-53240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
    },
    {
      "name": "CVE-2024-50179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50179"
    },
    {
      "name": "CVE-2024-53101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53101"
    },
    {
      "name": "CVE-2024-47696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
    },
    {
      "name": "CVE-2023-52840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
    },
    {
      "name": "CVE-2024-53156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53156"
    },
    {
      "name": "CVE-2023-52502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
    },
    {
      "name": "CVE-2024-41091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
    },
    {
      "name": "CVE-2024-42105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
    },
    {
      "name": "CVE-2024-50015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50015"
    },
    {
      "name": "CVE-2023-52597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52597"
    },
    {
      "name": "CVE-2024-41044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
    },
    {
      "name": "CVE-2024-40958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
    },
    {
      "name": "CVE-2023-52581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52581"
    },
    {
      "name": "CVE-2024-45008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45008"
    },
    {
      "name": "CVE-2024-50188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50188"
    },
    {
      "name": "CVE-2024-56533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56533"
    },
    {
      "name": "CVE-2024-40981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40981"
    },
    {
      "name": "CVE-2023-52917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
    },
    {
      "name": "CVE-2024-56598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56598"
    },
    {
      "name": "CVE-2024-1086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
    },
    {
      "name": "CVE-2024-53060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53060"
    },
    {
      "name": "CVE-2023-52875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52875"
    },
    {
      "name": "CVE-2024-44990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
    },
    {
      "name": "CVE-2024-44987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44987"
    },
    {
      "name": "CVE-2024-56781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56781"
    },
    {
      "name": "CVE-2024-41046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
    },
    {
      "name": "CVE-2024-50089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50089"
    },
    {
      "name": "CVE-2024-56630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56630"
    },
    {
      "name": "CVE-2024-42152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42152"
    },
    {
      "name": "CVE-2024-49982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49982"
    },
    {
      "name": "CVE-2023-52835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
    },
    {
      "name": "CVE-2024-53059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53059"
    },
    {
      "name": "CVE-2024-50299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
    },
    {
      "name": "CVE-2024-50218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50218"
    },
    {
      "name": "CVE-2024-42148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42148"
    },
    {
      "name": "CVE-2024-39482",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
    },
    {
      "name": "CVE-2024-39499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
    },
    {
      "name": "CVE-2024-56633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56633"
    },
    {
      "name": "CVE-2024-56593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56593"
    },
    {
      "name": "CVE-2024-56605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56605"
    },
    {
      "name": "CVE-2024-53680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53680"
    },
    {
      "name": "CVE-2024-26835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26835"
    },
    {
      "name": "CVE-2024-26791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26791"
    },
    {
      "name": "CVE-2023-52843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52843"
    },
    {
      "name": "CVE-2024-50279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
    },
    {
      "name": "CVE-2024-41064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
    },
    {
      "name": "CVE-2024-36894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
    },
    {
      "name": "CVE-2024-56698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56698"
    },
    {
      "name": "CVE-2024-47742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47742"
    },
    {
      "name": "CVE-2024-47709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47709"
    },
    {
      "name": "CVE-2024-41020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41020"
    },
    {
      "name": "CVE-2024-26772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26772"
    },
    {
      "name": "CVE-2024-46782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46782"
    },
    {
      "name": "CVE-2024-56780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56780"
    },
    {
      "name": "CVE-2024-47706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47706"
    },
    {
      "name": "CVE-2024-27405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27405"
    },
    {
      "name": "CVE-2024-46702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46702"
    },
    {
      "name": "CVE-2023-5717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
    },
    {
      "name": "CVE-2024-47747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47747"
    },
    {
      "name": "CVE-2024-40942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40942"
    },
    {
      "name": "CVE-2024-26766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26766"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2024-26664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
    },
    {
      "name": "CVE-2024-46719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46719"
    },
    {
      "name": "CVE-2024-49877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49877"
    },
    {
      "name": "CVE-2023-52791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
    },
    {
      "name": "CVE-2024-44949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44949"
    },
    {
      "name": "CVE-2023-6121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
    },
    {
      "name": "CVE-2023-52607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
    },
    {
      "name": "CVE-2024-56650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56650"
    },
    {
      "name": "CVE-2024-44989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
    },
    {
      "name": "CVE-2024-26788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26788"
    },
    {
      "name": "CVE-2023-52817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
    },
    {
      "name": "CVE-2024-27410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
    },
    {
      "name": "CVE-2024-26684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
    },
    {
      "name": "CVE-2024-53237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53237"
    },
    {
      "name": "CVE-2023-6931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
    },
    {
      "name": "CVE-2024-56576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56576"
    },
    {
      "name": "CVE-2024-42145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
    },
    {
      "name": "CVE-2024-40961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
    },
    {
      "name": "CVE-2024-53227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53227"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0677",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-707630",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-707630.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-331739",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-331739.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-693808",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-693808.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-613116",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-613116.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-493396",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-493396.html"
    },
    {
      "published_at": "2025-08-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-400089",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-400089.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-493787",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-493787.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-894058",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-894058.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-355557",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-355557.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-529291",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-529291.html"
    },
    {
      "published_at": "2025-08-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-282044",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-282044.html"
    }
  ]
}

CERTFR-2025-AVI-0566

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V20 versions antérieures à V20 Update 3
Siemens SIPROTEC SIPROTEC 5 toutes versions pour la vulnérabilité CVE-2025-40742
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V19 toutes versions pour la vulnérabilité CVE-2025-27127
Siemens SICAM SICAM TOOLBOX II versions antérieures à V07.11
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V18 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-27127.
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-27127.
Siemens SIMATIC SIMATIC CN 4100 versions antérieures à V4.0
References
Bulletin de sécurité Siemens SSA-904646 2025-07-08 vendor-advisory
Bulletin de sécurité Siemens SSA-460466 2025-07-08 vendor-advisory
Bulletin de sécurité Siemens SSA-183963 2025-07-08 vendor-advisory
Bulletin de sécurité Siemens SSA-626991 2025-07-08 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V20 versions ant\u00e9rieures \u00e0 V20 Update 3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40742",
      "product": {
        "name": "SIPROTEC",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-27127",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM TOOLBOX II versions ant\u00e9rieures \u00e0 V07.11",
      "product": {
        "name": "SICAM",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V18 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-27127.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-27127.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CN 4100 versions ant\u00e9rieures \u00e0 V4.0",
      "product": {
        "name": "SIMATIC",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-31853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31853"
    },
    {
      "name": "CVE-2025-40593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40593"
    },
    {
      "name": "CVE-2024-31854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31854"
    },
    {
      "name": "CVE-2025-27127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27127"
    },
    {
      "name": "CVE-2025-40742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40742"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0566",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2025-07-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-904646",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-904646.html"
    },
    {
      "published_at": "2025-07-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-460466",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-460466.html"
    },
    {
      "published_at": "2025-07-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-183963",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-183963.html"
    },
    {
      "published_at": "2025-07-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-626991",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-626991.html"
    }
  ]
}

CERTFR-2025-AVI-0397

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SIPROTEC 5 7SL87 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7SL86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7SD86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7SX85 (CP300) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 6MD85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A POWER METER SICAM Q100 family versions antérieures à V2.70
Siemens N/A SIPROTEC 5 6MD89 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7UT87 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7VK87 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V17 toutes versions
Siemens N/A SIPROTEC 5 7ST85 (CP300) versions antérieures à V9.68
Siemens N/A SIPROTEC 5 6MD84 (CP300) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V18 toutes versions
Siemens N/A SIMATIC PCS neo versions antérieures à V5.0 Update 1
Siemens N/A SIPROTEC 5 7SJ86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7SD87 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A POWER METER SICAM Q200 family toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7SK85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7UT85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7VU85 (CP300) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V19 toutes versions
Siemens N/A SIMATIC PCS neo V4.1 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2025-30174, CVE-2025-30175 et CVE-2025-30176.
Siemens N/A SIMATIC PCS neo versions antérieures à V4.1 Update 3
Siemens N/A SIMATIC IPC RS-828A toutes versions pour la vulnérabilité CVE-2024-54085
Siemens N/A SIPROTEC 5 7SJ85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE LPE9403 toutes versions pour les vulnérabilités CVE-2025-40581, CVE-2025-40582 et CVE-2025-40583.
Siemens N/A Desigo CC toutes versions
Siemens N/A SIMATIC PCS neo V5.0 toutes versions pour les vulnérabilités CVE-2025-30174, CVE-2025-30175 et CVE-2025-30176.
Siemens N/A SIPROTEC 5 7ST86 (CP300) versions antérieures à V9.83
Siemens N/A SCALANCE LPE9403 toutes versions pour les vulnérabilités CVE-2025-40572, CVE-2025-40573, CVE-2025-40574, CVE-2025-40575, CVE-2025-40576, CVE-2025-40577, CVE-2025-40578, CVE-2025-40579 et CVE-2025-40580.
Siemens N/A SIPROTEC 5 7SA87 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 6MU85 (CP300) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7UM85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7SA86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7VE85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7KE85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V20 toutes versions
Siemens N/A SIPROTEC 5 7UT86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPROTEC 5 7SS85 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A SICORE Base system toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SICAM GridPass versions antérieures à V2.50
Siemens N/A SIPROTEC 5 6MD89 (CP300) V9.6 versions antérieures à V9.68
Siemens N/A SIPROTEC 5 6MD86 (CP300) versions supérieures ou égales àV7.80 pour la vulnérabilité CVE-2024-3596
Siemens N/A CPCI85 Central Processing/Communication toutes versions pour la vulnérabilité CVE-2024-3596
References
Bulletin de sécurité Siemens SSA-523418 2025-05-13 vendor-advisory
Bulletin de sécurité Siemens SSA-446307 2025-05-13 vendor-advisory
Bulletin de sécurité Siemens SSA-339086 2025-05-13 vendor-advisory
Bulletin de sécurité Siemens SSA-614723 2025-05-13 vendor-advisory
Bulletin de sécurité Siemens SSA-794185 2025-05-13 vendor-advisory
Bulletin de sécurité Siemens SSA-327438 2025-05-13 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIPROTEC 5 7SL87 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7SL86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7SD86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7SX85 (CP300) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 6MD85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "POWER METER SICAM Q100 family versions ant\u00e9rieures \u00e0 V2.70",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 6MD89 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7UT87 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7VK87 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V17 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7ST85 (CP300) versions ant\u00e9rieures \u00e0 V9.68",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 6MD84 (CP300) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V18 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo versions ant\u00e9rieures \u00e0 V5.0 Update 1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7SJ86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7SD87 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "POWER METER SICAM Q200 family toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7SK85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7UT85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7VU85 (CP300) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V19 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V4.1 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2025-30174, CVE-2025-30175 et CVE-2025-30176.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo versions ant\u00e9rieures \u00e0 V4.1 Update 3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC RS-828A toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54085",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7SJ85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE LPE9403 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2025-40581, CVE-2025-40582 et CVE-2025-40583.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Desigo CC toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V5.0 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2025-30174, CVE-2025-30175 et CVE-2025-30176.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7ST86 (CP300) versions ant\u00e9rieures \u00e0 V9.83",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE LPE9403 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2025-40572, CVE-2025-40573, CVE-2025-40574, CVE-2025-40575, CVE-2025-40576, CVE-2025-40577, CVE-2025-40578, CVE-2025-40579 et CVE-2025-40580.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7SA87 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 6MU85 (CP300) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7UM85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7SA86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7VE85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7KE85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V20 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7UT86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 7SS85 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICORE Base system toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM GridPass versions ant\u00e9rieures \u00e0 V2.50",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 6MD89 (CP300) V9.6 versions ant\u00e9rieures \u00e0 V9.68",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 6MD86 (CP300) versions sup\u00e9rieures ou \u00e9gales \u00e0V7.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "CPCI85 Central Processing/Communication toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-40572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40572"
    },
    {
      "name": "CVE-2025-40577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40577"
    },
    {
      "name": "CVE-2025-30175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30175"
    },
    {
      "name": "CVE-2025-40582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40582"
    },
    {
      "name": "CVE-2025-30176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30176"
    },
    {
      "name": "CVE-2025-40574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40574"
    },
    {
      "name": "CVE-2024-3596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
    },
    {
      "name": "CVE-2025-40581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40581"
    },
    {
      "name": "CVE-2025-30174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30174"
    },
    {
      "name": "CVE-2024-23815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23815"
    },
    {
      "name": "CVE-2025-40576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40576"
    },
    {
      "name": "CVE-2025-40578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40578"
    },
    {
      "name": "CVE-2024-54085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54085"
    },
    {
      "name": "CVE-2025-40575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40575"
    },
    {
      "name": "CVE-2025-40566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40566"
    },
    {
      "name": "CVE-2025-40580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40580"
    },
    {
      "name": "CVE-2025-40573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40573"
    },
    {
      "name": "CVE-2025-40579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40579"
    },
    {
      "name": "CVE-2025-40583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40583"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0397",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Injection SQL (SQLi)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-523418",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-523418.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-446307",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-446307.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-339086",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-339086.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-614723",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-614723.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-794185",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-794185.html"
    },
    {
      "published_at": "2025-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-327438",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-327438.html"
    }
  ]
}

CERTFR-2025-AVI-0284

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SIMATIC CFU PA (6ES7655-5PX11-0XX0) versions antérieures à V2.0.0
Siemens N/A SIMATIC IPC847E Industrial Edge Device versions antérieures à V3.0
Siemens N/A SIMATIC IPC227E Industrial Edge Device versions antérieures à V3.0
Siemens N/A SIMATIC ET 200M IM 153-4 PN IO HF (6ES7153-4BA00-0XB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) versions antérieures à V8.3
Siemens N/A SIMATIC IPC427E Industrial Edge Device versions antérieures à V3.0
Siemens N/A SIMATIC IPC BX-59A Industrial Edge Device versions antérieures à V3.0
Siemens N/A SIMATIC (et SIPLUS) S7-1200 CPU versions antérieures à V4.4
Siemens N/A SIMATIC (et SIPLUS) S7-300 CPU toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SIMATIC Power Line Booster PLB, Modem Module ST (6ES7972-5AA51-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SIMATIC Power Line Booster PLB, Base Module (6ES7972-5AA10-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SIMATIC TDC CP51M1 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SIMATIC CFU DIQ (6ES7655-5PX31-1XX0) versions antérieures à V2.0.0
Siemens N/A SIMATIC (et SIPLUS) S7-1500 CPU toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SCALANCE LPE9413 (6GK5998-3GS01-2AC2) toutes versions pour la vulnérabilité CVE-2024-54092
Siemens N/A SIMATIC TDC CPU555 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0) toutes versions pour la vulnérabilité CVE-2024-23814
Siemens N/A SIMATIC IPC BX-39A Industrial Edge Device versions antérieures à V3.0
Siemens N/A SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A Gamme SIMATIC ET 200 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-23814.
Siemens N/A SIMATIC IPC127E Industrial Edge Device versions antérieures à V3.0
References
Bulletin de sécurité Siemens SSA-725549 2025-04-08 vendor-advisory
Bulletin de sécurité Siemens SSA-634640 2025-04-08 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CFU PA (6ES7655-5PX11-0XX0) versions ant\u00e9rieures \u00e0 V2.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC847E Industrial Edge Device versions ant\u00e9rieures \u00e0 V3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC227E Industrial Edge Device versions ant\u00e9rieures \u00e0 V3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200M IM 153-4 PN IO HF (6ES7153-4BA00-0XB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC427E Industrial Edge Device versions ant\u00e9rieures \u00e0 V3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC BX-59A Industrial Edge Device versions ant\u00e9rieures \u00e0 V3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC (et SIPLUS) S7-1200 CPU versions ant\u00e9rieures \u00e0 V4.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC (et SIPLUS) S7-300 CPU toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Power Line Booster PLB, Modem Module ST (6ES7972-5AA51-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Power Line Booster PLB, Base Module (6ES7972-5AA10-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC TDC CP51M1 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CFU DIQ (6ES7655-5PX31-1XX0) versions ant\u00e9rieures \u00e0 V2.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC (et SIPLUS) S7-1500 CPU toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE LPE9413 (6GK5998-3GS01-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54092",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC TDC CPU555 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC BX-39A Industrial Edge Device versions ant\u00e9rieures \u00e0 V3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Gamme SIMATIC ET 200 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-23814.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC127E Industrial Edge Device versions ant\u00e9rieures \u00e0 V3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-54092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54092"
    },
    {
      "name": "CVE-2024-23814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23814"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0284",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-725549",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-725549.html"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-634640",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-634640.html"
    }
  ]
}

CERTFR-2025-AVI-0191

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SIMATIC IPC277E toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC WinCC Unified V19 versions antérieures à V19 Update 4
Siemens N/A SIMATIC IPC227E toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC127E toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC BX-21A versions antérieures à V31.01.07
Siemens N/A SIMATIC IPC647E versions antérieures à V25.02.15
Siemens N/A SIMATIC IPC527G toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC RW-543A toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC847E versions antérieures à V25.02.15
Siemens N/A SIMATIC IPC277G toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC627E versions antérieures à V25.02.15
Siemens N/A SIMATIC IPC427E toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC RC-543B toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SCALANCE M-800 and SC-600 Families versions antérieures à V8.2.1
Siemens N/A SIMATIC IPC327G toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC477E toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC PX-39A versions antérieures à V29.01.07
Siemens N/A SIMATIC SISTAR versions supérieures ou égales àV8.0 SP1 versions antérieures à V8.1
Siemens N/A SIMATIC Energy Manager PRO versions supérieures ou égales àV7.5 versions antérieures à V7.5 Update 2
Siemens N/A SIMATIC WinCC V8.0 versions antérieures à V8.0 Update 3
Siemens N/A SCALANCE SC-600 family toutes versions pour la vulnérabilité CVE-2025-23384
Siemens N/A SIMATIC IPC377G toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC PX-39A PRO versions antérieures à V29.01.07
Siemens N/A SIMATIC IPC477E PRO toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC BX-59A versions antérieures à V32.01.04
Siemens N/A SIMATIC ITP1000 toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC DiagMonitor toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-42513.
Siemens N/A SIMATIC IPC PX-32A versions antérieures à V29.01.07
Siemens N/A SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) versions antérieures à V8.2.1
Siemens N/A SIMATIC IPC3000 SMART V3 toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC Energy Manager PRO versions supérieures ou égales àV7.2 Update 6 pour les vulnérabilités CVE-2024-42512 et CVE-2024-42513.
Siemens N/A SIMATIC IPC277G PRO toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC WinCC Unified V18 toutes versions pour la vulnérabilité CVE-2024-42513
Siemens N/A SIMATIC Field PG M6 versions antérieures à V26.01.12
Siemens N/A SIMATIC S7-1500 TM MFP toutes versions pour les vulnérabilités CVE-2024-41046, CVE-2024-41049, CVE-2024-41055, CVE-2024-42154 et CVE-2024-42161.
Siemens N/A SCALANCE LPE9403 versions antérieures à V4.0
Siemens N/A SIMATIC BRAUMAT versions supérieures ou égales àV8.0 SP1 versions antérieures à V8.1
Siemens N/A SIMATIC IPC BX-32A versions antérieures à V29.01.07
Siemens N/A SIMATIC IPC BX-39A versions antérieures à V29.01.07
Siemens N/A SIMATIC IPC677E versions antérieures à V25.02.15
Siemens N/A SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) versions antérieures à V8.2.1
Siemens N/A SIMATIC IPC347G toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC Field PG M5 toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
Siemens N/A SIMATIC IPC227G toutes versions pour les vulnérabilités CVE-2024-56181 et CVE-2024-56182.
References
Bulletin de sécurité Siemens SSA-858251 2025-03-11 vendor-advisory
Bulletin de sécurité Siemens SSA-503939 2025-03-11 vendor-advisory
Bulletin de sécurité Siemens SSA-280834 2025-03-11 vendor-advisory
Bulletin de sécurité Siemens SSA-075201 2025-03-11 vendor-advisory
Bulletin de sécurité Siemens SSA-216014 2025-03-11 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC IPC277E toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V19 versions ant\u00e9rieures \u00e0 V19 Update 4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC227E toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC127E toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC BX-21A versions ant\u00e9rieures \u00e0 V31.01.07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC647E versions ant\u00e9rieures \u00e0 V25.02.15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC527G toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC RW-543A toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC847E versions ant\u00e9rieures \u00e0 V25.02.15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC277G toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC627E versions ant\u00e9rieures \u00e0 V25.02.15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC427E toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC RC-543B toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M-800 and SC-600 Families versions ant\u00e9rieures \u00e0 V8.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC327G toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC477E toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC PX-39A versions ant\u00e9rieures \u00e0 V29.01.07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC SISTAR versions sup\u00e9rieures ou \u00e9gales \u00e0V8.0 SP1  versions ant\u00e9rieures \u00e0 V8.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Energy Manager PRO versions sup\u00e9rieures ou \u00e9gales \u00e0V7.5  versions ant\u00e9rieures \u00e0 V7.5 Update 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V8.0 versions ant\u00e9rieures \u00e0 V8.0 Update 3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC-600 family toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-23384",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC377G toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC PX-39A PRO versions ant\u00e9rieures \u00e0 V29.01.07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC477E PRO toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC BX-59A versions ant\u00e9rieures \u00e0 V32.01.04",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ITP1000 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC DiagMonitor toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-42513.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC PX-32A versions ant\u00e9rieures \u00e0 V29.01.07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) versions ant\u00e9rieures \u00e0 V8.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC3000 SMART V3 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Energy Manager PRO versions sup\u00e9rieures ou \u00e9gales \u00e0V7.2 Update 6 pour les vuln\u00e9rabilit\u00e9s CVE-2024-42512 et CVE-2024-42513.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC277G PRO toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-42513",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Field PG M6 versions ant\u00e9rieures \u00e0 V26.01.12",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 TM MFP toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-41046, CVE-2024-41049, CVE-2024-41055, CVE-2024-42154 et CVE-2024-42161.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE LPE9403 versions ant\u00e9rieures \u00e0 V4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC BRAUMAT versions sup\u00e9rieures ou \u00e9gales \u00e0V8.0 SP1  versions ant\u00e9rieures \u00e0 V8.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC BX-32A versions ant\u00e9rieures \u00e0 V29.01.07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC BX-39A versions ant\u00e9rieures \u00e0 V29.01.07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC677E versions ant\u00e9rieures \u00e0 V25.02.15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC347G toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Field PG M5 toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC227G toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2024-56181 et CVE-2024-56182.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-27393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27393"
    },
    {
      "name": "CVE-2024-56182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56182"
    },
    {
      "name": "CVE-2025-27395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27395"
    },
    {
      "name": "CVE-2024-42154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42154"
    },
    {
      "name": "CVE-2025-27392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27392"
    },
    {
      "name": "CVE-2024-42513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42513"
    },
    {
      "name": "CVE-2025-27398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27398"
    },
    {
      "name": "CVE-2025-27394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27394"
    },
    {
      "name": "CVE-2025-27396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27396"
    },
    {
      "name": "CVE-2025-27397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27397"
    },
    {
      "name": "CVE-2024-41055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41055"
    },
    {
      "name": "CVE-2024-42161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
    },
    {
      "name": "CVE-2025-23384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23384"
    },
    {
      "name": "CVE-2024-41049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41049"
    },
    {
      "name": "CVE-2024-56181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56181"
    },
    {
      "name": "CVE-2024-41046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41046"
    },
    {
      "name": "CVE-2024-42512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42512"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0191",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-858251",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-858251.html"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-503939",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-503939.html"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-280834",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-280834.html"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-075201",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-075201.html"
    },
    {
      "published_at": "2025-03-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-216014",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-216014.html"
    }
  ]
}

CERTFR-2025-AVI-0113

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A SIMATIC versions supérieures ou égales àV3.1.0 et versions antérieures à V3.1.2
Siemens N/A SIMATIC versions antérieures à V4.7
Siemens N/A SIMATIC PCS neo V4.1 versions antérieures à V4.1 Update 2
Siemens N/A SIPROTEC 5 versions antérieures à V9.90
Siemens N/A SIMATIC IPC DiagMonitor toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-23403.
Siemens N/A SIPROTEC 5 toutes versions pour la vulnérabilité CVE-2024-54015
Siemens N/A SIRIUS Safety ES V19 (TIA Portal) versions antérieures à V19 Update 1
Siemens N/A SIMATIC S7-1200 versions antérieures à V4.7
Siemens N/A SIPROTEC 5 toutes versions pour la vulnérabilité CVE-2024-53648
Siemens N/A SIMATIC versions supérieures ou égales àV30.1.0 pour la vulnérabilité CVE-2023-37482
Siemens N/A SIMATIC versions supérieures ou égales àV6.0 et versions antérieures à V7.0
Siemens N/A SIPROTEC 5 versions supérieures ou égales àV8.80 et versions antérieures à V9.90
Siemens N/A SIMATIC PCS neo V5.0 versions antérieures à V5.0 Update 1
Siemens N/A SCALANCE W700 IEEE 802.11ax versions antérieures à V3.0.0
Siemens N/A SIPROTEC 5 versions supérieures ou égales àV8.80 pour la vulnérabilité CVE-2024-54015
Siemens N/A SIMATIC PCS neo V4.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-45386.
Siemens N/A SIMATIC IPC DiagBase toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2025-23403.
Siemens N/A SIRIUS Soft Starter ES V19 (TIA Portal) versions antérieures à V19 Update 1
Siemens N/A SIPROTEC 5 toutes versions pour la vulnérabilité CVE-2024-53651
References
Bulletin de sécurité Siemens SSA-224824 2025-02-10 vendor-advisory
Bulletin de sécurité Siemens SSA-769027 2025-02-10 vendor-advisory
Bulletin de sécurité Siemens SSA-111547 2025-02-10 vendor-advisory
Bulletin de sécurité Siemens SSA-767615 2025-02-10 vendor-advisory
Bulletin de sécurité Siemens SSA-687955 2025-02-10 vendor-advisory
Bulletin de sécurité Siemens SSA-369369 2025-02-10 vendor-advisory
Bulletin de sécurité Siemens SSA-195895 2025-02-10 vendor-advisory
Bulletin de sécurité Siemens SSA-342348 2025-02-10 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC versions sup\u00e9rieures ou \u00e9gales \u00e0V3.1.0 et  versions ant\u00e9rieures \u00e0 V3.1.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC versions ant\u00e9rieures \u00e0 V4.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V4.1 versions ant\u00e9rieures \u00e0 V4.1 Update 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 versions ant\u00e9rieures \u00e0 V9.90",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC DiagMonitor toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-23403.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-54015",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Safety ES V19 (TIA Portal) versions ant\u00e9rieures \u00e0 V19 Update 1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1200 versions ant\u00e9rieures \u00e0 V4.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-53648",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC versions sup\u00e9rieures ou \u00e9gales \u00e0V30.1.0 pour la vuln\u00e9rabilit\u00e9 CVE-2023-37482",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC versions sup\u00e9rieures ou \u00e9gales \u00e0V6.0 et  versions ant\u00e9rieures \u00e0 V7.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 versions sup\u00e9rieures ou \u00e9gales \u00e0V8.80 et  versions ant\u00e9rieures \u00e0 V9.90",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V5.0 versions ant\u00e9rieures \u00e0 V5.0 Update 1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W700 IEEE 802.11ax versions ant\u00e9rieures \u00e0 V3.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 versions sup\u00e9rieures ou \u00e9gales \u00e0V8.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-54015",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V4.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-45386.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC DiagBase toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-23403.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Soft Starter ES V19 (TIA Portal) versions ant\u00e9rieures \u00e0 V19 Update 1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-53651",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-31315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31315"
    },
    {
      "name": "CVE-2023-51385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
    },
    {
      "name": "CVE-2024-53648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53648"
    },
    {
      "name": "CVE-2023-45863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45863"
    },
    {
      "name": "CVE-2023-23454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
    },
    {
      "name": "CVE-2022-4304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
    },
    {
      "name": "CVE-2022-47929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
    },
    {
      "name": "CVE-2023-45853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
    },
    {
      "name": "CVE-2023-23455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
    },
    {
      "name": "CVE-2025-24532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24532"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-39193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39193"
    },
    {
      "name": "CVE-2022-43750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
    },
    {
      "name": "CVE-2024-53651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53651"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2023-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
    },
    {
      "name": "CVE-2023-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
    },
    {
      "name": "CVE-2023-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
    },
    {
      "name": "CVE-2023-1074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
    },
    {
      "name": "CVE-2023-28484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
    },
    {
      "name": "CVE-2023-4921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
    },
    {
      "name": "CVE-2023-2194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2194"
    },
    {
      "name": "CVE-2022-39842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39842"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2023-44320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44320"
    },
    {
      "name": "CVE-2025-23403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23403"
    },
    {
      "name": "CVE-2023-1670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1670"
    },
    {
      "name": "CVE-2024-45386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45386"
    },
    {
      "name": "CVE-2023-0464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
    },
    {
      "name": "CVE-2022-2663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
    },
    {
      "name": "CVE-2024-50572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50572"
    },
    {
      "name": "CVE-2023-29469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-54015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54015"
    },
    {
      "name": "CVE-2023-31085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
    },
    {
      "name": "CVE-2023-37482",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37482"
    },
    {
      "name": "CVE-2023-28578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28578"
    },
    {
      "name": "CVE-2022-40303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
    },
    {
      "name": "CVE-2023-23559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
    },
    {
      "name": "CVE-2022-3524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
    },
    {
      "name": "CVE-2022-39188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
    },
    {
      "name": "CVE-2023-26545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
    },
    {
      "name": "CVE-2024-50560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50560"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2023-43522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43522"
    },
    {
      "name": "CVE-2023-1380",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
    },
    {
      "name": "CVE-2024-50561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50561"
    },
    {
      "name": "CVE-2023-6237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
    },
    {
      "name": "CVE-2023-1118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2023-44322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44322"
    },
    {
      "name": "CVE-2024-33016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33016"
    },
    {
      "name": "CVE-2024-26306",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26306"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2023-39192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39192"
    },
    {
      "name": "CVE-2023-0045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
    },
    {
      "name": "CVE-2022-2588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2025-24499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24499"
    },
    {
      "name": "CVE-2023-1073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
    },
    {
      "name": "CVE-2023-35001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2025-24811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24811"
    },
    {
      "name": "CVE-2024-23814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23814"
    },
    {
      "name": "CVE-2022-40304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
    },
    {
      "name": "CVE-2022-47069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47069"
    },
    {
      "name": "CVE-2023-1206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
    },
    {
      "name": "CVE-2023-4623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
    },
    {
      "name": "CVE-2023-51384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
    },
    {
      "name": "CVE-2023-0590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
    },
    {
      "name": "CVE-2025-24812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24812"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2023-5717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-7250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7250"
    },
    {
      "name": "CVE-2023-42754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42754"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0113",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-224824",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-224824.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-769027",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-769027.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-111547",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-111547.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-767615",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-767615.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-687955",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-687955.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-369369",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-369369.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-195895",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-195895.html"
    },
    {
      "published_at": "2025-02-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-342348",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-342348.html"
    }
  ]
}

CERTFR-2025-AVI-0029

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SCALANCE W-700 IEEE 802.11ax versions antérieures à V3.0.0. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2023-44318.
Siemens N/A SIPROTEC 5 - CP050, CP150 et CP300 versions antérieures à 9.80
Siemens N/A SIMATIC S7-1200 versions antérieures à V4.7
Siemens N/A SIPROTEC 5 - CP100, 7ST85 et 6MD89 toutes versions pour la vulnérabilité CVE-2024-53649
References
Bulletin de sécurité Siemens SSA-194557 2025-01-14 vendor-advisory
Bulletin de sécurité Siemens SSA-690517 2025-01-14 vendor-advisory
Bulletin de sécurité Siemens SSA-717113 2025-01-14 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SCALANCE W-700 IEEE 802.11ax versions ant\u00e9rieures \u00e0 V3.0.0. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2023-44318.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 - CP050, CP150 et CP300 versions ant\u00e9rieures \u00e0 9.80",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1200 versions ant\u00e9rieures \u00e0 V4.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 5 - CP100, 7ST85 et 6MD89 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-53649",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-44317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44317"
    },
    {
      "name": "CVE-2024-47100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47100"
    },
    {
      "name": "CVE-2023-44319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44319"
    },
    {
      "name": "CVE-2023-44374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44374"
    },
    {
      "name": "CVE-2024-53649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53649"
    },
    {
      "name": "CVE-2023-44318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44318"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0029",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-01-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-194557",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-194557.html"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-690517",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-717113",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-717113.html"
    }
  ]
}

CERTFR-2024-AVI-1087

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été découverte dans les produits Siemens. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SIMATIC PCS neo V4.1 toutes versions
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V17, V18 et V19 toutes versions
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité.
Siemens N/A SIMATIC PCS neo V4.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité.
Siemens N/A SIMATIC PCS neo V5.0 versions antérieures à V5.0 Update 1
References
Bulletin de sécurité Siemens SSA-928984 2024-12-16 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC PCS neo V4.1 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V17, V18 et V19 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V4.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V5.0 versions ant\u00e9rieures \u00e0 V5.0 Update 1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-49775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49775"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-1087",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Siemens. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2024-12-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-928984",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-928984.html"
    }
  ]
}

CERTFR-2024-AVI-1062

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SIMATIC STEP 7 V18 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC S7-PLCSIM V18 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIRIUS Safety ES V17 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIRIUS Soft Starter ES V18 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A TIA Portal Cloud V18 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC WinCC Unified V17 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC STEP 7 Safety V19 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIRIUS Safety ES V18 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A TIA Portal Cloud V19 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A TIA Portal Cloud V18 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIMATIC STEP 7 V17 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC STEP 7 V17 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIMATIC STEP 7 V19 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIRIUS Soft Starter ES V18 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC WinCC Unified V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-49849.
Siemens N/A SIMATIC WinCC V18 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIRIUS Soft Starter ES V17 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC S7-PLCSIM V17 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC STEP 7 Safety V17 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIRIUS Soft Starter ES V19 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A TIA Portal Cloud V17 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC STEP 7 Safety V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-49849.
Siemens N/A TIA Portal Cloud V19 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC WinCC V19 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIMATIC WinCC Unified V18 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIRIUS Safety ES V19 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIRIUS Safety ES V19 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIMATIC WinCC Unified PC Runtime V18 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-49849.
Siemens N/A SIMATIC STEP 7 V19 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC WinCC Unified V19 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC WinCC Unified PC Runtime V19 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC WinCC V17 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIMATIC WinCC V17 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC WinCC Unified V17 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIMATIC WinCC V19 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC STEP 7 V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-49849.
Siemens N/A SIRIUS Soft Starter ES V17 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIMATIC WinCC V18 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC S7-PLCSIM V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-49849.
Siemens N/A SIMATIC STEP 7 Safety V19 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIRIUS Soft Starter ES V19 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIRIUS Safety ES V18 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIMATIC WinCC Unified V19 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIRIUS Safety ES V17 (TIA Portal) toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A CPCI85 Central Processing/Communication versions antérieures à V05.30
Siemens N/A SIMATIC STEP 7 V18 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIMATIC STEP 7 Safety V18 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC STEP 7 Safety V17 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIMATIC WinCC V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-49849.
Siemens N/A TIA Portal Cloud V17 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A SIMATIC WinCC Unified V18 toutes versions pour la vulnérabilité CVE-2024-52051
Siemens N/A SIMATIC STEP 7 Safety V18 toutes versions pour la vulnérabilité CVE-2024-49849
Siemens N/A TIA Portal Cloud V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-49849.
References
Bulletin de sécurité Siemens SSA-800126 2024-12-10 vendor-advisory
Bulletin de sécurité Siemens SSA-392859 2024-12-10 vendor-advisory
Bulletin de sécurité Siemens SSA-128393 2024-12-10 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC STEP 7 V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Safety ES V17 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Soft Starter ES V18 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Safety ES V18 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Soft Starter ES V18 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Soft Starter ES V17 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Soft Starter ES V19 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Safety ES V19 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Safety ES V19 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified PC Runtime V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified PC Runtime V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Soft Starter ES V17 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Soft Starter ES V19 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Safety ES V18 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIRIUS Safety ES V17 (TIA Portal) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "CPCI85 Central Processing/Communication versions ant\u00e9rieures \u00e0 V05.30",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V17 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-52051",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-49849.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-52051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52051"
    },
    {
      "name": "CVE-2024-53832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53832"
    },
    {
      "name": "CVE-2024-49849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49849"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-1062",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, un contournement de la politique de s\u00e9curit\u00e9 et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-800126",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-800126.html"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-392859",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-392859.html"
    },
    {
      "published_at": "2024-12-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-128393",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-128393.html"
    }
  ]
}

CERTFR-2024-AVI-0968

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SIMATIC WinCC V16 toutes versions pour la vulnérabilité CVE-2023-32736
Siemens N/A SIMATIC WinCC Unified V16 toutes versions pour la vulnérabilité CVE-2023-32736
Siemens N/A SIMATIC STEP 7 V17 versions antérieures à V17 Update 8
Siemens N/A TIA Portal Cloud V16 toutes versions pour la vulnérabilité CVE-2023-32736
Siemens N/A SIMATIC STEP 7 Safety V17 versions antérieures à V17 Update 8
Siemens N/A SIMATIC WinCC Unified V17 versions antérieures à V17 Update 8
Siemens N/A SIMATIC STEP 7 V16 toutes versions pour la vulnérabilité CVE-2023-32736
Siemens N/A SIMATIC WinCC V18 versions antérieures à V18 Update 5
Siemens N/A SIMATIC S7-PLCSIM V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2023-32736.
Siemens N/A SIMATIC STEP 7 Safety V16 toutes versions pour la vulnérabilité CVE-2023-32736
Siemens N/A TIA Portal Cloud V18 versions antérieures à V4.6.1.0
Siemens N/A SIMATIC S7-PLCSIM V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2023-32736.
Siemens N/A SIMATIC STEP 7 Safety V18 versions antérieures à V18 Update 5
Siemens N/A TIA Portal Cloud V17 versions antérieures à V4.6.0.1
Siemens N/A SCALANCE M-800 versions antérieures à V8.2
Siemens N/A SCALANCE S615 versions antérieures à V8.2
Siemens N/A SIMATIC WinCC Unified V18 versions antérieures à V18 Update 5
Siemens N/A SIMATIC CP 1543-1 V4.0 (6GK7543-1AX10-0XE0) versions supérieures ou égales àV4.0.44 et versions antérieures à V4.0.50
Siemens N/A SIMATIC STEP 7 V18 versions antérieures à V18 Update 5
Siemens N/A SIMATIC WinCC V17 versions antérieures à V17 Update 8
References
Bulletin de sécurité Siemens SSA-354112 2024-11-12 vendor-advisory
Bulletin de sécurité Siemens SSA-654798 2024-11-12 vendor-advisory
Bulletin de sécurité Siemens SSA-871035 2024-11-12 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC WinCC V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V18 versions ant\u00e9rieures \u00e0 V4.6.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2023-32736.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V17 versions ant\u00e9rieures \u00e0 V4.6.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M-800 versions ant\u00e9rieures \u00e0 V8.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 versions ant\u00e9rieures \u00e0 V8.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1543-1 V4.0 (6GK7543-1AX10-0XE0) versions sup\u00e9rieures ou \u00e9gales \u00e0V4.0.44 et  versions ant\u00e9rieures \u00e0 V4.0.50",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V18 versions ant\u00e9rieures \u00e0 V18 Update 5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-5594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5594"
    },
    {
      "name": "CVE-2023-32736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32736"
    },
    {
      "name": "CVE-2023-49441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49441"
    },
    {
      "name": "CVE-2024-50572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50572"
    },
    {
      "name": "CVE-2021-3506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
    },
    {
      "name": "CVE-2024-50560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50560"
    },
    {
      "name": "CVE-2024-28882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28882"
    },
    {
      "name": "CVE-2024-50561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50561"
    },
    {
      "name": "CVE-2024-26306",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26306"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2024-50557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50557"
    },
    {
      "name": "CVE-2024-50310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50310"
    },
    {
      "name": "CVE-2024-50558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50558"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2024-26925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26925"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2024-50559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50559"
    },
    {
      "name": "CVE-2023-28450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28450"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0968",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-354112",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-354112.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-654798",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-654798.html"
    },
    {
      "published_at": "2024-11-12",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-871035",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-871035.html"
    }
  ]
}

CERTFR-2024-AVI-0846

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SIMATIC S7-1500 toutes versions pour la vulnérabilité CVE-2024-46887
Siemens N/A SIMATIC S7-1500 and S7-1200 versions antérieures à V3.1.4
Siemens N/A SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) toutes versions pour la vulnérabilité CVE-2024-46886
Siemens N/A SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) toutes versions pour la vulnérabilité CVE-2024-46887
Siemens N/A SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions antérieures à V3.1.4
Siemens N/A SIMATIC S7-1500 and S7-1200 toutes versions pour la vulnérabilité CVE-2024-46886
Siemens N/A SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions antérieures à V3.1.4
Siemens N/A SIMATIC S7-1500 versions antérieures à V3.1.4
References
Bulletin de sécurité Siemens SSA-054046 2024-10-08 vendor-advisory
Bulletin de sécurité Siemens SSA-876787 2024-10-08 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC S7-1500 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-46887",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 and S7-1200 versions ant\u00e9rieures \u00e0 V3.1.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-46886",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-46887",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions ant\u00e9rieures \u00e0 V3.1.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 and S7-1200 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-46886",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions ant\u00e9rieures \u00e0 V3.1.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 versions ant\u00e9rieures \u00e0 V3.1.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-46886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46886"
    },
    {
      "name": "CVE-2024-46887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46887"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0846",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-10-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Elles permettent \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2024-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-054046",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-054046.html"
    },
    {
      "published_at": "2024-10-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-876787",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-876787.html"
    }
  ]
}

CERTFR-2024-AVI-0757

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SIMATIC BATCH V9.1 toutes versions pour la vulnérabilité CVE-2024-35783
Siemens N/A SIMATIC HMI Comfort Panels (incl. SIPLUS variants) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2023-28827, CVE-2023-30755 et CVE-2023-30756.
Siemens N/A SIMATIC IPC DiagBase toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2023-28827, CVE-2023-30755 et CVE-2023-30756.
Siemens N/A SIMATIC IPC DiagMonitor toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2023-28827, CVE-2023-30755 et CVE-2023-30756.
Siemens N/A SIMATIC Information Server 2020 toutes versions pour la vulnérabilité CVE-2024-35783
Siemens N/A SIMATIC Information Server 2022 toutes versions pour la vulnérabilité CVE-2024-33698
Siemens N/A SIMATIC Information Server 2022 toutes versions pour la vulnérabilité CVE-2024-35783
Siemens N/A SIMATIC Information Server 2024 toutes versions pour la vulnérabilité CVE-2024-33698
Siemens N/A SIMATIC PCS 7 V9.1 toutes versions
Siemens N/A SIMATIC PCS neo V4.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-33698.
Siemens N/A SIMATIC PCS neo V5.0 toutes versions pour la vulnérabilité CVE-2024-33698
Siemens N/A SIMATIC PCS neo V5.0 toutes versions pour la vulnérabilité CVE-2024-38355
Siemens N/A SIMATIC Process Historian 2020 toutes versions pour la vulnérabilité CVE-2024-35783
Siemens N/A SIMATIC Process Historian 2022 toutes versions pour la vulnérabilité CVE-2024-35783
Siemens N/A SCALANCE W700 802.11 AX versions antérieures à V2.4.0
Siemens N/A SICAM SCC versions antérieures à V10.0
Siemens N/A SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) versions antérieures à V3.5.20
Siemens N/A SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) versions antérieures à V3.5.20
Siemens N/A SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) versions antérieures à V3.5.20
Siemens N/A SIMATIC CP 1243-1 (incl. SIPLUS variants) versions antérieures à V3.5.20
Siemens N/A SIMATIC CP 1243-7 LTE versions antérieures à V3.5.20
Siemens N/A SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) versions antérieures à V3.5.20
Siemens N/A SIMATIC PCS neo V4.1 versions antérieures à V4.1 Update 2
Siemens N/A SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0) versions antérieures à V4.2
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V18 toutes versions
Siemens N/A SIMATIC S7-200 SMART toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-43647.
Siemens N/A SIMATIC WinCC Runtime Advanced toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour les vulnérabilités CVE-2023-28827, CVE-2023-30755 et CVE-2023-30756.
Siemens N/A SIMATIC WinCC Runtime Professional V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-38355.
Siemens N/A SIMATIC WinCC Runtime Professional V18 toutes versions pour la vulnérabilité CVE-2024-35783
Siemens N/A SIMATIC WinCC Runtime Professional V18 toutes versions pour la vulnérabilité CVE-2024-38355
Siemens N/A SIMATIC WinCC Runtime Professional V19 toutes versions pour la vulnérabilité CVE-2024-35783
Siemens N/A SIMATIC WinCC Runtime Professional V19 toutes versions pour la vulnérabilité CVE-2024-38355
Siemens N/A SIMATIC WinCC Runtime Professional V20 toutes versions pour la vulnérabilité CVE-2024-38355
Siemens N/A SIMATIC WinCC V7.4 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-35783.
Siemens N/A SIMATIC WinCC V7.4 toutes versionswith installed WebRH. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2024-38355.
Siemens N/A SIMATIC WinCC V7.5 toutes versions pour la vulnérabilité CVE-2024-38355
Siemens N/A SIMATIC WinCC V8.0 toutes versions pour la vulnérabilité CVE-2024-38355
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V16 toutes versions pour la vulnérabilité CVE-2024-33698
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V19 toutes versions
Siemens N/A SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0) versions antérieures à V4.2
Siemens N/A SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0) versions antérieures à V4.2
Siemens N/A SIMATIC RF1140R (6GT2831-6CB00) versions antérieures à V1.1
Siemens N/A SIMATIC RF1170R (6GT2831-6BB00) versions antérieures à V1.1
Siemens N/A SIMATIC RF166C (6GT2002-0EE20) versions antérieures à V2.2
Siemens N/A SIMATIC RF185C (6GT2002-0JE10) versions antérieures à V2.2
Siemens N/A SIMATIC RF186C (6GT2002-0JE20) versions antérieures à V2.2
Siemens N/A SIMATIC RF186CI (6GT2002-0JE50) versions antérieures à V2.2
Siemens N/A SIMATIC RF188C (6GT2002-0JE40) versions antérieures à V2.2
Siemens N/A SIMATIC RF188CI (6GT2002-0JE60) versions antérieures à V2.2
Siemens N/A SIMATIC RF360R (6GT2801-5BA30) versions antérieures à V2.2
Siemens N/A SIMATIC WinCC V7.5 versions antérieures à V7.5 SP2 Update 18
Siemens N/A SIMATIC WinCC V8.0 versions antérieures à V8.0 Update 5
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V17 versions antérieures à V17 Update 8
References
Bulletin de sécurité Siemens SSA-721642 2024-09-10 vendor-advisory
Bulletin de sécurité Siemens SSA-969738 2024-09-10 vendor-advisory
Bulletin de sécurité Siemens SSA-673996 2024-09-10 vendor-advisory
Bulletin de sécurité Siemens SSA-773256 2024-09-10 vendor-advisory
Bulletin de sécurité Siemens SSA-423808 2024-09-10 vendor-advisory
Bulletin de sécurité Siemens SSA-039007 2024-09-10 vendor-advisory
Bulletin de sécurité Siemens SSA-629254 2024-09-10 vendor-advisory
Bulletin de sécurité Siemens SSA-765405 2024-09-10 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC BATCH V9.1 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-35783",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC HMI Comfort Panels (incl. SIPLUS variants) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2023-28827, CVE-2023-30755 et CVE-2023-30756.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC DiagBase toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2023-28827, CVE-2023-30755 et CVE-2023-30756.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC DiagMonitor toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2023-28827, CVE-2023-30755 et CVE-2023-30756.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Information Server 2020 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-35783",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Information Server 2022 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-33698",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Information Server 2022 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-35783",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Information Server 2024 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-33698",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS 7 V9.1 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V4.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-33698.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V5.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-33698",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V5.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-38355",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Process Historian 2020 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-35783",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Process Historian 2022 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-35783",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W700 802.11 AX versions ant\u00e9rieures \u00e0 V2.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM SCC versions ant\u00e9rieures \u00e0 V10.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V3.5.20",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V3.5.20",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V3.5.20",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-1 (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V3.5.20",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-7 LTE versions ant\u00e9rieures \u00e0 V3.5.20",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) versions ant\u00e9rieures \u00e0 V3.5.20",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V4.1 versions ant\u00e9rieures \u00e0 V4.1 Update 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V18 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-200 SMART toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-43647.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Advanced toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2023-28827, CVE-2023-30755 et CVE-2023-30756.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Professional V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-38355.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Professional V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-35783",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Professional V18 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-38355",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Professional V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-35783",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Professional V19 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-38355",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Professional V20 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-38355",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V7.4 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-35783.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V7.4 toutes versionswith installed WebRH. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-38355.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V7.5 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-38355",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V8.0 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-38355",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V16 toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-33698",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V19 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0) versions ant\u00e9rieures \u00e0 V4.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF1140R (6GT2831-6CB00) versions ant\u00e9rieures \u00e0 V1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF1170R (6GT2831-6BB00) versions ant\u00e9rieures \u00e0 V1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF166C (6GT2002-0EE20) versions ant\u00e9rieures \u00e0 V2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF185C (6GT2002-0JE10) versions ant\u00e9rieures \u00e0 V2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF186C (6GT2002-0JE20) versions ant\u00e9rieures \u00e0 V2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF186CI (6GT2002-0JE50) versions ant\u00e9rieures \u00e0 V2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF188C (6GT2002-0JE40) versions ant\u00e9rieures \u00e0 V2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF188CI (6GT2002-0JE60) versions ant\u00e9rieures \u00e0 V2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF360R (6GT2801-5BA30) versions ant\u00e9rieures \u00e0 V2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V7.5 versions ant\u00e9rieures \u00e0 V7.5 SP2 Update 18",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V8.0 versions ant\u00e9rieures \u00e0 V8.0 Update 5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V17 versions ant\u00e9rieures \u00e0 V17 Update 8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-43647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-43647"
    },
    {
      "name": "CVE-2024-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37995"
    },
    {
      "name": "CVE-2024-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37990"
    },
    {
      "name": "CVE-2024-37993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37993"
    },
    {
      "name": "CVE-2024-37991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37991"
    },
    {
      "name": "CVE-2023-30756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30756"
    },
    {
      "name": "CVE-2024-33698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33698"
    },
    {
      "name": "CVE-2024-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37992"
    },
    {
      "name": "CVE-2024-34057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34057"
    },
    {
      "name": "CVE-2023-30755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30755"
    },
    {
      "name": "CVE-2023-28827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28827"
    },
    {
      "name": "CVE-2023-44373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44373"
    },
    {
      "name": "CVE-2024-35783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35783"
    },
    {
      "name": "CVE-2024-38355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38355"
    },
    {
      "name": "CVE-2024-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37994"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0757",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-721642",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-721642.html"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-969738",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-969738.html"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-673996",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-673996.html"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-773256",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-773256.html"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-423808",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-423808.html"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-039007",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-039007.html"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-629254",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-629254.html"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-765405",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-765405.html"
    }
  ]
}

CERTFR-2024-AVI-0672

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SCALANCE M-800 versions antérieures à V8.1
Siemens N/A Teamcenter Visualization versions V14.2 antérieures à V14.2.0.12
Siemens N/A JT2Go versions antérieures à V2312.0005
Siemens N/A Teamcenter Visualization versions V2312 antérieures à V2312.0005
Siemens N/A INTRALOG WMS versions antérieures à V4
Siemens N/A LOGO! V8.3 BM (aucun correctif n'est prévu)
Siemens N/A SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) versions antérieures à V8.1
Siemens N/A SIPLUS LOGO! V8.3 BM (aucun correctif n'est prévu)
Siemens N/A SINEC NMS versions antérieures à V3.0
Siemens N/A Teamcenter Visualization versions V14.3 antérieures à V14.3.0.10
Siemens N/A COMOS versions antérieures à V10.5
Siemens N/A Location Intelligence family versions antérieures à V4.4
Siemens N/A SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) versions antérieures à V8.1
Siemens N/A SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) versions antérieures à V7.2.2
Siemens N/A NX versions antérieures à V2406.3000
Siemens N/A SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) versions antérieures à V7.2.2
Siemens N/A SCALANCE M-800 versions antérieures à V7.2.2
Siemens N/A SINEC Traffic Analyzer versions antérieures à V2.0
References
Bulletin de sécurité Siemens SSA-856475 2024-08-13 vendor-advisory
Bulletin de sécurité Siemens SSA-357412 2024-08-13 vendor-advisory
Bulletin de sécurité Siemens SSA-720392 2024-08-13 vendor-advisory
Bulletin de sécurité Siemens SSA-921449 2024-08-13 vendor-advisory
Bulletin de sécurité Siemens SSA-068047 2024-08-13 vendor-advisory
Bulletin de sécurité Siemens SSA-784301 2024-08-13 vendor-advisory
Bulletin de sécurité Siemens SSA-716317 2024-08-13 vendor-advisory
Bulletin de sécurité Siemens SSA-659443 2024-08-13 vendor-advisory
Bulletin de sécurité Siemens SSA-087301 2024-08-13 vendor-advisory
Bulletin de sécurité Siemens SSA-417547 2024-08-13 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SCALANCE M-800 versions ant\u00e9rieures \u00e0 V8.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization versions V14.2 ant\u00e9rieures \u00e0 V14.2.0.12",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "JT2Go versions ant\u00e9rieures \u00e0 V2312.0005",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization versions V2312 ant\u00e9rieures \u00e0 V2312.0005",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "INTRALOG WMS versions ant\u00e9rieures \u00e0 V4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "LOGO! V8.3 BM (aucun correctif n\u0027est pr\u00e9vu)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) versions ant\u00e9rieures \u00e0 V8.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS LOGO! V8.3 BM (aucun correctif n\u0027est pr\u00e9vu)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEC NMS versions ant\u00e9rieures \u00e0 V3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization versions V14.3 ant\u00e9rieures \u00e0 V14.3.0.10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": " COMOS versions ant\u00e9rieures \u00e0 V10.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Location Intelligence family versions ant\u00e9rieures \u00e0 V4.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "NX versions ant\u00e9rieures \u00e0 V2406.3000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M-800 versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEC Traffic Analyzer versions ant\u00e9rieures \u00e0 V2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-41976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41976"
    },
    {
      "name": "CVE-2024-32635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32635"
    },
    {
      "name": "CVE-2024-41682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41682"
    },
    {
      "name": "CVE-2024-41906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41906"
    },
    {
      "name": "CVE-2023-44321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44321"
    },
    {
      "name": "CVE-2023-52425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
    },
    {
      "name": "CVE-2024-32636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32636"
    },
    {
      "name": "CVE-2023-44317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44317"
    },
    {
      "name": "CVE-2024-28757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
    },
    {
      "name": "CVE-2024-41908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41908"
    },
    {
      "name": "CVE-2023-52426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
    },
    {
      "name": "CVE-2024-41683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41683"
    },
    {
      "name": "CVE-2023-5868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
    },
    {
      "name": "CVE-2024-41938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41938"
    },
    {
      "name": "CVE-2024-41978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41978"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2023-45802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45802"
    },
    {
      "name": "CVE-2024-0056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0056"
    },
    {
      "name": "CVE-2023-5180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5180"
    },
    {
      "name": "CVE-2023-26495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26495"
    },
    {
      "name": "CVE-2024-41681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41681"
    },
    {
      "name": "CVE-2023-5870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
    },
    {
      "name": "CVE-2024-30045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30045"
    },
    {
      "name": "CVE-2023-44320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44320"
    },
    {
      "name": "CVE-2023-42795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
    },
    {
      "name": "CVE-2024-41905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41905"
    },
    {
      "name": "CVE-2023-5869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
    },
    {
      "name": "CVE-2024-36398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36398"
    },
    {
      "name": "CVE-2023-4611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4611"
    },
    {
      "name": "CVE-2023-43622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43622"
    },
    {
      "name": "CVE-2023-45648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
    },
    {
      "name": "CVE-2024-41907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41907"
    },
    {
      "name": "CVE-2024-39922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39922"
    },
    {
      "name": "CVE-2024-41977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41977"
    },
    {
      "name": "CVE-2023-31122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31122"
    },
    {
      "name": "CVE-2024-41904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41904"
    },
    {
      "name": "CVE-2023-46120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46120"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2023-6481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
    },
    {
      "name": "CVE-2023-6378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
    },
    {
      "name": "CVE-2024-41940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41940"
    },
    {
      "name": "CVE-2023-42794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42794"
    },
    {
      "name": "CVE-2024-32637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32637"
    },
    {
      "name": "CVE-2023-46280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46280"
    },
    {
      "name": "CVE-2024-0985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
    },
    {
      "name": "CVE-2023-49692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49692"
    },
    {
      "name": "CVE-2023-34050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34050"
    },
    {
      "name": "CVE-2023-46589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
    },
    {
      "name": "CVE-2023-39615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2024-41939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41939"
    },
    {
      "name": "CVE-2024-41941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41941"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0672",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-08-13T00:00:00.000000"
    },
    {
      "description": "Ajout des identifiants CVE manquants.",
      "revision_date": "2024-08-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-856475",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-856475.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-357412",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-357412.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-720392",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-720392.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-921449",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-921449.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-068047",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-784301",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-784301.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-716317",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-716317.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-659443",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-659443.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-087301",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-087301.html"
    },
    {
      "published_at": "2024-08-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-417547",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-417547.html"
    }
  ]
}

CERTFR-2024-AVI-0617

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SICORE Base system versions antérieures à V1.4.0
Siemens N/A CPCI85 Central Processing/Communication versions antérieures à V5.40
References
Bulletin de sécurité Siemens ssa-071402 2024-07-22 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SICORE Base system versions ant\u00e9rieures \u00e0 V1.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "CPCI85 Central Processing/Communication versions ant\u00e9rieures \u00e0 V5.40",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37998"
    },
    {
      "name": "CVE-2024-39601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39601"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0617",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Elles permettent \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2024-07-22",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-071402",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-071402.html"
    }
  ]
}

CERTFR-2024-AVI-0552

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M876-3 (6GK5876-3AA02-2BA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M876-4 (6GK5876-4AA10-2BA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE SC622-2C (6GK5622-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE SC626-2C (6GK5626-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE SC632-2C (6GK5632-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE SC636-2C (6GK5636-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE SC642-2C (6GK5642-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE SC646-2C (6GK5646-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X304-2FE (6GK5304-2BD00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-3 (6GK5307-3BL00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-3 (6GK5307-3BL10-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-3LD (6GK5307-3BM00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X307-3LD (6GK5307-3BM10-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2 (6GK5308-2FL00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2 (6GK5308-2FL10-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2LD (6GK5308-2FM00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2LD (6GK5308-2FM10-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2LH (6GK5308-2FN00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2LH (6GK5308-2FN10-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2M (6GK5308-2GG00-2AA2) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2M (6GK5308-2GG10-2AA2) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2M TS (6GK5308-2GG00-2CA2) versions antérieures à V4.1.8
Siemens N/A SCALANCE X308-2M TS (6GK5308-2GG10-2CA2) versions antérieures à V4.1.8
Siemens N/A SCALANCE X310 (6GK5310-0FA00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X310 (6GK5310-0FA10-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X310FE (6GK5310-0BA00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X310FE (6GK5310-0BA10-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X320-1 FE (6GK5320-1BD00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3) versions antérieures à V4.1.8
Siemens N/A SCALANCE X408-2 (6GK5408-2FD00-2AA2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC208 (6GK5208-0BA00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC208EEC (6GK5208-0BA00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC208G (6GK5208-0GA00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC208G EEC (6GK5208-0GA00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC208G PoE (6GK5208-0RA00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC216 (6GK5216-0BA00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC216-4C (6GK5216-4BS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC216-4C G (6GK5216-4GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC216EEC (6GK5216-0BA00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC224 (6GK5224-0BA00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC224-4C G (6GK5224-4GS00-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XCH328 (6GK5328-4TS01-2EC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XCM324 (6GK5324-8TS01-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XCM328 (6GK5328-4TS01-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XCM332 (6GK5332-0GA01-2AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XF204 (6GK5204-0BA00-2GF2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XF204 DNA (6GK5204-0BA00-2YF2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XF204-2BA (6GK5204-2AA00-2GF2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XM408-4C (6GK5408-4GP00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XM408-8C (6GK5408-8GS00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XM416-4C (6GK5416-4GS00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XP208 (6GK5208-0HA00-2AS6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XP208EEC (6GK5208-0HA00-2ES6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XP216 (6GK5216-0HA00-2AS6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XP216EEC (6GK5216-0HA00-2ES6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2) versions antérieures à V4.1.8
Siemens N/A SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR528-6M (6GK5528-0AA00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XR552-12M (6GK5552-0AA00-2AR2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SIMATIC WinCC toutes versions pour la vulnérabilité CVE-2024-30321
Siemens N/A SIMATIC WinCC toutes versions versions antérieures à V19 Update 2
Siemens N/A SIMATIC WinCC toutes versions versions antérieures à V7.4 SP1 Update 23
Siemens N/A SIMATIC WinCC toutes versions versions antérieures à V7.5 SP2 Update 17
Siemens N/A SIMATIC WinCC toutes versions versions antérieures à V8.0 Update 5
Siemens N/A SIMATIC Compact Field Unit toutes versions pour la vulnérabilité CVE-2017-12741
Siemens N/A SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0) versions antérieures à V1.0.2
Siemens N/A SIMATIC ET 200M (incl. SIPLUS variants) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET 200MP IM 155-5 PN BA (6ES7155-5AA00-0AA0) versions antérieures à V4.0.2
Siemens N/A SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0) versions antérieures à V4.2.0
Siemens N/A SIMATIC ET 200MP IM 155-5 PN ST (6ES7155-5AA00-0AB0) versions antérieures à V4.1.0
Siemens N/A SIMATIC ET 200SP IM 155-6 PN BA (6ES7155-6AR00-0AN0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants) versions antérieures à V1.1.0
Siemens N/A SIMATIC ET 200SP IM 155-6 PN HF (6ES7155-6AU00-0CN0) versions antérieures à V4.2.0
Siemens N/A SIMATIC ET 200SP IM 155-6 PN HS (6ES7155-6AU00-0DN0) versions antérieures à V4.0.1
Siemens N/A SIMATIC ET 200SP IM 155-6 PN ST (6ES7155-6AU00-0BN0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET 200SP IM 155-6 PN ST (6ES7155-6AU01-0BN0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET 200SP IM 155-6 PN ST BA (6ES7155-6AA00-0BN0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET 200SP IM 155-6 PN ST BA (6ES7155-6AA01-0BN0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET 200pro IM 154-3 PN HF (6ES7154-3AB00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET 200pro IM 154-4 PN HF (6ES7154-4AB10-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200S (incl. SIPLUS variants) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12 (6ES7141-6BH00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12 (6ES7142-6BH00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 4AO U/I 4xM12 (6ES7145-6HD00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12 (6ES7147-6BG00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12 (6ES7142-6BR00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12 (6ES7144-6KD50-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12 (6ES7144-6KD00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12 (6ES7141-6BF00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12 (6ES7141-6BG00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12 (6ES7142-6BF50-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12 (6ES7142-6BF00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12 (6ES7142-6BG00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC ET200ecoPN: IO-Link Master (6ES7148-6JA00-0AB0) toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2017-12741.
Siemens N/A SIMATIC Energy Manager Basic versions antérieures à V7.5
Siemens N/A SIMATIC Energy Manager PRO versions antérieures à V7.5
Siemens N/A SIMATIC IPC DiagBase toutes versions pour la vulnérabilité CVE-2023-52891
Siemens N/A SIMATIC IPC DiagMonitor toutes versions pour la vulnérabilité CVE-2023-52891
Siemens N/A SIMATIC PCS 7 V9.1 toutes versions
Siemens N/A SIMATIC PCS neo V4.0 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2022-45147.
Siemens N/A SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) versions antérieures à V4.2.0
Siemens N/A SIMATIC S7-1200 CPU family (incl. SIPLUS variants) versions antérieures à V4.2.3
Siemens N/A SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) versions antérieures à V2.0
Siemens N/A SIMATIC S7-1500 Software Controller versions antérieures à V2.0
Siemens N/A SIMATIC S7-200 SMART versions antérieures à V2.03.01
Siemens N/A SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) toutes versions versions antérieures à V3.X.16
Siemens N/A SIMATIC S7-400 H V6 and below CPU family (incl. SIPLUS variants) versions antérieures à V6.0.8
Siemens N/A SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) versions antérieures à V6.0.6
Siemens N/A SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) versions antérieures à V7.0.2
Siemens N/A SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) versions antérieures à V8.2.1
Siemens N/A SIMATIC STEP 7 Safety V16 toutes versions versions antérieures à V16 Update 7
Siemens N/A SIMATIC STEP 7 Safety V17 toutes versions versions antérieures à V17 Update 7
Siemens N/A SIMATIC STEP 7 Safety V18 toutes versions versions antérieures à V18 Update 2
Siemens N/A SIMATIC STEP 7 V16 toutes versions versions antérieures à V16 Update 7
Siemens N/A SIMATIC STEP 7 V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2022-45147.
Siemens N/A SIMATIC STEP 7 V17 toutes versions versions antérieures à V17 Update 7
Siemens N/A SIMATIC STEP 7 V17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2022-45147.
Siemens N/A SIMATIC STEP 7 V18 toutes versions versions antérieures à V18 Update 2
Siemens N/A SIMATIC TDC CP51M1 versions antérieures à V1.1.8
Siemens N/A SIMATIC TDC CPU555 versions antérieures à V1.1.1
Siemens N/A SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0) toutes versions versions antérieures à V2010 SP3
Siemens N/A SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0) toutes versions versions antérieures à V2010 SP3
Siemens N/A SIMATIC WinCC Unified V16 toutes versions versions antérieures à V16 Update 7
Siemens N/A SIMATIC WinCC Unified V17 toutes versions versions antérieures à V17 Update 7
Siemens N/A SIMATIC WinCC Unified V18 toutes versions versions antérieures à V18 Update 2
Siemens N/A SIMATIC WinCC V16 versions antérieures à V16.7
Siemens N/A SIMATIC WinCC V17 versions antérieures à V17.7
Siemens N/A SIMATIC WinCC V18 toutes versions versions antérieures à V18 Update 2
Siemens N/A SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3) versions antérieures à V4.1.8
Siemens N/A SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2) toutes versions pour la vulnérabilité CVE-2024-3596
Siemens N/A TIA Portal Cloud V3.0 toutes versions versions antérieures à V18 Update 2
References
Bulletin de sécurité Siemens ssa-883918 2024-07-09 vendor-advisory
Bulletin de sécurité Siemens ssa-723487 2024-07-09 vendor-advisory
Bulletin de sécurité Siemens ssa-779936 2024-07-09 vendor-advisory
Bulletin de sécurité Siemens ssa-825651 2024-07-09 vendor-advisory
Bulletin de sécurité Siemens ssa-750499 2024-07-09 vendor-advisory
Bulletin de sécurité Siemens ssa-088132 2024-07-09 vendor-advisory
Bulletin de sécurité Siemens ssa-346262 2024-07-09 vendor-advisory
Bulletin de sécurité Siemens ssa-313039 2024-07-09 vendor-advisory
Bulletin de sécurité Siemens ssa-170375 2024-07-09 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (6GK5876-3AA02-2BA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X304-2FE (6GK5304-2BD00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-3 (6GK5307-3BL00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-3 (6GK5307-3BL10-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-3LD (6GK5307-3BM00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X307-3LD (6GK5307-3BM10-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2 (6GK5308-2FL00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2 (6GK5308-2FL10-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2LD (6GK5308-2FM00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2LD (6GK5308-2FM10-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2LH (6GK5308-2FN00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2LH (6GK5308-2FN10-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2M (6GK5308-2GG00-2AA2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2M (6GK5308-2GG10-2AA2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2M TS (6GK5308-2GG00-2CA2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X308-2M TS (6GK5308-2GG10-2CA2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X310 (6GK5310-0FA00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X310 (6GK5310-0FA10-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X310FE (6GK5310-0BA00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X310FE (6GK5310-0BA10-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X320-1 FE (6GK5320-1BD00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE X408-2 (6GK5408-2FD00-2AA2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208 (6GK5208-0BA00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208G (6GK5208-0GA00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216 (6GK5216-0BA00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC224 (6GK5224-0BA00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCH328 (6GK5328-4TS01-2EC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM324 (6GK5324-8TS01-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM328 (6GK5328-4TS01-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM332 (6GK5332-0GA01-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XF204 (6GK5204-0BA00-2GF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-4C (6GK5408-4GP00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-8C (6GK5408-8GS00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM416-4C (6GK5416-4GS00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP208 (6GK5208-0HA00-2AS6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP216 (6GK5216-0HA00-2AS6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (6GK5528-0AA00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR552-12M (6GK5552-0AA00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC  WinCC toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-30321",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC  WinCC toutes versions versions ant\u00e9rieures \u00e0 V19 Update 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC  WinCC toutes versions versions ant\u00e9rieures \u00e0 V7.4 SP1 Update 23",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC  WinCC toutes versions versions ant\u00e9rieures \u00e0 V7.5 SP2 Update 17",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC  WinCC toutes versions versions ant\u00e9rieures \u00e0 V8.0 Update 5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Compact Field Unit toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0)  versions ant\u00e9rieures \u00e0 V1.0.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200M (incl. SIPLUS variants) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200MP IM 155-5 PN BA (6ES7155-5AA00-0AA0)  versions ant\u00e9rieures \u00e0 V4.0.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200MP IM 155-5 PN HF (6ES7155-5AA00-0AC0)  versions ant\u00e9rieures \u00e0 V4.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200MP IM 155-5 PN ST (6ES7155-5AA00-0AB0)  versions ant\u00e9rieures \u00e0 V4.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP IM 155-6 PN BA (6ES7155-6AR00-0AN0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP IM 155-6 PN HA (incl. SIPLUS variants)  versions ant\u00e9rieures \u00e0 V1.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP IM 155-6 PN HF (6ES7155-6AU00-0CN0)  versions ant\u00e9rieures \u00e0 V4.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP IM 155-6 PN HS (6ES7155-6AU00-0DN0)  versions ant\u00e9rieures \u00e0 V4.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP IM 155-6 PN ST (6ES7155-6AU00-0BN0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP IM 155-6 PN ST (6ES7155-6AU01-0BN0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP IM 155-6 PN ST BA (6ES7155-6AA00-0BN0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP IM 155-6 PN ST BA (6ES7155-6AA01-0BN0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200pro IM 154-3 PN HF (6ES7154-3AB00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200pro IM 154-4 PN HF (6ES7154-4AB10-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200S (incl. SIPLUS variants) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12 (6ES7141-6BH00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12 (6ES7142-6BH00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 4AO U/I 4xM12 (6ES7145-6HD00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12 (6ES7147-6BG00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12 (6ES7142-6BR00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12 (6ES7144-6KD50-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12 (6ES7144-6KD00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12 (6ES7141-6BF00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12 (6ES7141-6BG00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12 (6ES7142-6BF50-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12 (6ES7142-6BF00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12 (6ES7142-6BG00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET200ecoPN: IO-Link Master (6ES7148-6JA00-0AB0) toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2017-12741.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Energy Manager Basic  versions ant\u00e9rieures \u00e0 V7.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Energy Manager PRO  versions ant\u00e9rieures \u00e0 V7.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC DiagBase toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-52891",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC DiagMonitor toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2023-52891",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS 7 V9.1 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo V4.0 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2022-45147.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PN/PN Coupler (incl. SIPLUS NET variants)  versions ant\u00e9rieures \u00e0 V4.2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1200 CPU family (incl. SIPLUS variants)  versions ant\u00e9rieures \u00e0 V4.2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)  versions ant\u00e9rieures \u00e0 V2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 Software Controller  versions ant\u00e9rieures \u00e0 V2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-200 SMART  versions ant\u00e9rieures \u00e0 V2.03.01",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) toutes versions versions ant\u00e9rieures \u00e0 V3.X.16",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-400 H V6\u00a0and below\u00a0CPU family (incl. SIPLUS variants)  versions ant\u00e9rieures \u00e0 V6.0.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)  versions ant\u00e9rieures \u00e0 V6.0.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)  versions ant\u00e9rieures \u00e0 V7.0.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)  versions ant\u00e9rieures \u00e0 V8.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V16 toutes versions versions ant\u00e9rieures \u00e0 V16 Update 7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V17 toutes versions versions ant\u00e9rieures \u00e0 V17 Update 7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 Safety V18 toutes versions versions ant\u00e9rieures \u00e0 V18 Update 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V16 toutes versions versions ant\u00e9rieures \u00e0 V16 Update 7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2022-45147.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V17 toutes versions versions ant\u00e9rieures \u00e0 V17 Update 7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2022-45147.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V18 toutes versions versions ant\u00e9rieures \u00e0 V18 Update 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC TDC CP51M1  versions ant\u00e9rieures \u00e0 V1.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC TDC CPU555  versions ant\u00e9rieures \u00e0 V1.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0) toutes versions versions ant\u00e9rieures \u00e0 V2010 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0) toutes versions versions ant\u00e9rieures \u00e0 V2010 SP3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V16 toutes versions versions ant\u00e9rieures \u00e0 V16 Update 7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V17 toutes versions versions ant\u00e9rieures \u00e0 V17 Update 7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified V18 toutes versions versions ant\u00e9rieures \u00e0 V18 Update 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V16  versions ant\u00e9rieures \u00e0 V16.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V17  versions ant\u00e9rieures \u00e0 V17.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V18 toutes versions versions ant\u00e9rieures \u00e0 V18 Update 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET SCALANCE X308-2 (6AG1308-2FL10-4AA3)  versions ant\u00e9rieures \u00e0 V4.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2024-3596",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud V3.0 toutes versions versions ant\u00e9rieures \u00e0 V18 Update 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2022-45147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45147"
    },
    {
      "name": "CVE-2024-3596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
    },
    {
      "name": "CVE-2023-32735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32735"
    },
    {
      "name": "CVE-2024-30321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30321"
    },
    {
      "name": "CVE-2023-52891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52891"
    },
    {
      "name": "CVE-2017-12741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12741"
    },
    {
      "name": "CVE-2024-38867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38867"
    },
    {
      "name": "CVE-2023-32737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32737"
    },
    {
      "name": "CVE-2023-52237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52237"
    },
    {
      "name": "CVE-2024-38278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38278"
    },
    {
      "name": "CVE-2023-52238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52238"
    },
    {
      "name": "CVE-2024-39675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39675"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0552",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-883918",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-883918.html"
    },
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-723487",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-723487.html"
    },
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-779936",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-779936.html"
    },
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-825651",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-825651.html"
    },
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-750499",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-750499.html"
    },
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-088132",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-088132.html"
    },
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-346262",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-346262.html"
    },
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-313039",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-313039.html"
    },
    {
      "published_at": "2024-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-170375",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-170375.html"
    }
  ]
}

CERTFR-2024-AVI-0478

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Siemens N/A SINEC Traffic Analyzer versions antérieures à 1.2
Siemens N/A SIPLUS ET 200SP CP 1543SP-1 ISEC versions antérieures à 2.3
Siemens N/A SITOP UPS1600 EX 20 A Ethernet PROFINET versions antérieures à 2.5.4
Siemens N/A Teamcenter Visualization 14.3 versions antérieures à 14.3.0.9
Siemens N/A SITOP UPS1600 40 A Ethernet/ PROFINET versions antérieures à 2.5.4
Siemens N/A PCCX26 Ax 1703 PE, Contr, Communication Element versions antérieures à 06.05
Siemens N/A Tecnomatix Plant Simulation 2404 versions antérieures à 2404.0001
Siemens N/A TIM 1531 IRC versions antérieures à 2.4.8
Siemens N/A CPCX26 Central Processing/Communication versions antérieures à 06.02
Siemens N/A SITOP UPS1600 20 A Ethernet/ PROFINET versions antérieures à 2.5.4
Siemens N/A Teamcenter Visualization 2312 versions antérieures à 2312.0004
Siemens N/A JT2Go versions antérieures à 2312.0004
Siemens N/A les applications Mendix utilisant Mendix 10 versions antérieures à 10.11.0
Siemens N/A Tecnomatix Plant Simulation 2302 versions antérieures à 2302.0012
Siemens N/A SIPLUS TIM 1531 IRC versions antérieures à 2.4.8
Siemens N/A ETA5 Ethernet Int. 1x100TX IEC61850 Ed.2 versions antérieures à 03.27
Siemens N/A SITOP UPS1600 10 A Ethernet/ PROFINET versions antérieures à 2.5.4
Siemens N/A PowerSys versions antérieures à 3.11
Siemens N/A ETA4 Ethernet Interface IEC60870-5-104 versions antérieures à 10.46
Siemens N/A TIA Administrator versions antérieures à 3 SP2
Siemens N/A les applications Mendix utilisant Mendix 9 versions antérieures à 9.24.22
Siemens N/A ST7 ScadaConnect versions antérieures à 1.1
Siemens N/A SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL versions antérieures à 2.3
Siemens N/A Teamcenter Visualization 14.2 toutes versions, aucun correctif n'est disponible
Siemens N/A les produits SCALANCE, se référer au bulletin de sécurité de l'éditeur (cf. section Documentation)
Siemens N/A SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL versions antérieures à 2.3
Siemens N/A les applications Mendix utilisant Mendix 10.6 versions antérieures à 10.6.9
References
Bulletin de sécurité Siemens ssa-900277 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-620338 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-540640 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-238730 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-319319 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-879734 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-625862 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-481506 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-024584 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-196737 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-337522 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-341067 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-771940 2024-06-11 vendor-advisory
Bulletin de sécurité Siemens ssa-690517 2024-06-11 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SINEC Traffic Analyzer versions ant\u00e9rieures \u00e0 1.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CP 1543SP-1 ISEC versions ant\u00e9rieures \u00e0 2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SITOP UPS1600 EX 20 A Ethernet PROFINET versions ant\u00e9rieures \u00e0 2.5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization 14.3 versions ant\u00e9rieures \u00e0 14.3.0.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SITOP UPS1600 40 A Ethernet/ PROFINET versions ant\u00e9rieures \u00e0 2.5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "PCCX26 Ax 1703 PE, Contr, Communication Element versions ant\u00e9rieures \u00e0 06.05",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Tecnomatix Plant Simulation 2404 versions ant\u00e9rieures \u00e0 2404.0001",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIM 1531 IRC versions ant\u00e9rieures \u00e0 2.4.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "CPCX26 Central Processing/Communication versions ant\u00e9rieures \u00e0 06.02",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SITOP UPS1600 20 A Ethernet/ PROFINET versions ant\u00e9rieures \u00e0 2.5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization 2312 versions ant\u00e9rieures \u00e0 2312.0004",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "JT2Go versions ant\u00e9rieures \u00e0 2312.0004",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "les applications Mendix utilisant Mendix 10 versions ant\u00e9rieures \u00e0 10.11.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Tecnomatix Plant Simulation 2302 versions ant\u00e9rieures \u00e0 2302.0012",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS TIM 1531 IRC versions ant\u00e9rieures \u00e0 2.4.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "ETA5 Ethernet Int. 1x100TX IEC61850 Ed.2 versions ant\u00e9rieures \u00e0 03.27",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SITOP UPS1600 10 A Ethernet/ PROFINET versions ant\u00e9rieures \u00e0 2.5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "PowerSys versions ant\u00e9rieures \u00e0 3.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "ETA4 Ethernet Interface IEC60870-5-104 versions ant\u00e9rieures \u00e0 10.46",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Administrator versions ant\u00e9rieures \u00e0 3 SP2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "les applications Mendix utilisant Mendix 9 versions ant\u00e9rieures \u00e0 9.24.22",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "ST7 ScadaConnect versions ant\u00e9rieures \u00e0 1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL versions ant\u00e9rieures \u00e0 2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization 14.2 toutes versions, aucun correctif n\u0027est disponible",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "les produits SCALANCE, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section Documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL versions ant\u00e9rieures \u00e0 2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "les applications Mendix utilisant Mendix 10.6 versions ant\u00e9rieures \u00e0 10.6.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2023-24895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24895"
    },
    {
      "name": "CVE-2023-49691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49691"
    },
    {
      "name": "CVE-2024-35207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35207"
    },
    {
      "name": "CVE-2023-33135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33135"
    },
    {
      "name": "CVE-2024-33500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33500"
    },
    {
      "name": "CVE-2023-35390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35390"
    },
    {
      "name": "CVE-2023-44317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44317"
    },
    {
      "name": "CVE-2024-35210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35210"
    },
    {
      "name": "CVE-2022-4304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
    },
    {
      "name": "CVE-2023-38380",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38380"
    },
    {
      "name": "CVE-2023-36794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36794"
    },
    {
      "name": "CVE-2024-36266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36266"
    },
    {
      "name": "CVE-2023-24897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24897"
    },
    {
      "name": "CVE-2022-44792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792"
    },
    {
      "name": "CVE-2022-42329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
    },
    {
      "name": "CVE-2024-35206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35206"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-35788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-24936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24936"
    },
    {
      "name": "CVE-2023-36792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36792"
    },
    {
      "name": "CVE-2022-3643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3643"
    },
    {
      "name": "CVE-2022-39189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
    },
    {
      "name": "CVE-2022-46144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46144"
    },
    {
      "name": "CVE-2022-3435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2024-26277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26277"
    },
    {
      "name": "CVE-2022-40225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40225"
    },
    {
      "name": "CVE-2023-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
    },
    {
      "name": "CVE-2023-35828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35828"
    },
    {
      "name": "CVE-2023-36049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36049"
    },
    {
      "name": "CVE-2023-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
    },
    {
      "name": "CVE-2022-44793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793"
    },
    {
      "name": "CVE-2024-35211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35211"
    },
    {
      "name": "CVE-2023-33127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33127"
    },
    {
      "name": "CVE-2021-47178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-47178"
    },
    {
      "name": "CVE-2022-45919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
    },
    {
      "name": "CVE-2023-33170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33170"
    },
    {
      "name": "CVE-2023-33128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33128"
    },
    {
      "name": "CVE-2023-41910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41910"
    },
    {
      "name": "CVE-2023-28484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
    },
    {
      "name": "CVE-2023-28319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
    },
    {
      "name": "CVE-2022-45886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45886"
    },
    {
      "name": "CVE-2022-1015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1015"
    },
    {
      "name": "CVE-2023-27321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27321"
    },
    {
      "name": "CVE-2024-31484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31484"
    },
    {
      "name": "CVE-2023-0464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
    },
    {
      "name": "CVE-2022-41742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41742"
    },
    {
      "name": "CVE-2022-3545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
    },
    {
      "name": "CVE-2023-26552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
    },
    {
      "name": "CVE-2023-29469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
    },
    {
      "name": "CVE-2023-0160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
    },
    {
      "name": "CVE-2024-35212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35212"
    },
    {
      "name": "CVE-2022-40303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
    },
    {
      "name": "CVE-2023-21255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21255"
    },
    {
      "name": "CVE-2024-26275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26275"
    },
    {
      "name": "CVE-2023-38180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38180"
    },
    {
      "name": "CVE-2023-35824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
    },
    {
      "name": "CVE-2024-35209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35209"
    },
    {
      "name": "CVE-2022-42328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
    },
    {
      "name": "CVE-2023-35823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
    },
    {
      "name": "CVE-2023-38178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38178"
    },
    {
      "name": "CVE-2022-45887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
    },
    {
      "name": "CVE-2024-0775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0775"
    },
    {
      "name": "CVE-2023-44319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44319"
    },
    {
      "name": "CVE-2023-32032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32032"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2023-26554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
    },
    {
      "name": "CVE-2023-2269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2269"
    },
    {
      "name": "CVE-2024-35208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35208"
    },
    {
      "name": "CVE-2024-26276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26276"
    },
    {
      "name": "CVE-2023-1017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1017"
    },
    {
      "name": "CVE-2023-38171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38171"
    },
    {
      "name": "CVE-2023-28260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28260"
    },
    {
      "name": "CVE-2023-50763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50763"
    },
    {
      "name": "CVE-2022-3623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3623"
    },
    {
      "name": "CVE-2022-2097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
    },
    {
      "name": "CVE-2023-29331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29331"
    },
    {
      "name": "CVE-2023-44374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44374"
    },
    {
      "name": "CVE-2023-38533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38533"
    },
    {
      "name": "CVE-2023-35829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35829"
    },
    {
      "name": "CVE-2023-36038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36038"
    },
    {
      "name": "CVE-2023-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21808"
    },
    {
      "name": "CVE-2023-36799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36799"
    },
    {
      "name": "CVE-2023-36435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36435"
    },
    {
      "name": "CVE-2023-26553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
    },
    {
      "name": "CVE-2022-40304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
    },
    {
      "name": "CVE-2023-35391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35391"
    },
    {
      "name": "CVE-2023-44373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44373"
    },
    {
      "name": "CVE-2023-39615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
    },
    {
      "name": "CVE-2023-36796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36796"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2024-35303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35303"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2024-35292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35292"
    },
    {
      "name": "CVE-2023-36558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36558"
    },
    {
      "name": "CVE-2023-2124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
    },
    {
      "name": "CVE-2023-33126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33126"
    },
    {
      "name": "CVE-2023-52474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52474"
    },
    {
      "name": "CVE-2023-44318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44318"
    },
    {
      "name": "CVE-2023-36793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36793"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0478",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-06-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-900277",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-900277.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-620338",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-620338.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-540640",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-540640.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-238730",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-238730.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-319319",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-319319.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-879734",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-879734.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-625862",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-625862.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-481506",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-481506.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-024584",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-024584.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-196737",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-196737.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-337522",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-337522.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-341067",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-341067.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-771940",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-771940.html"
    },
    {
      "published_at": "2024-06-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-690517",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html"
    }
  ]
}

CERTFR-2024-AVI-0393

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A S7-PCT toutes versions
Siemens N/A SIMATIC WinCC Runtime Professional V17 toutes versions
Siemens N/A SIMATIC CN 4100 versions antérieures à V3.0
Siemens N/A Sicam CPCI85 Central Processing/Communication versions antérieures à V5.30
Siemens N/A SIMATIC WinCC Runtime Professional V16 toutes versions
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V17 toutes versions
Siemens N/A SIMATIC WinCC OA V3.17 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2023-46280.
Siemens N/A SIMATIC WinCC V7.4 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2023-46280.
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V18 toutes versions
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V16 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2023-46280.
Siemens N/A SIMATIC PCS 7 V9.1 toutes versions
Siemens N/A SIMATIC WinCC Runtime Professional V19 toutes versions
Siemens N/A SIMATIC Automation Tool toutes versions
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V15.1 toutes versions. L'éditeur indique que le produit ne bénéficiera pas de correctif de sécurité pour la vulnérabilité CVE-2023-46280.
Siemens N/A SIMATIC PDM V9.2 toutes versions
Siemens N/A SIMATIC Route Control V9.1 toutes versions
Siemens N/A SIMATIC STEP 7 V5 toutes versions
Siemens N/A SIMATIC WinCC V7.5 toutes versions
Siemens N/A SIMATIC WinCC Runtime Advanced toutes versions
Siemens N/A Sicam CPC80 Central Processing/Communication versions antérieures à V16.41
Siemens N/A Totally Integrated Automation Portal (TIA Portal) V19 versions antérieures à V19 Update 2
Siemens N/A Sicam OPUPI0 AMQP/MQTT versions antérieures à V5.30
Siemens N/A TIA Portal Cloud Connector versions antérieures à V2.0
Siemens N/A Sicam SICORE Base system versions antérieures à V1.3.0
Siemens N/A SIMATIC WinCC V8.0 toutes versions
Siemens N/A SIMATIC WinCC Runtime Professional V18 toutes versions
Siemens N/A SIMATIC WinCC OA V3.19 versions antérieures à V3.19 P010
Siemens N/A SIMATIC WinCC Unified PC Runtime toutes versions
Siemens N/A SIMATIC NET PC Software toutes versions
Siemens N/A SIMATIC WinCC OA V3.18 versions antérieures à V3.18 P025
Siemens N/A SIMATIC BATCH V9.1 toutes versions

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "S7-PCT toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Professional V17 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CN 4100 versions ant\u00e9rieures \u00e0 V3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Sicam CPCI85 Central Processing/Communication versions ant\u00e9rieures \u00e0 V5.30",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Professional V16 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V17 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC OA V3.17 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2023-46280.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V7.4 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2023-46280.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V18 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V16 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2023-46280.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS 7 V9.1 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Professional V19 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Automation Tool toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V15.1 toutes versions. L\u0027\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2023-46280.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PDM V9.2 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Route Control V9.1 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 V5 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V7.5 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Advanced toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Sicam CPC80 Central Processing/Communication versions ant\u00e9rieures \u00e0 V16.41",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) V19 versions ant\u00e9rieures \u00e0 V19 Update 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Sicam OPUPI0 AMQP/MQTT versions ant\u00e9rieures \u00e0 V5.30",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "TIA Portal Cloud Connector versions ant\u00e9rieures \u00e0 V2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Sicam SICORE Base system versions ant\u00e9rieures \u00e0 V1.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V8.0 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Runtime Professional V18 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC OA V3.19 versions ant\u00e9rieures \u00e0 V3.19 P010",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC Unified PC Runtime toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC NET PC Software toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC OA V3.18 versions ant\u00e9rieures \u00e0 V3.18 P025",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC BATCH V9.1 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-32741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32741"
    },
    {
      "name": "CVE-2024-31484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31484"
    },
    {
      "name": "CVE-2024-31485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31485"
    },
    {
      "name": "CVE-2024-32742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32742"
    },
    {
      "name": "CVE-2023-46280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46280"
    },
    {
      "name": "CVE-2024-31486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31486"
    },
    {
      "name": "CVE-2024-32740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32740"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0393",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-05-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-871704 du 14 mai 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-871704.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-273900 du 14 mai 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-273900.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-962515 du 14 mai 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-962515.html"
    }
  ]
}

CERTFR-2024-AVI-0338

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été découverte dans Siemens RUGGEDCOM APE1808. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A RUGGEDCOM APE1808 configuré avec GlobalProtect sans le dernier correctif de sécurité
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "RUGGEDCOM APE1808 configur\u00e9 avec GlobalProtect sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-3400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3400"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0338",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-04-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eSiemens\nRUGGEDCOM APE1808\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Siemens RUGGEDCOM APE1808",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-750274 du 19 avril 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-750274.html"
    }
  ]
}

CERTFR-2024-AVI-0281

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A SIMATIC PCS 7 V9.1 versions antérieures à V9.1 SP2 UC04
Siemens N/A SIMATIC WinCC versions antérieures à V19 Update 1
Siemens N/A SIMATIC S7-1500 TM MFP toutes versions pour les vulnérabilités CVE-2023-5678, CVE-2023-6121, CVE-2023-6817, CVE-2023-6931, CVE-2023-6932, CVE-2023-45898, CVE-2024-0584 et CVE-2024-0727.
Siemens N/A Scalance W1750D versions antérieures à V8.10.0.9
Siemens N/A SIMATIC WinCC versions antérieures à V7.5 SP2 Update 16

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC PCS 7 V9.1 versions ant\u00e9rieures \u00e0 V9.1 SP2 UC04",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC versions ant\u00e9rieures \u00e0 V19 Update 1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 TM MFP toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2023-5678, CVE-2023-6121, CVE-2023-6817, CVE-2023-6931, CVE-2023-6932, CVE-2023-45898, CVE-2024-0584 et CVE-2024-0727.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Scalance W1750D versions ant\u00e9rieures \u00e0 V8.10.0.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC versions ant\u00e9rieures \u00e0 V7.5 SP2 Update 16",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-45898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45898"
    },
    {
      "name": "CVE-2024-0584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0584"
    },
    {
      "name": "CVE-2023-35982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35982"
    },
    {
      "name": "CVE-2023-6817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
    },
    {
      "name": "CVE-2023-35981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35981"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-6932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
    },
    {
      "name": "CVE-2023-50821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50821"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-35980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35980"
    },
    {
      "name": "CVE-2023-6121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
    },
    {
      "name": "CVE-2023-6931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0281",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-04-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un\nd\u00e9ni de service \u00e0 distance et une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-730482 du 09 avril 2024",
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-730482.pdf"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-885980 du 09 avril 2024",
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-885980.pdf"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-265688 du 09 avril 2024",
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-265688.pdf"
    }
  ]
}

CERTFR-2024-AVI-0203

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A Cerberus PRO EN Engineering Tool versions antérieures à IP8
Siemens N/A SENTRON 7KM PAC3220 AC/DC (7KM3220-0BA01-1DA0) versions supérieures ou égales à V3.2.3 versions antérieures à V3.3.0
Siemens N/A SENTRON 7KM PAC3120 DC (7KM3120-1BA01-1EA0) versions supérieures ou égales à V3.2.3 versions antérieures à V3.3.0
Siemens N/A Sinteso FS20 EN Fire Panel FC20 versions antérieures à MP8
Siemens N/A RUGGEDCOM APE1808 avec Fortinet NGFW versions antérieures à V7.4.1
Siemens N/A Sinteso FS20 EN X200 Cloud Distribution versions V4.0.x antérieures à V4.0.5016
Siemens N/A Cerberus PRO EN X200 Cloud Distribution versions V4.0.x antérieures à V4.0.5016
Siemens N/A SENTRON 3KC ATC6 Expansion Module Ethernet toutes versions
Siemens N/A Sinteso FS20 EN Engineering Tool versions antérieures à MP8
Siemens N/A SIMATIC RF160B (6GT2003-0FA00) versions antérieures à V2.2
Siemens N/A SINEMA Remote Connect Server versions antérieures à V3.2
Siemens N/A Solid Edge versions antérieures à V223.0.11
Siemens N/A Siveillance Control versions supérieures ou égales à V2.8 versions antérieures à V3.1.1
Siemens N/A Cerberus PRO EN X300 Cloud Distribution versions V4.3.x antérieures à V4.3.5617
Siemens N/A Cerberus PRO EN Fire Panel FC72x versions antérieures à IP8
Siemens N/A SENTRON 7KM PAC3220 DC (7KM3220-1BA01-1EA0) versions supérieures ou égales à V3.2.3 versions antérieures à V3.3.0
Siemens N/A Sinteso FS20 EN X300 Cloud Distribution versions V4.2.x antérieures à V4.2.5015
Siemens N/A SINEMA Remote Connect Client versions antérieures à V3.1 SP1
Siemens N/A SENTRON 7KM PAC3120 AC/DC (7KM3120-0BA01-1DA0) versions supérieures ou égales à V3.2.3 versions antérieures à V3.3.0
Siemens N/A Cerberus PRO EN X300 Cloud Distribution versions V4.2.x antérieures à V4.2.5015
Siemens N/A Sinteso FS20 EN X200 Cloud Distribution versions V4.3.x antérieures à V4.3.5618
Siemens N/A Cerberus PRO EN X200 Cloud Distribution versions V4.3.x antérieures à V4.3.5618
Siemens N/A Sinteso FS20 EN X300 Cloud Distribution versions V4.3.x antérieures à V4.3.5617
Siemens N/A Sinteso Mobile versions antérieures à V3.0.0

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cerberus PRO EN Engineering Tool versions ant\u00e9rieures \u00e0 IP8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SENTRON 7KM PAC3220 AC/DC (7KM3220-0BA01-1DA0) versions sup\u00e9rieures ou \u00e9gales \u00e0 V3.2.3 versions ant\u00e9rieures \u00e0 V3.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SENTRON 7KM PAC3120 DC (7KM3120-1BA01-1EA0) versions sup\u00e9rieures ou \u00e9gales \u00e0 V3.2.3 versions ant\u00e9rieures \u00e0 V3.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Sinteso FS20 EN Fire Panel FC20 versions ant\u00e9rieures \u00e0 MP8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 avec Fortinet NGFW versions ant\u00e9rieures \u00e0 V7.4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Sinteso FS20 EN X200 Cloud Distribution versions V4.0.x ant\u00e9rieures \u00e0 V4.0.5016",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Cerberus PRO EN X200 Cloud Distribution versions V4.0.x ant\u00e9rieures \u00e0 V4.0.5016",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SENTRON 3KC ATC6 Expansion Module Ethernet toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Sinteso FS20 EN Engineering Tool versions ant\u00e9rieures \u00e0 MP8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC RF160B (6GT2003-0FA00) versions ant\u00e9rieures \u00e0 V2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 V3.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Solid Edge versions ant\u00e9rieures \u00e0 V223.0.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Siveillance Control versions sup\u00e9rieures ou \u00e9gales \u00e0 V2.8 versions ant\u00e9rieures \u00e0 V3.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Cerberus PRO EN X300 Cloud Distribution versions V4.3.x ant\u00e9rieures \u00e0 V4.3.5617",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Cerberus PRO EN Fire Panel FC72x versions ant\u00e9rieures \u00e0 IP8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SENTRON 7KM PAC3220 DC (7KM3220-1BA01-1EA0) versions sup\u00e9rieures ou \u00e9gales \u00e0 V3.2.3 versions ant\u00e9rieures \u00e0 V3.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Sinteso FS20 EN X300 Cloud Distribution versions V4.2.x ant\u00e9rieures \u00e0 V4.2.5015",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEMA Remote Connect Client versions ant\u00e9rieures \u00e0 V3.1 SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SENTRON 7KM PAC3120 AC/DC (7KM3120-0BA01-1DA0) versions sup\u00e9rieures ou \u00e9gales \u00e0 V3.2.3 versions ant\u00e9rieures \u00e0 V3.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Cerberus PRO EN X300 Cloud Distribution versions V4.2.x ant\u00e9rieures \u00e0 V4.2.5015",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Sinteso FS20 EN X200 Cloud Distribution versions V4.3.x ant\u00e9rieures \u00e0 V4.3.5618",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Cerberus PRO EN X200 Cloud Distribution versions V4.3.x ant\u00e9rieures \u00e0 V4.3.5618",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Sinteso FS20 EN X300 Cloud Distribution versions V4.3.x ant\u00e9rieures \u00e0 V4.3.5617",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Sinteso Mobile versions ant\u00e9rieures \u00e0 V3.0.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-0646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0646"
    },
    {
      "name": "CVE-2017-18509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-18509"
    },
    {
      "name": "CVE-2021-0599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0599"
    },
    {
      "name": "CVE-2021-0443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0443"
    },
    {
      "name": "CVE-2022-20462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20462"
    },
    {
      "name": "CVE-2021-0598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0598"
    },
    {
      "name": "CVE-2021-0438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0438"
    },
    {
      "name": "CVE-2021-0651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0651"
    },
    {
      "name": "CVE-2021-0585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0585"
    },
    {
      "name": "CVE-2021-0331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0331"
    },
    {
      "name": "CVE-2021-0509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0509"
    },
    {
      "name": "CVE-2021-0601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0601"
    },
    {
      "name": "CVE-2021-0478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0478"
    },
    {
      "name": "CVE-2021-0397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0397"
    },
    {
      "name": "CVE-2021-0600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0600"
    },
    {
      "name": "CVE-2021-0928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0928"
    },
    {
      "name": "CVE-2021-0484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0484"
    },
    {
      "name": "CVE-2023-36641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36641"
    },
    {
      "name": "CVE-2021-0642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0642"
    },
    {
      "name": "CVE-2021-0341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2022-41329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41329"
    },
    {
      "name": "CVE-2021-0597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0597"
    },
    {
      "name": "CVE-2020-24587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24587"
    },
    {
      "name": "CVE-2017-14491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
    },
    {
      "name": "CVE-2022-20421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
    },
    {
      "name": "CVE-2021-0593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0593"
    },
    {
      "name": "CVE-2022-20498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20498"
    },
    {
      "name": "CVE-2021-0473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0473"
    },
    {
      "name": "CVE-2022-41328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41328"
    },
    {
      "name": "CVE-2022-42474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42474"
    },
    {
      "name": "CVE-2021-0870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0870"
    },
    {
      "name": "CVE-2020-0417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0417"
    },
    {
      "name": "CVE-2020-29660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
    },
    {
      "name": "CVE-2021-0604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0604"
    },
    {
      "name": "CVE-2021-0522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0522"
    },
    {
      "name": "CVE-2021-39629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39629"
    },
    {
      "name": "CVE-2020-29661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
    },
    {
      "name": "CVE-2021-38204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
    },
    {
      "name": "CVE-2022-20229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20229"
    },
    {
      "name": "CVE-2023-33306",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33306"
    },
    {
      "name": "CVE-2022-39948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39948"
    },
    {
      "name": "CVE-2022-20423",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20423"
    },
    {
      "name": "CVE-2021-0396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0396"
    },
    {
      "name": "CVE-2021-0650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0650"
    },
    {
      "name": "CVE-2021-0329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0329"
    },
    {
      "name": "CVE-2023-41675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41675"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2023-27997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27997"
    },
    {
      "name": "CVE-2023-29183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29183"
    },
    {
      "name": "CVE-2021-0471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0471"
    },
    {
      "name": "CVE-2023-29181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29181"
    },
    {
      "name": "CVE-2021-0963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0963"
    },
    {
      "name": "CVE-2021-0327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0327"
    },
    {
      "name": "CVE-2021-0653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0653"
    },
    {
      "name": "CVE-2021-0690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0690"
    },
    {
      "name": "CVE-2021-39634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39634"
    },
    {
      "name": "CVE-2021-0596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0596"
    },
    {
      "name": "CVE-2023-47537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47537"
    },
    {
      "name": "CVE-2023-28002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28002"
    },
    {
      "name": "CVE-2023-22641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22641"
    },
    {
      "name": "CVE-2021-0919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0919"
    },
    {
      "name": "CVE-2021-0968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0968"
    },
    {
      "name": "CVE-2022-20500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20500"
    },
    {
      "name": "CVE-2021-29647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29647"
    },
    {
      "name": "CVE-2021-0521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0521"
    },
    {
      "name": "CVE-2020-11301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11301"
    },
    {
      "name": "CVE-2021-0953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0953"
    },
    {
      "name": "CVE-2021-0926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0926"
    },
    {
      "name": "CVE-2021-0961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0961"
    },
    {
      "name": "CVE-2023-26207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26207"
    },
    {
      "name": "CVE-2020-23064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
    },
    {
      "name": "CVE-2021-0652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0652"
    },
    {
      "name": "CVE-2021-0339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0339"
    },
    {
      "name": "CVE-2021-39627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39627"
    },
    {
      "name": "CVE-2021-0437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0437"
    },
    {
      "name": "CVE-2023-29179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29179"
    },
    {
      "name": "CVE-2021-0433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0433"
    },
    {
      "name": "CVE-2024-22041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22041"
    },
    {
      "name": "CVE-2023-33305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33305"
    },
    {
      "name": "CVE-2022-20473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20473"
    },
    {
      "name": "CVE-2022-43947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43947"
    },
    {
      "name": "CVE-2023-41841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41841"
    },
    {
      "name": "CVE-2021-0333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0333"
    },
    {
      "name": "CVE-2022-20483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20483"
    },
    {
      "name": "CVE-2020-25705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25705"
    },
    {
      "name": "CVE-2024-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22045"
    },
    {
      "name": "CVE-2022-42476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42476"
    },
    {
      "name": "CVE-2023-49125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49125"
    },
    {
      "name": "CVE-2021-0399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0399"
    },
    {
      "name": "CVE-2023-33301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33301"
    },
    {
      "name": "CVE-2021-0476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0476"
    },
    {
      "name": "CVE-2021-0507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0507"
    },
    {
      "name": "CVE-2021-0390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0390"
    },
    {
      "name": "CVE-2021-0444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0444"
    },
    {
      "name": "CVE-2021-0520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0520"
    },
    {
      "name": "CVE-2021-0586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0586"
    },
    {
      "name": "CVE-2021-39633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39633"
    },
    {
      "name": "CVE-2021-0587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0587"
    },
    {
      "name": "CVE-2021-0952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0952"
    },
    {
      "name": "CVE-2022-20476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20476"
    },
    {
      "name": "CVE-2020-10768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10768"
    },
    {
      "name": "CVE-2022-20472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20472"
    },
    {
      "name": "CVE-2021-0326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0326"
    },
    {
      "name": "CVE-2021-0929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0929"
    },
    {
      "name": "CVE-2022-20227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20227"
    },
    {
      "name": "CVE-2021-0336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0336"
    },
    {
      "name": "CVE-2023-44250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44250"
    },
    {
      "name": "CVE-2021-0506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0506"
    },
    {
      "name": "CVE-2021-0515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0515"
    },
    {
      "name": "CVE-2022-20355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20355"
    },
    {
      "name": "CVE-2021-0330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0330"
    },
    {
      "name": "CVE-2021-0688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0688"
    },
    {
      "name": "CVE-2021-0393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0393"
    },
    {
      "name": "CVE-2024-21762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21762"
    },
    {
      "name": "CVE-2021-0512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0512"
    },
    {
      "name": "CVE-2023-29178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29178"
    },
    {
      "name": "CVE-2022-20130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20130"
    },
    {
      "name": "CVE-2021-0519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0519"
    },
    {
      "name": "CVE-2021-0516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0516"
    },
    {
      "name": "CVE-2021-39621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39621"
    },
    {
      "name": "CVE-2021-33909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
    },
    {
      "name": "CVE-2022-42469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42469"
    },
    {
      "name": "CVE-2021-1972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1972"
    },
    {
      "name": "CVE-2021-1976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-1976"
    },
    {
      "name": "CVE-2022-41327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41327"
    },
    {
      "name": "CVE-2021-0640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0640"
    },
    {
      "name": "CVE-2020-14305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
    },
    {
      "name": "CVE-2023-36555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36555"
    },
    {
      "name": "CVE-2022-20422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20422"
    },
    {
      "name": "CVE-2022-20468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20468"
    },
    {
      "name": "CVE-2023-22640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22640"
    },
    {
      "name": "CVE-2021-0400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0400"
    },
    {
      "name": "CVE-2022-20469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20469"
    },
    {
      "name": "CVE-2020-26558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
    },
    {
      "name": "CVE-2021-0706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0706"
    },
    {
      "name": "CVE-2021-0682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0682"
    },
    {
      "name": "CVE-2021-0480",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0480"
    },
    {
      "name": "CVE-2021-0429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0429"
    },
    {
      "name": "CVE-2023-22639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22639"
    },
    {
      "name": "CVE-2021-0683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0683"
    },
    {
      "name": "CVE-2022-20411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20411"
    },
    {
      "name": "CVE-2022-43953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43953"
    },
    {
      "name": "CVE-2023-33307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33307"
    },
    {
      "name": "CVE-2021-0328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0328"
    },
    {
      "name": "CVE-2021-0684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0684"
    },
    {
      "name": "CVE-2022-20466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20466"
    },
    {
      "name": "CVE-2023-40718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40718"
    },
    {
      "name": "CVE-2021-0920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
    },
    {
      "name": "CVE-2021-0704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0704"
    },
    {
      "name": "CVE-2022-20127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-20127"
    },
    {
      "name": "CVE-2021-0436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0436"
    },
    {
      "name": "CVE-2021-0584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0584"
    },
    {
      "name": "CVE-2022-45861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45861"
    },
    {
      "name": "CVE-2021-0594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0594"
    },
    {
      "name": "CVE-2021-0591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0591"
    },
    {
      "name": "CVE-2021-0514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0514"
    },
    {
      "name": "CVE-2021-0511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0511"
    },
    {
      "name": "CVE-2021-0931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0931"
    },
    {
      "name": "CVE-2024-21483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21483"
    },
    {
      "name": "CVE-2020-15436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15436"
    },
    {
      "name": "CVE-2023-45793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45793"
    },
    {
      "name": "CVE-2021-0689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0689"
    },
    {
      "name": "CVE-2023-28001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28001"
    },
    {
      "name": "CVE-2021-0970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0970"
    },
    {
      "name": "CVE-2021-0337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0337"
    },
    {
      "name": "CVE-2022-32257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32257"
    },
    {
      "name": "CVE-2023-36639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36639"
    },
    {
      "name": "CVE-2021-39623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39623"
    },
    {
      "name": "CVE-2022-41330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41330"
    },
    {
      "name": "CVE-2021-0508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0508"
    },
    {
      "name": "CVE-2021-0325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0325"
    },
    {
      "name": "CVE-2021-0708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0708"
    },
    {
      "name": "CVE-2022-41334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41334"
    },
    {
      "name": "CVE-2024-23113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23113"
    },
    {
      "name": "CVE-2020-0338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0338"
    },
    {
      "name": "CVE-2020-26555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
    },
    {
      "name": "CVE-2021-0302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0302"
    },
    {
      "name": "CVE-2021-0589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0589"
    },
    {
      "name": "CVE-2021-0305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0305"
    },
    {
      "name": "CVE-2023-33308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33308"
    },
    {
      "name": "CVE-2023-29175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29175"
    },
    {
      "name": "CVE-2021-0431",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0431"
    },
    {
      "name": "CVE-2021-0392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0392"
    },
    {
      "name": "CVE-2021-0474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0474"
    },
    {
      "name": "CVE-2021-0930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0930"
    },
    {
      "name": "CVE-2021-39626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39626"
    },
    {
      "name": "CVE-2021-0967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0967"
    },
    {
      "name": "CVE-2023-25610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25610"
    },
    {
      "name": "CVE-2023-37935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37935"
    },
    {
      "name": "CVE-2021-0695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0695"
    },
    {
      "name": "CVE-2024-22040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22040"
    },
    {
      "name": "CVE-2021-0965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0965"
    },
    {
      "name": "CVE-2021-0513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0513"
    },
    {
      "name": "CVE-2021-0434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0434"
    },
    {
      "name": "CVE-2021-0687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0687"
    },
    {
      "name": "CVE-2021-0481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0481"
    },
    {
      "name": "CVE-2021-0964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0964"
    },
    {
      "name": "CVE-2021-0641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0641"
    },
    {
      "name": "CVE-2021-0435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0435"
    },
    {
      "name": "CVE-2021-0334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0334"
    },
    {
      "name": "CVE-2021-0933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0933"
    },
    {
      "name": "CVE-2021-0394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0394"
    },
    {
      "name": "CVE-2023-29180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29180"
    },
    {
      "name": "CVE-2021-0588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0588"
    },
    {
      "name": "CVE-2023-38545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
    },
    {
      "name": "CVE-2024-22039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22039"
    },
    {
      "name": "CVE-2021-0391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0391"
    },
    {
      "name": "CVE-2021-0510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0510"
    },
    {
      "name": "CVE-2021-0692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-0692"
    },
    {
      "name": "CVE-2024-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22044"
    },
    {
      "name": "CVE-2020-14381",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0203",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-03-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-792319 du 12 mars 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-792319.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-918992 du 12 mars 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-918992.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-353002 du 12 mars 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-353002.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-653855 du 12 mars 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-653855.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-225840 du 12 mars 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-225840.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-145196 du 12 mars 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-145196.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-382651 du 12 mars 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-382651.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-832273 du 12 mars 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-832273.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-366067 du 12 mars 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-366067.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-770721 du 12 mars 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-576771 du 12 mars 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-576771.html"
    }
  ]
}

CERTFR-2024-AVI-0119

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une élévation de privilèges et une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions antérieures à V2.4
Siemens N/A SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions antérieures à V2.4
Siemens N/A SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions antérieures à V2.4
Siemens N/A Simcenter Femap versions antérieures à V2401.0000
Siemens N/A SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions antérieures à V2.4
Siemens N/A Parasolid V36.0 versions antérieures à V36.0.198
Siemens N/A SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions antérieures à V2.4
Siemens N/A SCALANCE SC646-2C (6GK5646-2GS00-2AC2) versions antérieures à V3.1
Siemens N/A SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions antérieures à V2.4
Siemens N/A SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions antérieures à V2.4
Siemens N/A SCALANCE SC636-2C (6GK5636-2GS00-2AC2) versions antérieures à V3.1
Siemens N/A Location Intelligence SUS Small (9DE5110-8CA11-1BX0) versions antérieures à V4.3
Siemens N/A SIMATIC WinCC V7.5 versions antérieures à V7.5 SP2 Update 15
Siemens N/A SINEC NMS versions antérieures à V2.0 SP1
Siemens N/A SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions antérieures à V2.4
Siemens N/A SIMATIC WinCC V8.0 versions antérieures à V8.0 SP4
Siemens N/A SIDIS Prime versions antérieures à V4.0.400
Siemens N/A SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions antérieures à V2.4
Siemens N/A Location Intelligence Perpetual Small (9DE5110-8CA11-1AX0) versions antérieures à V4.3
Siemens N/A SCALANCE SC642-2C (6GK5642-2GS00-2AC2) versions antérieures à V3.1
Siemens N/A SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions antérieures à V2.4
Siemens N/A Parasolid V35.1 versions antérieures à V35.1.252
Siemens N/A Tecnomatix Plant Simulation V2201 versions antérieures à V2201.0012
Siemens N/A RUGGEDCOM APE1808 avec Nozomi Guardian / CMC antérieures à 23.3.0
Siemens N/A Location Intelligence Perpetual Medium (9DE5110-8CA12-1AX0) versions antérieures à V4.3
Siemens N/A SCALANCE SC632-2C (6GK5632-2GS00-2AC2) versions antérieures à V3.1
Siemens N/A Location Intelligence SUS Non-Prod (9DE5110-8CA10-1BX0) versions antérieures à V4.3
Siemens N/A Location Intelligence SUS Large (9DE5110-8CA13-1BX0) versions antérieures à V4.3
Siemens N/A SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions antérieures à V2.4
Siemens N/A SCALANCE SC626-2C (6GK5626-2GS00-2AC2) versions antérieures à V3.1
Siemens N/A Location Intelligence SUS Medium (9DE5110-8CA12-1BX0) versions antérieures à V4.3
Siemens N/A Tecnomatix Plant Simulation V2302 versions antérieures à V2302.0006
Siemens N/A Location Intelligence Perpetual Large (9DE5110-8CA13-1AX0) versions antérieures à V4.3
Siemens N/A SCALANCE SC622-2C (6GK5622-2GS00-2AC2) versions antérieures à V3.1
Siemens N/A Location Intelligence Perpetual Non-Prod (9DE5110-8CA10-1AX0) versions antérieures à V4.3
Siemens N/A Parasolid V35.0 versions antérieures à V35.0.263

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) versions ant\u00e9rieures \u00e0 V2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM332 (6GK5332-0GA01-2AC2) versions ant\u00e9rieures \u00e0 V2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) versions ant\u00e9rieures \u00e0 V2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Simcenter Femap versions ant\u00e9rieures \u00e0 V2401.0000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) versions ant\u00e9rieures \u00e0 V2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Parasolid V36.0 versions ant\u00e9rieures \u00e0 V36.0.198",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) versions ant\u00e9rieures \u00e0 V2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC646-2C (6GK5646-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) versions ant\u00e9rieures \u00e0 V2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) versions ant\u00e9rieures \u00e0 V2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC636-2C (6GK5636-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Location Intelligence SUS Small (9DE5110-8CA11-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V7.5 versions ant\u00e9rieures \u00e0 V7.5 SP2 Update 15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEC NMS versions ant\u00e9rieures \u00e0 V2.0 SP1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) versions ant\u00e9rieures \u00e0 V2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC V8.0 versions ant\u00e9rieures \u00e0 V8.0 SP4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIDIS Prime versions ant\u00e9rieures \u00e0 V4.0.400",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCH328 (6GK5328-4TS01-2EC2) versions ant\u00e9rieures \u00e0 V2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Location Intelligence Perpetual Small (9DE5110-8CA11-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC642-2C (6GK5642-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM324 (6GK5324-8TS01-2AC2) versions ant\u00e9rieures \u00e0 V2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Parasolid V35.1 versions ant\u00e9rieures \u00e0 V35.1.252",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Tecnomatix Plant Simulation V2201 versions ant\u00e9rieures \u00e0 V2201.0012",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 avec Nozomi Guardian / CMC ant\u00e9rieures \u00e0 23.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Location Intelligence Perpetual Medium (9DE5110-8CA12-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC632-2C (6GK5632-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Location Intelligence SUS Non-Prod (9DE5110-8CA10-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Location Intelligence SUS Large (9DE5110-8CA13-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XCM328 (6GK5328-4TS01-2AC2) versions ant\u00e9rieures \u00e0 V2.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC626-2C (6GK5626-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Location Intelligence SUS Medium (9DE5110-8CA12-1BX0) versions ant\u00e9rieures \u00e0 V4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Tecnomatix Plant Simulation V2302 versions ant\u00e9rieures \u00e0 V2302.0006",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Location Intelligence Perpetual Large (9DE5110-8CA13-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE SC622-2C (6GK5622-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Location Intelligence Perpetual Non-Prod (9DE5110-8CA10-1AX0) versions ant\u00e9rieures \u00e0 V4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Parasolid V35.0 versions ant\u00e9rieures \u00e0 V35.0.263",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-0216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
    },
    {
      "name": "CVE-2023-49691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49691"
    },
    {
      "name": "CVE-2022-46393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46393"
    },
    {
      "name": "CVE-2023-0401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
    },
    {
      "name": "CVE-2022-41556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41556"
    },
    {
      "name": "CVE-2023-3316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
    },
    {
      "name": "CVE-2023-3006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
    },
    {
      "name": "CVE-2023-51440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51440"
    },
    {
      "name": "CVE-2023-23946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23946"
    },
    {
      "name": "CVE-2023-28466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28466"
    },
    {
      "name": "CVE-2023-1838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
    },
    {
      "name": "CVE-2023-30772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30772"
    },
    {
      "name": "CVE-2023-45622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45622"
    },
    {
      "name": "CVE-2023-44321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44321"
    },
    {
      "name": "CVE-2022-29162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29162"
    },
    {
      "name": "CVE-2023-30585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30585"
    },
    {
      "name": "CVE-2024-23803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23803"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-44317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44317"
    },
    {
      "name": "CVE-2023-38199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38199"
    },
    {
      "name": "CVE-2022-36760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36760"
    },
    {
      "name": "CVE-2022-47629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
    },
    {
      "name": "CVE-2023-29404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
    },
    {
      "name": "CVE-2023-23454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
    },
    {
      "name": "CVE-2021-45451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45451"
    },
    {
      "name": "CVE-2022-26691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
    },
    {
      "name": "CVE-2022-4304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
    },
    {
      "name": "CVE-2023-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
    },
    {
      "name": "CVE-2023-30583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30583"
    },
    {
      "name": "CVE-2021-36369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36369"
    },
    {
      "name": "CVE-2023-25727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25727"
    },
    {
      "name": "CVE-2023-30086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
    },
    {
      "name": "CVE-2022-41409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
    },
    {
      "name": "CVE-2023-3390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3390"
    },
    {
      "name": "CVE-2023-0330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0330"
    },
    {
      "name": "CVE-2023-2002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2002"
    },
    {
      "name": "CVE-2024-23812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23812"
    },
    {
      "name": "CVE-2023-26965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
    },
    {
      "name": "CVE-2023-3817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
    },
    {
      "name": "CVE-2023-45617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45617"
    },
    {
      "name": "CVE-2023-31124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31124"
    },
    {
      "name": "CVE-2024-24925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24925"
    },
    {
      "name": "CVE-2022-45061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
    },
    {
      "name": "CVE-2024-22042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22042"
    },
    {
      "name": "CVE-2023-50236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50236"
    },
    {
      "name": "CVE-2022-23521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23521"
    },
    {
      "name": "CVE-2023-40283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
    },
    {
      "name": "CVE-2022-41715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
    },
    {
      "name": "CVE-2022-28739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
    },
    {
      "name": "CVE-2022-41903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41903"
    },
    {
      "name": "CVE-2023-23934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
    },
    {
      "name": "CVE-2022-4904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4904"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-35788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-32067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
    },
    {
      "name": "CVE-2024-23816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23816"
    },
    {
      "name": "CVE-2022-3515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
    },
    {
      "name": "CVE-2023-1393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1393"
    },
    {
      "name": "CVE-2006-20001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-20001"
    },
    {
      "name": "CVE-2022-36021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36021"
    },
    {
      "name": "CVE-2022-39189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
    },
    {
      "name": "CVE-2024-24922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24922"
    },
    {
      "name": "CVE-2022-38725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38725"
    },
    {
      "name": "CVE-2024-24923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24923"
    },
    {
      "name": "CVE-2022-39260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39260"
    },
    {
      "name": "CVE-2022-29862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29862"
    },
    {
      "name": "CVE-2024-23800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23800"
    },
    {
      "name": "CVE-2023-39417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39417"
    },
    {
      "name": "CVE-2023-28322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
    },
    {
      "name": "CVE-2023-29405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
    },
    {
      "name": "CVE-2022-3437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3437"
    },
    {
      "name": "CVE-2020-10735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
    },
    {
      "name": "CVE-2022-4743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4743"
    },
    {
      "name": "CVE-2023-1989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
    },
    {
      "name": "CVE-2022-28738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
    },
    {
      "name": "CVE-2023-1855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
    },
    {
      "name": "CVE-2023-3247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3247"
    },
    {
      "name": "CVE-2023-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
    },
    {
      "name": "CVE-2023-32559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
    },
    {
      "name": "CVE-2023-0494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0494"
    },
    {
      "name": "CVE-2023-35828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35828"
    },
    {
      "name": "CVE-2022-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37797"
    },
    {
      "name": "CVE-2022-32148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
    },
    {
      "name": "CVE-2022-4203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
    },
    {
      "name": "CVE-2020-1971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
    },
    {
      "name": "CVE-2023-31084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
    },
    {
      "name": "CVE-2023-3090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3090"
    },
    {
      "name": "CVE-2022-45919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
    },
    {
      "name": "CVE-2024-24921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24921"
    },
    {
      "name": "CVE-2023-28320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
    },
    {
      "name": "CVE-2023-45625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45625"
    },
    {
      "name": "CVE-2023-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
    },
    {
      "name": "CVE-2023-4128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
    },
    {
      "name": "CVE-2023-31436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
    },
    {
      "name": "CVE-2023-32558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32558"
    },
    {
      "name": "CVE-2023-2194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2194"
    },
    {
      "name": "CVE-2023-33203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
    },
    {
      "name": "CVE-2022-41861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41861"
    },
    {
      "name": "CVE-2024-23813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23813"
    },
    {
      "name": "CVE-2022-34918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
    },
    {
      "name": "CVE-2023-0217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
    },
    {
      "name": "CVE-2024-23802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23802"
    },
    {
      "name": "CVE-2021-43666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43666"
    },
    {
      "name": "CVE-2023-22490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22490"
    },
    {
      "name": "CVE-2023-0568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0568"
    },
    {
      "name": "CVE-2024-23798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23798"
    },
    {
      "name": "CVE-2023-28319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
    },
    {
      "name": "CVE-2023-32003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32003"
    },
    {
      "name": "CVE-2023-1859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1859"
    },
    {
      "name": "CVE-2023-48363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48363"
    },
    {
      "name": "CVE-2022-1015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1015"
    },
    {
      "name": "CVE-2023-32004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32004"
    },
    {
      "name": "CVE-2023-44320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44320"
    },
    {
      "name": "CVE-2022-29187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29187"
    },
    {
      "name": "CVE-2023-3111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3111"
    },
    {
      "name": "CVE-2023-28709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28709"
    },
    {
      "name": "CVE-2023-30587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30587"
    },
    {
      "name": "CVE-2023-30589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30589"
    },
    {
      "name": "CVE-2022-46392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46392"
    },
    {
      "name": "CVE-2023-28487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
    },
    {
      "name": "CVE-2023-1670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1670"
    },
    {
      "name": "CVE-2023-31489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31489"
    },
    {
      "name": "CVE-2023-32005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32005"
    },
    {
      "name": "CVE-2023-45618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45618"
    },
    {
      "name": "CVE-2023-20593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
    },
    {
      "name": "CVE-2024-23810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23810"
    },
    {
      "name": "CVE-2023-30582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30582"
    },
    {
      "name": "CVE-2023-23931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
    },
    {
      "name": "CVE-2022-41862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
    },
    {
      "name": "CVE-2019-19135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19135"
    },
    {
      "name": "CVE-2022-28737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28737"
    },
    {
      "name": "CVE-2023-31147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31147"
    },
    {
      "name": "CVE-2022-45142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45142"
    },
    {
      "name": "CVE-2023-22742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22742"
    },
    {
      "name": "CVE-2022-2586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
    },
    {
      "name": "CVE-2022-36227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
    },
    {
      "name": "CVE-2023-27522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27522"
    },
    {
      "name": "CVE-2022-37454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
    },
    {
      "name": "CVE-2022-48434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48434"
    },
    {
      "name": "CVE-2023-25155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25155"
    },
    {
      "name": "CVE-2023-0160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
    },
    {
      "name": "CVE-2023-5253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5253"
    },
    {
      "name": "CVE-2023-27535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
    },
    {
      "name": "CVE-2022-42919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
    },
    {
      "name": "CVE-2023-49125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49125"
    },
    {
      "name": "CVE-2021-3445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3445"
    },
    {
      "name": "CVE-2023-30581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30581"
    },
    {
      "name": "CVE-2023-45627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45627"
    },
    {
      "name": "CVE-2023-29406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
    },
    {
      "name": "CVE-2023-30584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30584"
    },
    {
      "name": "CVE-2024-23801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23801"
    },
    {
      "name": "CVE-2024-24924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24924"
    },
    {
      "name": "CVE-2022-4744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
    },
    {
      "name": "CVE-2023-35945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
    },
    {
      "name": "CVE-2023-36664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36664"
    },
    {
      "name": "CVE-2023-21255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21255"
    },
    {
      "name": "CVE-2023-1990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1990"
    },
    {
      "name": "CVE-2022-41717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
    },
    {
      "name": "CVE-2021-4037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
    },
    {
      "name": "CVE-2023-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
    },
    {
      "name": "CVE-2023-36617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
    },
    {
      "name": "CVE-2023-38559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38559"
    },
    {
      "name": "CVE-2023-35824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
    },
    {
      "name": "CVE-2023-45616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45616"
    },
    {
      "name": "CVE-2023-45624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45624"
    },
    {
      "name": "CVE-2023-45614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45614"
    },
    {
      "name": "CVE-2023-35823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
    },
    {
      "name": "CVE-2023-46120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46120"
    },
    {
      "name": "CVE-2023-30586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30586"
    },
    {
      "name": "CVE-2023-30588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30588"
    },
    {
      "name": "CVE-2023-1380",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
    },
    {
      "name": "CVE-2023-3776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
    },
    {
      "name": "CVE-2023-44319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44319"
    },
    {
      "name": "CVE-2022-2880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
    },
    {
      "name": "CVE-2024-23811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23811"
    },
    {
      "name": "CVE-2023-35789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35789"
    },
    {
      "name": "CVE-2023-25153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2024-22043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22043"
    },
    {
      "name": "CVE-2023-2650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
    },
    {
      "name": "CVE-2023-4194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4194"
    },
    {
      "name": "CVE-2023-39418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39418"
    },
    {
      "name": "CVE-2023-2454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
    },
    {
      "name": "CVE-2023-27534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
    },
    {
      "name": "CVE-2023-27536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
    },
    {
      "name": "CVE-2023-2269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2269"
    },
    {
      "name": "CVE-2022-29154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
    },
    {
      "name": "CVE-2023-27533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
    },
    {
      "name": "CVE-2023-26081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26081"
    },
    {
      "name": "CVE-2022-34903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
    },
    {
      "name": "CVE-2023-44322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44322"
    },
    {
      "name": "CVE-2023-32573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
    },
    {
      "name": "CVE-2023-34969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
    },
    {
      "name": "CVE-2023-45619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45619"
    },
    {
      "name": "CVE-2023-48364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48364"
    },
    {
      "name": "CVE-2023-3863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3863"
    },
    {
      "name": "CVE-2022-24834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24834"
    },
    {
      "name": "CVE-2023-30590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30590"
    },
    {
      "name": "CVE-2023-27538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
    },
    {
      "name": "CVE-2023-36054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
    },
    {
      "name": "CVE-2022-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
    },
    {
      "name": "CVE-2023-25690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25690"
    },
    {
      "name": "CVE-2022-1348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1348"
    },
    {
      "name": "CVE-2023-2861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2861"
    },
    {
      "name": "CVE-2023-25588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
    },
    {
      "name": "CVE-2023-1255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
    },
    {
      "name": "CVE-2023-3141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
    },
    {
      "name": "CVE-2023-34872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34872"
    },
    {
      "name": "CVE-2023-30456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
    },
    {
      "name": "CVE-2023-0567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0567"
    },
    {
      "name": "CVE-2024-23799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23799"
    },
    {
      "name": "CVE-2021-3638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3638"
    },
    {
      "name": "CVE-2023-34256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34256"
    },
    {
      "name": "CVE-2024-23796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23796"
    },
    {
      "name": "CVE-2022-4415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
    },
    {
      "name": "CVE-2023-2455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
    },
    {
      "name": "CVE-2023-3301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3301"
    },
    {
      "name": "CVE-2023-0662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0662"
    },
    {
      "name": "CVE-2023-3212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
    },
    {
      "name": "CVE-2023-35001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
    },
    {
      "name": "CVE-2022-44370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44370"
    },
    {
      "name": "CVE-2023-45620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45620"
    },
    {
      "name": "CVE-2023-34035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34035"
    },
    {
      "name": "CVE-2022-41860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41860"
    },
    {
      "name": "CVE-2024-23795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23795"
    },
    {
      "name": "CVE-2023-45615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45615"
    },
    {
      "name": "CVE-2022-29536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29536"
    },
    {
      "name": "CVE-2023-49692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49692"
    },
    {
      "name": "CVE-2022-23471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
    },
    {
      "name": "CVE-2020-1967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1967"
    },
    {
      "name": "CVE-2023-22745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22745"
    },
    {
      "name": "CVE-2022-3294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3294"
    },
    {
      "name": "CVE-2023-32006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
    },
    {
      "name": "CVE-2023-24538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
    },
    {
      "name": "CVE-2023-2975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
    },
    {
      "name": "CVE-2023-45621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45621"
    },
    {
      "name": "CVE-2024-23804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23804"
    },
    {
      "name": "CVE-2022-41723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
    },
    {
      "name": "CVE-2020-11896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11896"
    },
    {
      "name": "CVE-2023-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
    },
    {
      "name": "CVE-2023-44373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44373"
    },
    {
      "name": "CVE-2023-41080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41080"
    },
    {
      "name": "CVE-2023-45626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45626"
    },
    {
      "name": "CVE-2023-1206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
    },
    {
      "name": "CVE-2022-37436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37436"
    },
    {
      "name": "CVE-2024-23797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23797"
    },
    {
      "name": "CVE-2023-29402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
    },
    {
      "name": "CVE-2023-31130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
    },
    {
      "name": "CVE-2023-32233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32233"
    },
    {
      "name": "CVE-2023-38039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
    },
    {
      "name": "CVE-2023-29409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
    },
    {
      "name": "CVE-2023-0590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2023-1611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1611"
    },
    {
      "name": "CVE-2023-28486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
    },
    {
      "name": "CVE-2024-24920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24920"
    },
    {
      "name": "CVE-2023-3268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
    },
    {
      "name": "CVE-2023-0361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
    },
    {
      "name": "CVE-2023-27537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
    },
    {
      "name": "CVE-2023-45623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45623"
    },
    {
      "name": "CVE-2023-32002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
    },
    {
      "name": "CVE-2022-4900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4900"
    },
    {
      "name": "CVE-2023-2124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2124"
    },
    {
      "name": "CVE-2022-48303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
    },
    {
      "name": "CVE-2023-38545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
    },
    {
      "name": "CVE-2023-28450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28450"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0119",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance,\nune \u00e9l\u00e9vation de privil\u00e8ges et une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-000072 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-000072.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-602936 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-647068 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-647068.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-943925 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-943925.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-753746 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-753746.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-806742 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-806742.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-580228 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-580228.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-716164 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-716164.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-797296 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-797296.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-108696 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-108696.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-871717 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-871717.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-516818 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-516818.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-017796 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-017796.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-543502 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-543502.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-665034 du 13 f\u00e9vrier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-665034.html"
    }
  ]
}

CERTFR-2024-AVI-0014

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A Spectrum Power 7 versions antérieures à V23Q4
Siemens N/A CP-8050 MASTER MODULE (6MF2805-0AA00) versions antérieures à CPCI85 V05.20
Siemens N/A Teamcenter Visualization versions V14.2 antérieures à V14.2.0.9
Siemens N/A JT2Go versions antérieures à V14.3.0.6
Siemens N/A Teamcenter Visualization versions V14.1 antérieures à V14.1.0.12
Siemens N/A SIMATIC IPC647E avec maxView Storage Manager versions antérieures à V4.14.00.26068 sur Windows
Siemens N/A SIMATIC IPC847E avec maxView Storage Manager versions antérieures à V4.14.00.26068 sur Windows
Siemens N/A SIMATIC CN 4100 versions antérieures à V2.7
Siemens N/A SIMATIC IPC1047E avec maxView Storage Manager versions antérieures à V4.14.00.26068 sur Windows
Siemens N/A CP-8031 MASTER MODULE (6MF2803-1AA00) versions antérieures à CPCI85 V05.20
Siemens N/A Teamcenter Visualization versions V14.3 antérieures à V14.3.0.6
Siemens N/A Teamcenter Visualization versions V13.3 antérieures à V13.3.0.13
Siemens N/A Solid Edge SE2023 versions antérieures à V223.0 Update 10

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Spectrum Power 7 versions ant\u00e9rieures \u00e0 V23Q4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "CP-8050 MASTER MODULE (6MF2805-0AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05.20",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization versions V14.2 ant\u00e9rieures \u00e0 V14.2.0.9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "JT2Go versions ant\u00e9rieures \u00e0 V14.3.0.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization versions V14.1 ant\u00e9rieures \u00e0 V14.1.0.12",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC647E avec maxView Storage Manager versions ant\u00e9rieures \u00e0 V4.14.00.26068 sur Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC847E avec maxView Storage Manager versions ant\u00e9rieures \u00e0 V4.14.00.26068 sur Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CN 4100 versions ant\u00e9rieures \u00e0 V2.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC IPC1047E avec maxView Storage Manager versions ant\u00e9rieures \u00e0 V4.14.00.26068 sur Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "CP-8031 MASTER MODULE (6MF2803-1AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05.20",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization versions V14.3 ant\u00e9rieures \u00e0 V14.3.0.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization versions V13.3 ant\u00e9rieures \u00e0 V13.3.0.13",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Solid Edge SE2023 versions ant\u00e9rieures \u00e0 V223.0 Update 10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-49252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49252"
    },
    {
      "name": "CVE-2023-49123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49123"
    },
    {
      "name": "CVE-2023-42797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42797"
    },
    {
      "name": "CVE-2023-49132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49132"
    },
    {
      "name": "CVE-2023-51744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51744"
    },
    {
      "name": "CVE-2023-49251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49251"
    },
    {
      "name": "CVE-2023-51438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51438"
    },
    {
      "name": "CVE-2023-49122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49122"
    },
    {
      "name": "CVE-2023-51746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51746"
    },
    {
      "name": "CVE-2023-51439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51439"
    },
    {
      "name": "CVE-2023-51745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51745"
    },
    {
      "name": "CVE-2023-49124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49124"
    },
    {
      "name": "CVE-2023-49130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49130"
    },
    {
      "name": "CVE-2023-49131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49131"
    },
    {
      "name": "CVE-2023-49129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49129"
    },
    {
      "name": "CVE-2023-44120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44120"
    },
    {
      "name": "CVE-2023-49621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49621"
    },
    {
      "name": "CVE-2023-49126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49126"
    },
    {
      "name": "CVE-2023-49121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49121"
    },
    {
      "name": "CVE-2023-49127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49127"
    },
    {
      "name": "CVE-2023-49128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49128"
    }
  ],
  "links": [],
  "reference": "CERTFR-2024-AVI-0014",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-01-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-777015 du 09 janvier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-777015.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-794653 du 09 janvier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-794653.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-583634 du 09 janvier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-583634.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-702935 du 09 janvier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-702935.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-589891 du 09 janvier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-589891.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-786191 du 09 janvier 2024",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-786191.html"
    }
  ]
}

CERTFR-2023-AVI-1015

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions
Siemens N/A SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) toutes versions
Siemens N/A SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions antérieures à V8.0
Siemens N/A SIMATIC CP 1243-7 LTE toutes versions
Siemens N/A SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions antérieures à V8.0
Siemens N/A SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions antérieures à V3.1.0
Siemens N/A SINAMICS S210 (6SL5...) versions supérieures ou égales àV6.1 versions antérieures à V6.1 HF2
Siemens N/A SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions antérieures à V3.1.0
Siemens N/A SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0) toutes versions
Siemens N/A SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions antérieures à V7.2.2
Siemens N/A RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions antérieures à V7.2.2
Siemens N/A SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions antérieures à V7.2.2
Siemens N/A SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP01-0AB0) versions antérieures à V3.1.0
Siemens N/A SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) toutes versions
Siemens N/A SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions antérieures à V3.1.0
Siemens N/A LOGO! 230RCEo (6ED1052-2FB08-0BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A LOGO! 230RCE (6ED1052-1FB08-0BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M804PB (6GK5804-0AP00-2AA2) versions antérieures à V8.0
Siemens N/A SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions antérieures à V8.0
Siemens N/A SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions antérieures à V8.0
Siemens N/A SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) toutes versions
Siemens N/A SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions antérieures à V3.1.0
Siemens N/A SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CL03-0AB0) versions antérieures à V3.1.0
Siemens N/A LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A LOGO! 12/24RCE (6ED1052-1MD08-0BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions antérieures à V7.2.2
Siemens N/A SCALANCE M804PB (6GK5804-0AP00-2AA2) versions antérieures à V7.2.2
Siemens N/A SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions antérieures à V8.0
Siemens N/A Opcenter Quality toutes versions
Siemens N/A SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions antérieures à V3.1.0
Siemens N/A SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0) toutes versions
Siemens N/A RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions antérieures à V8.0
Siemens N/A SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0) toutes versions
Siemens N/A SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions antérieures à V3.1.0
Siemens N/A SCALANCE S615 (6GK5615-0AA00-2AA2) versions antérieures à V7.2.2
Siemens N/A SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions antérieures à V7.2.2
Siemens N/A RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions antérieures à V8.0
Siemens N/A SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions antérieures à V3.1.0
Siemens N/A SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions antérieures à V7.2.2
Siemens N/A SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions antérieures à V3.1.0
Siemens N/A LOGO! 24CE (6ED1052-1CC08-0BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions antérieures à V8.0
Siemens N/A SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions antérieures à V7.2.2
Siemens N/A SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions antérieures à V3.1.0
Siemens N/A SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0) toutes versions
Siemens N/A SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions antérieures à V3.1.0
Siemens N/A SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions antérieures à V7.2.2
Siemens N/A SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions antérieures à V3.1.0
Siemens N/A SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions antérieures à V3.1.0
Siemens N/A SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions antérieures à V8.0
Siemens N/A SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions antérieures à V8.0
Siemens N/A SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions antérieures à V8.0
Siemens N/A SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions antérieures à V3.1.0
Siemens N/A LOGO! 24CEo (6ED1052-2CC08-0BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions antérieures à V7.2.2
Siemens N/A SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M876-4 (6GK5876-4AA10-2BA2) toutes versions
Siemens N/A SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions antérieures à V8.0
Siemens N/A SINEC INS versions antérieures à V1.0 SP2 Update 2
Siemens N/A SIMATIC PC-Station Plus toutes versions
Siemens N/A SINAMICS S210 (6SL5...) versions supérieures à V6.1 et antérieure à V6.1 HF2
Siemens N/A SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions antérieures à V7.2.2
Siemens N/A SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions
Siemens N/A SIMATIC PCS neo versions antérieures à V4.1
Siemens N/A SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions
Siemens N/A SINUMERIK ONE toutes versions
Siemens N/A SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions
Siemens N/A SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions
Siemens N/A SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) toutes versions
Siemens N/A RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) toutes versions
Siemens N/A SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) toutes versions
Siemens N/A SINUMERIK MC toutes versions
Siemens N/A SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions antérieures à V3.1.0
Siemens N/A POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) versions antérieures à V2.60
Siemens N/A SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions antérieures à V8.0
Siemens N/A SINAMICS S120 (incl. SIPLUS variants) versions antérieures à V5.2 SP3 HF15
Siemens N/A SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions antérieures à V3.1.0
Siemens N/A Totally Integrated Automation Portal (TIA Portal) versions V14 à V18 antérieures à V18 Update 3
Siemens N/A SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions antérieures à V3.1.0
Siemens N/A SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions antérieures à V7.2.2
Siemens N/A SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0) toutes versions
Siemens N/A SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions antérieures à V3.1.0
Siemens N/A SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0) toutes versions
Siemens N/A SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions antérieures à V8.0
Siemens N/A SCALANCE S615 (6GK5615-0AA00-2AA2) versions antérieures à V8.0
Siemens N/A SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions antérieures à V8.0
Siemens N/A POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) versions antérieures à V2.60
Siemens N/A SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0) toutes versions
Siemens N/A SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions antérieures à V3.1.0
Siemens N/A SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions antérieures à V7.2.2
Siemens N/A SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions antérieures à V7.2.2
Siemens N/A SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions antérieures à V8.0
Siemens N/A LOGO! 24RCE (6ED1052-1HB08-0BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions antérieures à V8.0
Siemens N/A SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) toutes versions
Siemens N/A RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions antérieures à V7.2.2
Siemens N/A SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions antérieures à V7.2.2
Siemens N/A SIMATIC STEP 7 (TIA Portal) versions antérieures à V19
Siemens N/A LOGO! 24RCEo (6ED1052-2HB08-0BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SINUMERIK Integrate RunMyHMI /Automotive toutes versions
Siemens N/A SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions
Siemens N/A SCALANCE S615 (6GK5615-0AA00-2AA2) toutes versions
Siemens N/A SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) toutes versions
Siemens N/A SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions
Siemens N/A SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) toutes versions
Siemens N/A SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions antérieures à V3.1.0
Siemens N/A SIMATIC S7-PLCSIM Advanced versions antérieures à V6.0
Siemens N/A SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions antérieures à V3.1.0
Siemens N/A SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions antérieures à V7.2.2
Siemens N/A SCALANCE S615 EEC (6GK5615-0AA01-2AA2) toutes versions
Siemens N/A SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) toutes versions supérieures ou égales à V8.3
Siemens N/A SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions antérieures à V7.2.2
Siemens N/A SIMATIC CP 1243-1 (incl. SIPLUS variants) toutes versions
Siemens N/A SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions antérieures à V7.2.2
Siemens N/A SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions antérieures à V3.1.0
Siemens N/A SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CM03-0AB0) versions antérieures à V3.1.0
Siemens N/A SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions antérieures à V8.0
Siemens N/A SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) toutes versions
Siemens N/A RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) toutes versions
Siemens N/A SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions
Siemens N/A SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions
Siemens N/A SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) toutes versions
Siemens N/A SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions
Siemens N/A SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) toutes versions

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-7 LTE toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINAMICS S210 (6SL5...) versions sup\u00e9rieures ou \u00e9gales \u00e0V6.1 versions ant\u00e9rieures \u00e0 V6.1 HF2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP01-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "LOGO! 230RCEo (6ED1052-2FB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "LOGO! 230RCE (6ED1052-1FB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "LOGO! 12/24RCE (6ED1052-1MD08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Opcenter Quality toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "LOGO! 24CE (6ED1052-1CC08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "LOGO! 24CEo (6ED1052-2CC08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEC INS versions ant\u00e9rieures \u00e0 V1.0 SP2 Update 2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PC-Station Plus toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINAMICS S210 (6SL5...) versions sup\u00e9rieures \u00e0 V6.1 et ant\u00e9rieure \u00e0 V6.1 HF2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-2 (6GK5874-2AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo versions ant\u00e9rieures \u00e0 V4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINUMERIK ONE toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINUMERIK MC toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) versions ant\u00e9rieures \u00e0 V2.60",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINAMICS S120 (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 V5.2 SP3 HF15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Totally Integrated Automation Portal (TIA Portal) versions V14 \u00e0 V18 ant\u00e9rieures \u00e0 V18 Update 3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) versions ant\u00e9rieures \u00e0 V2.60",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "LOGO! 24RCE (6ED1052-1HB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC STEP 7 (TIA Portal) versions ant\u00e9rieures \u00e0 V19",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "LOGO! 24RCEo (6ED1052-2HB08-0BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINUMERIK Integrate RunMyHMI /Automotive toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M804PB (6GK5804-0AP00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 (6GK5615-0AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-PLCSIM Advanced versions ant\u00e9rieures \u00e0 V6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) toutes versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE S615 EEC (6GK5615-0AA01-2AA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-1 (incl. SIPLUS variants) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) versions ant\u00e9rieures \u00e0 V7.2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CM03-0AB0) versions ant\u00e9rieures \u00e0 V3.1.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) versions ant\u00e9rieures \u00e0 V8.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M874-3 (6GK5874-3AA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2016-5131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
    },
    {
      "name": "CVE-2016-4658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
    },
    {
      "name": "CVE-2017-7375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
    },
    {
      "name": "CVE-2017-7376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
    },
    {
      "name": "CVE-2017-0663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-0663"
    },
    {
      "name": "CVE-2017-9047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
    },
    {
      "name": "CVE-2017-9048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9048"
    },
    {
      "name": "CVE-2017-16931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
    },
    {
      "name": "CVE-2017-9050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9050"
    },
    {
      "name": "CVE-2017-18258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
    },
    {
      "name": "CVE-2017-9049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9049"
    },
    {
      "name": "CVE-2017-16932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
    },
    {
      "name": "CVE-2016-9318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
    },
    {
      "name": "CVE-2018-0495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
    },
    {
      "name": "CVE-2019-6111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-6111"
    },
    {
      "name": "CVE-2019-3855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3855"
    },
    {
      "name": "CVE-2019-3856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3856"
    },
    {
      "name": "CVE-2019-3863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3863"
    },
    {
      "name": "CVE-2019-3857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3857"
    },
    {
      "name": "CVE-2019-8457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-8457"
    },
    {
      "name": "CVE-2019-5443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-5443"
    },
    {
      "name": "CVE-2019-6109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-6109"
    },
    {
      "name": "CVE-2019-15903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
    },
    {
      "name": "CVE-2019-3859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3859"
    },
    {
      "name": "CVE-2019-3861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3861"
    },
    {
      "name": "CVE-2019-3860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3860"
    },
    {
      "name": "CVE-2019-3858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3858"
    },
    {
      "name": "CVE-2019-3862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3862"
    },
    {
      "name": "CVE-2019-13565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
    },
    {
      "name": "CVE-2019-13057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13057"
    },
    {
      "name": "CVE-2019-9636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
    },
    {
      "name": "CVE-2019-16168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16168"
    },
    {
      "name": "CVE-2019-19926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19926"
    },
    {
      "name": "CVE-2019-19925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19925"
    },
    {
      "name": "CVE-2019-19880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19880"
    },
    {
      "name": "CVE-2019-19923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19923"
    },
    {
      "name": "CVE-2019-5018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-5018"
    },
    {
      "name": "CVE-2019-9936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9936"
    },
    {
      "name": "CVE-2019-5482",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-5482"
    },
    {
      "name": "CVE-2019-19646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19646"
    },
    {
      "name": "CVE-2020-7595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-7595"
    },
    {
      "name": "CVE-2020-8169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8169"
    },
    {
      "name": "CVE-2020-11656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
    },
    {
      "name": "CVE-2019-19906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
    },
    {
      "name": "CVE-2020-14145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
    },
    {
      "name": "CVE-2019-9937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9937"
    },
    {
      "name": "CVE-2019-12900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
    },
    {
      "name": "CVE-2018-20843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
    },
    {
      "name": "CVE-2020-13631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13631"
    },
    {
      "name": "CVE-2020-13435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13435"
    },
    {
      "name": "CVE-2020-13434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
    },
    {
      "name": "CVE-2020-15358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
    },
    {
      "name": "CVE-2020-13630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13630"
    },
    {
      "name": "CVE-2020-25709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25709"
    },
    {
      "name": "CVE-2021-3177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
    },
    {
      "name": "CVE-2019-25013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
    },
    {
      "name": "CVE-2019-19956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19956"
    },
    {
      "name": "CVE-2020-28196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
    },
    {
      "name": "CVE-2020-8285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
    },
    {
      "name": "CVE-2020-8286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
    },
    {
      "name": "CVE-2020-36221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
    },
    {
      "name": "CVE-2020-36224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
    },
    {
      "name": "CVE-2020-36222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
    },
    {
      "name": "CVE-2020-36227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
    },
    {
      "name": "CVE-2020-36225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
    },
    {
      "name": "CVE-2020-36228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
    },
    {
      "name": "CVE-2020-36223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
    },
    {
      "name": "CVE-2020-36229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
    },
    {
      "name": "CVE-2020-36226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
    },
    {
      "name": "CVE-2020-36230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
    },
    {
      "name": "CVE-2020-10531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
    },
    {
      "name": "CVE-2021-28363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28363"
    },
    {
      "name": "CVE-2020-8284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
    },
    {
      "name": "CVE-2020-10878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
    },
    {
      "name": "CVE-2021-23336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
    },
    {
      "name": "CVE-2021-22901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
    },
    {
      "name": "CVE-2019-17543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17543"
    },
    {
      "name": "CVE-2021-3518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
    },
    {
      "name": "CVE-2020-13632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13632"
    },
    {
      "name": "CVE-2020-11655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11655"
    },
    {
      "name": "CVE-2019-19645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19645"
    },
    {
      "name": "CVE-2019-20907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
    },
    {
      "name": "CVE-2020-10543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
    },
    {
      "name": "CVE-2020-12723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
    },
    {
      "name": "CVE-2021-20305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
    },
    {
      "name": "CVE-2019-20388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20388"
    },
    {
      "name": "CVE-2020-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
    },
    {
      "name": "CVE-2020-29573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
    },
    {
      "name": "CVE-2020-10029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
    },
    {
      "name": "CVE-2019-5188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
    },
    {
      "name": "CVE-2019-5094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
    },
    {
      "name": "CVE-2020-8177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
    },
    {
      "name": "CVE-2013-0340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
    },
    {
      "name": "CVE-2021-33910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
    },
    {
      "name": "CVE-2021-27219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
    },
    {
      "name": "CVE-2021-27218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
    },
    {
      "name": "CVE-2019-18276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
    },
    {
      "name": "CVE-2020-24977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
    },
    {
      "name": "CVE-2021-3520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
    },
    {
      "name": "CVE-2020-29362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
    },
    {
      "name": "CVE-2019-9169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
    },
    {
      "name": "CVE-2020-29363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
    },
    {
      "name": "CVE-2021-3517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
    },
    {
      "name": "CVE-2020-13776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
    },
    {
      "name": "CVE-2020-26116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
    },
    {
      "name": "CVE-2020-25692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
    },
    {
      "name": "CVE-2016-10228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
    },
    {
      "name": "CVE-2020-29361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
    },
    {
      "name": "CVE-2021-3541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
    },
    {
      "name": "CVE-2021-3326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
    },
    {
      "name": "CVE-2020-8231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
    },
    {
      "name": "CVE-2020-8492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
    },
    {
      "name": "CVE-2021-3516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
    },
    {
      "name": "CVE-2021-3537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
    },
    {
      "name": "CVE-2020-8315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
    },
    {
      "name": "CVE-2020-27618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
    },
    {
      "name": "CVE-2021-22926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
    },
    {
      "name": "CVE-2021-20227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
    },
    {
      "name": "CVE-2021-36222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
    },
    {
      "name": "CVE-2021-22947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
    },
    {
      "name": "CVE-2021-22945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
    },
    {
      "name": "CVE-2021-22946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
    },
    {
      "name": "CVE-2020-13871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13871"
    },
    {
      "name": "CVE-2021-3737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
    },
    {
      "name": "CVE-2021-3733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
    },
    {
      "name": "CVE-2022-45061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
    },
    {
      "name": "CVE-2022-40674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
    },
    {
      "name": "CVE-2022-37434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
    },
    {
      "name": "CVE-2022-43680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
    },
    {
      "name": "CVE-2022-29824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
    },
    {
      "name": "CVE-2022-23308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
    },
    {
      "name": "CVE-2022-35737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
    },
    {
      "name": "CVE-2022-40303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
    },
    {
      "name": "CVE-2022-40304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
    },
    {
      "name": "CVE-2019-9948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
    },
    {
      "name": "CVE-2022-42898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
    },
    {
      "name": "CVE-2019-6110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-6110"
    },
    {
      "name": "CVE-2022-32205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
    },
    {
      "name": "CVE-2019-16905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16905"
    },
    {
      "name": "CVE-2022-32206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
    },
    {
      "name": "CVE-2018-25032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
    },
    {
      "name": "CVE-2022-46143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46143"
    },
    {
      "name": "CVE-2022-23990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
    },
    {
      "name": "CVE-2021-45960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
    },
    {
      "name": "CVE-2022-22827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
    },
    {
      "name": "CVE-2022-22825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
    },
    {
      "name": "CVE-2022-22822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22822"
    },
    {
      "name": "CVE-2022-22824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
    },
    {
      "name": "CVE-2021-46143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46143"
    },
    {
      "name": "CVE-2022-22826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
    },
    {
      "name": "CVE-2022-23852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
    },
    {
      "name": "CVE-2022-22823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
    },
    {
      "name": "CVE-2019-5436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-5436"
    },
    {
      "name": "CVE-2022-25313",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25313"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2022-25315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25315"
    },
    {
      "name": "CVE-2022-25235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25235"
    },
    {
      "name": "CVE-2019-19603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19603"
    },
    {
      "name": "CVE-2021-22890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22890"
    },
    {
      "name": "CVE-2021-22876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22876"
    },
    {
      "name": "CVE-2019-19317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19317"
    },
    {
      "name": "CVE-2019-19924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19924"
    },
    {
      "name": "CVE-2021-22924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
    },
    {
      "name": "CVE-2021-22897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
    },
    {
      "name": "CVE-2020-9327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-9327"
    },
    {
      "name": "CVE-2021-22925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
    },
    {
      "name": "CVE-2021-22923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
    },
    {
      "name": "CVE-2019-19242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19242"
    },
    {
      "name": "CVE-2021-22898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
    },
    {
      "name": "CVE-2021-22922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
    },
    {
      "name": "CVE-2019-19244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19244"
    },
    {
      "name": "CVE-2021-41617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
    },
    {
      "name": "CVE-2022-0391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
    },
    {
      "name": "CVE-2022-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
    },
    {
      "name": "CVE-2018-14404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
    },
    {
      "name": "CVE-2019-9947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
    },
    {
      "name": "CVE-2019-9740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
    },
    {
      "name": "CVE-2019-10160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
    },
    {
      "name": "CVE-2019-16056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
    },
    {
      "name": "CVE-2020-12762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
    },
    {
      "name": "CVE-2019-17594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17594"
    },
    {
      "name": "CVE-2019-17595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17595"
    },
    {
      "name": "CVE-2021-20231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20231"
    },
    {
      "name": "CVE-2021-36085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36085"
    },
    {
      "name": "CVE-2021-36084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36084"
    },
    {
      "name": "CVE-2021-20232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20232"
    },
    {
      "name": "CVE-2021-36086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36086"
    },
    {
      "name": "CVE-2021-3580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3580"
    },
    {
      "name": "CVE-2021-36087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36087"
    },
    {
      "name": "CVE-2021-33560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33560"
    },
    {
      "name": "CVE-2021-28153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28153"
    },
    {
      "name": "CVE-2022-1434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2022-1343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2022-29155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
    },
    {
      "name": "CVE-2022-25314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25314"
    },
    {
      "name": "CVE-2021-4122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
    },
    {
      "name": "CVE-2022-27774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
    },
    {
      "name": "CVE-2022-27775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
    },
    {
      "name": "CVE-2022-22576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
    },
    {
      "name": "CVE-2022-27776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
    },
    {
      "name": "CVE-2022-2068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
    },
    {
      "name": "CVE-2022-2274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2274"
    },
    {
      "name": "CVE-2022-2097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
    },
    {
      "name": "CVE-2020-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25710"
    },
    {
      "name": "CVE-2022-24407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
    },
    {
      "name": "CVE-2018-14567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-14567"
    },
    {
      "name": "CVE-2021-33574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
    },
    {
      "name": "CVE-2021-36690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
    },
    {
      "name": "CVE-2021-37750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
    },
    {
      "name": "CVE-2022-27778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27778"
    },
    {
      "name": "CVE-2021-3999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
    },
    {
      "name": "CVE-2022-23218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
    },
    {
      "name": "CVE-2022-23219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
    },
    {
      "name": "CVE-2022-27782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
    },
    {
      "name": "CVE-2022-26488",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
    },
    {
      "name": "CVE-2022-32208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
    },
    {
      "name": "CVE-2022-27781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
    },
    {
      "name": "CVE-2022-32207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2019-18348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18348"
    },
    {
      "name": "CVE-2020-15523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15523"
    },
    {
      "name": "CVE-2021-4189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
    },
    {
      "name": "CVE-2022-37454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
    },
    {
      "name": "CVE-2020-10735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
    },
    {
      "name": "CVE-2022-32221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
    },
    {
      "name": "CVE-2020-15778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
    },
    {
      "name": "CVE-2022-42916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
    },
    {
      "name": "CVE-2022-35260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35260"
    },
    {
      "name": "CVE-2022-35252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
    },
    {
      "name": "CVE-2022-42915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
    },
    {
      "name": "CVE-2022-43551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
    },
    {
      "name": "CVE-2022-43552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
    },
    {
      "name": "CVE-2023-25136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25136"
    },
    {
      "name": "CVE-2022-4304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2015-20107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
    },
    {
      "name": "CVE-2022-45873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
    },
    {
      "name": "CVE-2022-3821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
    },
    {
      "name": "CVE-2023-23915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
    },
    {
      "name": "CVE-2023-23914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
    },
    {
      "name": "CVE-2023-23916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
    },
    {
      "name": "CVE-2018-12886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-12886"
    },
    {
      "name": "CVE-2022-1304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
    },
    {
      "name": "CVE-2023-24329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
    },
    {
      "name": "CVE-2023-0464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
    },
    {
      "name": "CVE-2023-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
    },
    {
      "name": "CVE-2023-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
    },
    {
      "name": "CVE-2021-46828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
    },
    {
      "name": "CVE-2023-1077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
    },
    {
      "name": "CVE-2023-29469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
    },
    {
      "name": "CVE-2023-28484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
    },
    {
      "name": "CVE-2023-2650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
    },
    {
      "name": "CVE-2023-27535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
    },
    {
      "name": "CVE-2022-27779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
    },
    {
      "name": "CVE-2023-27533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
    },
    {
      "name": "CVE-2023-27538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
    },
    {
      "name": "CVE-2023-27534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
    },
    {
      "name": "CVE-2023-27536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
    },
    {
      "name": "CVE-2022-27780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
    },
    {
      "name": "CVE-2022-30115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
    },
    {
      "name": "CVE-2023-27537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
    },
    {
      "name": "CVE-2020-1752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
    },
    {
      "name": "CVE-2021-35942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
    },
    {
      "name": "CVE-2021-38604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
    },
    {
      "name": "CVE-2023-31238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31238"
    },
    {
      "name": "CVE-2020-29562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
    },
    {
      "name": "CVE-2021-27645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
    },
    {
      "name": "CVE-2023-30901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30901"
    },
    {
      "name": "CVE-2021-3998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
    },
    {
      "name": "CVE-2019-20218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20218"
    },
    {
      "name": "CVE-2020-35527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35527"
    },
    {
      "name": "CVE-2016-3189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
    },
    {
      "name": "CVE-2019-19959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19959"
    },
    {
      "name": "CVE-2020-35525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35525"
    },
    {
      "name": "CVE-2022-46908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
    },
    {
      "name": "CVE-2021-31239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
    },
    {
      "name": "CVE-2016-3709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-3709"
    },
    {
      "name": "CVE-2021-28861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
    },
    {
      "name": "CVE-2023-3212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
    },
    {
      "name": "CVE-2023-0361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2023-38408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
    },
    {
      "name": "CVE-2023-35001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35001"
    },
    {
      "name": "CVE-2023-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
    },
    {
      "name": "CVE-2023-3817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
    },
    {
      "name": "CVE-2023-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
    },
    {
      "name": "CVE-2023-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
    },
    {
      "name": "CVE-2023-34319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34319"
    },
    {
      "name": "CVE-2023-1206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
    },
    {
      "name": "CVE-2023-40283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
    },
    {
      "name": "CVE-2023-28831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28831"
    },
    {
      "name": "CVE-2023-3772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
    },
    {
      "name": "CVE-2023-4911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
    },
    {
      "name": "CVE-2023-4623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2023-4921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
    },
    {
      "name": "CVE-2023-39192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39192"
    },
    {
      "name": "CVE-2023-39193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39193"
    },
    {
      "name": "CVE-2023-42754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42754"
    },
    {
      "name": "CVE-2023-39194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39194"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-38545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
    },
    {
      "name": "CVE-2023-42755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42755"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-45853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
    },
    {
      "name": "CVE-2023-31085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
    },
    {
      "name": "CVE-2023-39189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39189"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-44321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44321"
    },
    {
      "name": "CVE-2023-44374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44374"
    },
    {
      "name": "CVE-2023-44320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44320"
    },
    {
      "name": "CVE-2023-44319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44319"
    },
    {
      "name": "CVE-2023-44317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44317"
    },
    {
      "name": "CVE-2023-44318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44318"
    },
    {
      "name": "CVE-2023-44373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44373"
    },
    {
      "name": "CVE-2023-44322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44322"
    },
    {
      "name": "CVE-2020-22218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
    },
    {
      "name": "CVE-2023-4527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
    },
    {
      "name": "CVE-2023-4813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2022-48303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
    },
    {
      "name": "CVE-2021-3426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
    },
    {
      "name": "CVE-2023-5717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
    },
    {
      "name": "CVE-2023-45871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
    },
    {
      "name": "CVE-2020-19186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19186"
    },
    {
      "name": "CVE-2020-19190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19190"
    },
    {
      "name": "CVE-2020-19185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19185"
    },
    {
      "name": "CVE-2020-19189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
    },
    {
      "name": "CVE-2020-19187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19187"
    },
    {
      "name": "CVE-2020-19188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19188"
    },
    {
      "name": "CVE-2020-19909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
    },
    {
      "name": "CVE-2019-11360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-11360"
    },
    {
      "name": "CVE-2019-13627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13627"
    },
    {
      "name": "CVE-2019-7309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7309"
    },
    {
      "name": "CVE-2022-0563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
    },
    {
      "name": "CVE-2019-1010024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1010024"
    },
    {
      "name": "CVE-2022-47375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47375"
    },
    {
      "name": "CVE-2019-19126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-19126"
    },
    {
      "name": "CVE-2023-46283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46283"
    },
    {
      "name": "CVE-2023-46282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46282"
    },
    {
      "name": "CVE-2023-32643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
    },
    {
      "name": "CVE-2014-7209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-7209"
    },
    {
      "name": "CVE-2023-48431",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48431"
    },
    {
      "name": "CVE-2023-4039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
    },
    {
      "name": "CVE-2017-17512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-17512"
    },
    {
      "name": "CVE-2020-1712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1712"
    },
    {
      "name": "CVE-2023-48430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48430"
    },
    {
      "name": "CVE-2019-6488",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-6488"
    },
    {
      "name": "CVE-2023-39128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39128"
    },
    {
      "name": "CVE-2018-20482",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-20482"
    },
    {
      "name": "CVE-2021-27212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27212"
    },
    {
      "name": "CVE-2019-5481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-5481"
    },
    {
      "name": "CVE-2021-43396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
    },
    {
      "name": "CVE-2022-2509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
    },
    {
      "name": "CVE-2022-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
    },
    {
      "name": "CVE-2023-0687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
    },
    {
      "name": "CVE-2019-20795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20795"
    },
    {
      "name": "CVE-2023-5156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
    },
    {
      "name": "CVE-2019-9674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9674"
    },
    {
      "name": "CVE-2022-48522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
    },
    {
      "name": "CVE-2020-21913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-21913"
    },
    {
      "name": "CVE-2019-12904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12904"
    },
    {
      "name": "CVE-2021-28041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-28041"
    },
    {
      "name": "CVE-2022-42784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42784"
    },
    {
      "name": "CVE-2023-48427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48427"
    },
    {
      "name": "CVE-2020-24659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-24659"
    },
    {
      "name": "CVE-2023-48429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48429"
    },
    {
      "name": "CVE-2020-12062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12062"
    },
    {
      "name": "CVE-2019-1010023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1010023"
    },
    {
      "name": "CVE-2023-49692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49692"
    },
    {
      "name": "CVE-2016-10739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-10739"
    },
    {
      "name": "CVE-2019-1010180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1010180"
    },
    {
      "name": "CVE-2023-46285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46285"
    },
    {
      "name": "CVE-2023-46156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46156"
    },
    {
      "name": "CVE-2019-5435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-5435"
    },
    {
      "name": "CVE-2019-15847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-15847"
    },
    {
      "name": "CVE-2023-29491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
    },
    {
      "name": "CVE-2019-20367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-20367"
    },
    {
      "name": "CVE-2023-46284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46284"
    },
    {
      "name": "CVE-2023-35945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
    },
    {
      "name": "CVE-2023-32665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
    },
    {
      "name": "CVE-2023-39615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
    },
    {
      "name": "CVE-2021-37600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
    },
    {
      "name": "CVE-2021-46848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
    },
    {
      "name": "CVE-2021-3997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
    },
    {
      "name": "CVE-2021-3826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
    },
    {
      "name": "CVE-2023-26604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
    },
    {
      "name": "CVE-2019-1010022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1010022"
    },
    {
      "name": "CVE-2020-6096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-6096"
    },
    {
      "name": "CVE-2021-33294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
    },
    {
      "name": "CVE-2021-43618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
    },
    {
      "name": "CVE-2023-48428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48428"
    },
    {
      "name": "CVE-2023-45322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
    },
    {
      "name": "CVE-2019-17498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
    },
    {
      "name": "CVE-2023-49691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49691"
    },
    {
      "name": "CVE-2023-25139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25139"
    },
    {
      "name": "CVE-2023-29499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
    },
    {
      "name": "CVE-2020-1751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1751"
    },
    {
      "name": "CVE-2019-1010025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1010025"
    },
    {
      "name": "CVE-2019-12290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12290"
    },
    {
      "name": "CVE-2019-18224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18224"
    },
    {
      "name": "CVE-2018-18928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-18928"
    },
    {
      "name": "CVE-2022-27943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
    },
    {
      "name": "CVE-2022-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
    },
    {
      "name": "CVE-2021-32292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
    },
    {
      "name": "CVE-2020-21047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-21047"
    },
    {
      "name": "CVE-2021-46195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
    },
    {
      "name": "CVE-2023-38380",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38380"
    },
    {
      "name": "CVE-2023-28531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28531"
    },
    {
      "name": "CVE-2020-11501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11501"
    },
    {
      "name": "CVE-2023-4016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
    },
    {
      "name": "CVE-2022-47374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47374"
    },
    {
      "name": "CVE-2023-46281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46281"
    },
    {
      "name": "CVE-2013-4235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
    },
    {
      "name": "CVE-2020-15801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15801"
    },
    {
      "name": "CVE-2022-46141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46141"
    },
    {
      "name": "CVE-2023-34969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
    },
    {
      "name": "CVE-2020-13529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13529"
    },
    {
      "name": "CVE-2023-27371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27371"
    },
    {
      "name": "CVE-2023-32611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
    },
    {
      "name": "CVE-2021-20193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
    },
    {
      "name": "CVE-2023-29383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
    },
    {
      "name": "CVE-2019-9923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9923"
    },
    {
      "name": "CVE-2020-13777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-13777"
    },
    {
      "name": "CVE-2023-5981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
    },
    {
      "name": "CVE-2020-14422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14422"
    },
    {
      "name": "CVE-2023-32636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
    },
    {
      "name": "CVE-2021-4209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4209"
    },
    {
      "name": "CVE-2018-19591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-19591"
    },
    {
      "name": "CVE-2022-48560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
    }
  ],
  "links": [],
  "reference": "CERTFR-2023-AVI-1015",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-12-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-844582 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-180704 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-480095.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-077170 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-999588.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-480095 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-068047.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-118850 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-118850.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-068047 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-077170.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-892915 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-280603.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-999588 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-398330.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-280603 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-693975.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-693975 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-892915.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-887801 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-887801.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-592380 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-844582.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-398330 du 12 d\u00e9cembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-592380.html"
    }
  ]
}

CERTFR-2023-AVI-0935

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A COMOS versions antérieures à V10.4.4, les vulnérabilités CVE-2023-43505, CVE-2023-46601 ne seront pas corrigées par l'éditeur
Siemens N/A Desigo CC product family V5.0 toutes les versions sans le dernier correctif de sécurité
Siemens N/A Desigo CC product family V5.1 toutes les versions sans le dernier correctif de sécurité
Siemens N/A Desigo CC product family V6 toutes les versions sans le dernier correctif de sécurité
Siemens N/A Desigo CC product family V7 toutes les versions sans le dernier correctif de sécurité
Siemens N/A Applications Mendix basées sur Mendix 10 versions antérieures à V10.4.0
Siemens N/A Applications Mendix basées sur Mendix 7.x versions antérieures à V7.23.37
Siemens N/A Applications Mendix basées sur Mendix 8.x versions antérieures à V8.18.27
Siemens N/A Applications Mendix basées sur Mendix 9.x versions antérieures à V9.24.10
Siemens N/A Mendix Studio Pro 10 versions antérieures à V10.3.1
Siemens N/A Mendix Studio Pro 7 versions antérieures à V7.23.37
Siemens N/A Mendix Studio Pro 8 versions antérieures à V8.18.27
Siemens N/A Mendix Studio Pro 9 versions antérieures à V9.24.0
Siemens N/A RUGGEDCOM APE1808 toutes versions utilisées avec Nozomi Guardian / CMC versions V22.6.3 à 23.1.0sans le dernier correctif de sécurité
Siemens N/A RUGGEDCOM M2100 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM M2100F toutes les versions
Siemens N/A RUGGEDCOM M2100NC toutes les versions
Siemens N/A RUGGEDCOM M2200 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM M2200F toutes les versions
Siemens N/A RUGGEDCOM M2200NC toutes les versions
Siemens N/A RUGGEDCOM M969 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM M969F toutes les versions
Siemens N/A RUGGEDCOM M969NC toutes les versions
Siemens N/A RUGGEDCOM RMC30 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RMC30NC toutes les versions
Siemens N/A RUGGEDCOM RMC8388 V4.X versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RMC8388 V5.X versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RMC8388NC V4.X toutes les versions
Siemens N/A RUGGEDCOM RMC8388NC V5.X toutes les versions
Siemens N/A RUGGEDCOM RP110 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RP110NC toutes les versions
Siemens N/A RUGGEDCOM RS1600 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS1600F versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS1600FNC toutes les versions
Siemens N/A RUGGEDCOM RS1600NC toutes les versions
Siemens N/A RUGGEDCOM RS1600T versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS1600TNC toutes les versions
Siemens N/A RUGGEDCOM RS400 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS400F toutes les versions
Siemens N/A RUGGEDCOM RS400NC toutes les versions
Siemens N/A RUGGEDCOM RS401 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS401NC toutes les versions
Siemens N/A RUGGEDCOM RS416 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS416F toutes les versions
Siemens N/A RUGGEDCOM RS416NC toutes les versions
Siemens N/A RUGGEDCOM RS416NCv2 V4.X toutes les versions
Siemens N/A RUGGEDCOM RS416NCv2 V5.X toutes les versions
Siemens N/A RUGGEDCOM RS416P versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS416PF toutes les versions
Siemens N/A RUGGEDCOM RS416PNC toutes les versions
Siemens N/A RUGGEDCOM RS416PNCv2 V4.X toutes les versions
Siemens N/A RUGGEDCOM RS416PNCv2 V5.X toutes les versions
Siemens N/A RUGGEDCOM RS416Pv2 V4.X versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS416Pv2 V5.X versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RS416v2 V4.X versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS416v2 V5.X versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RS8000 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS8000A versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS8000ANC toutes les versions
Siemens N/A RUGGEDCOM RS8000H versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS8000HNC toutes les versions
Siemens N/A RUGGEDCOM RS8000NC toutes les versions
Siemens N/A RUGGEDCOM RS8000T versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS8000TNC toutes les versions
Siemens N/A RUGGEDCOM RS900 (32M) V4.X versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS900 (32M) V5.X versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RS900 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS900F toutes les versions
Siemens N/A RUGGEDCOM RS900G (32M) V4.X versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS900G (32M) V5.X versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RS900G versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS900GF toutes les versions
Siemens N/A RUGGEDCOM RS900GNC toutes les versions
Siemens N/A RUGGEDCOM RS900GNC(32M) V4.X toutes les versions
Siemens N/A RUGGEDCOM RS900GNC(32M) V5.X toutes les versions
Siemens N/A RUGGEDCOM RS900GP versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS900GPF toutes les versions
Siemens N/A RUGGEDCOM RS900GPNC toutes les versions
Siemens N/A RUGGEDCOM RS900L versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS900LNC toutes les versions
Siemens N/A RUGGEDCOM RS900M-GETS-C01 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS900M-GETS-XX versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS900M-STND-C01 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS900M-STND-XX versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS900MNC-GETS-C01 toutes les versions
Siemens N/A RUGGEDCOM RS900MNC-GETS-XX toutes les versions
Siemens N/A RUGGEDCOM RS900MNC-STND-XX toutes les versions
Siemens N/A RUGGEDCOM RS900MNC-STND-XX-C01 toutes les versions
Siemens N/A RUGGEDCOM RS900NC toutes les versions
Siemens N/A RUGGEDCOM RS900NC(32M) V4.X toutes les versions
Siemens N/A RUGGEDCOM RS900NC(32M) V5.X toutes les versions
Siemens N/A RUGGEDCOM RS900W versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS910 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS910L versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS910LNC toutes les versions
Siemens N/A RUGGEDCOM RS910NC toutes les versions
Siemens N/A RUGGEDCOM RS910W versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS920L versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS920LNC toutes les versions
Siemens N/A RUGGEDCOM RS920W versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS930L versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS930LNC toutes les versions
Siemens N/A RUGGEDCOM RS930W versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS940G versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS940GF toutes les versions
Siemens N/A RUGGEDCOM RS940GNC toutes les versions
Siemens N/A RUGGEDCOM RS969 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RS969NC toutes les versions
Siemens N/A RUGGEDCOM RSG2100 (32M) V4.X versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RSG2100 (32M) V5.X versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RSG2100 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RSG2100F toutes les versions
Siemens N/A RUGGEDCOM RSG2100NC toutes les versions
Siemens N/A RUGGEDCOM RSG2100NC(32M) V4.X toutes les versions
Siemens N/A RUGGEDCOM RSG2100NC(32M) V5.X toutes les versions
Siemens N/A RUGGEDCOM RSG2100P versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RSG2100PF toutes les versions
Siemens N/A RUGGEDCOM RSG2100PNC toutes les versions
Siemens N/A RUGGEDCOM RSG2200 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RSG2200F toutes les versions
Siemens N/A RUGGEDCOM RSG2200NC toutes les versions
Siemens N/A RUGGEDCOM RSG2288 V4.X versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RSG2288 V5.X versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RSG2288NC V4.X toutes les versions
Siemens N/A RUGGEDCOM RSG2288NC V5.X toutes les versions
Siemens N/A RUGGEDCOM RSG2300 V4.X versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RSG2300 V5.X versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RSG2300F toutes les versions
Siemens N/A RUGGEDCOM RSG2300NC V4.X toutes les versions
Siemens N/A RUGGEDCOM RSG2300NC V5.X toutes les versions
Siemens N/A RUGGEDCOM RSG2300P V4.X versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RSG2300P V5.X versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RSG2300PF toutes les versions
Siemens N/A RUGGEDCOM RSG2300PNC V4.X toutes les versions
Siemens N/A RUGGEDCOM RSG2300PNC V5.X toutes les versions
Siemens N/A RUGGEDCOM RSG2488 V4.X versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RSG2488 V5.X versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RSG2488F toutes les versions
Siemens N/A RUGGEDCOM RSG2488NC V4.X toutes les versions
Siemens N/A RUGGEDCOM RSG2488NC V5.X toutes les versions
Siemens N/A RUGGEDCOM RSG907R versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RSG908C versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RSG909R versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RSG910C versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RSG920P V4.X versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM RSG920P V5.X versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RSG920PNC V4.X toutes les versions
Siemens N/A RUGGEDCOM RSG920PNC V5.X toutes les versions
Siemens N/A RUGGEDCOM RSL910 versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RSL910NC toutes les versions
Siemens N/A RUGGEDCOM RST2228 versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RST2228P versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RST916C versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM RST916P versions antérieures à V5.6.0
Siemens N/A RUGGEDCOM i800 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM i800NC toutes les versions
Siemens N/A RUGGEDCOM i801 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM i801NC toutes les versions
Siemens N/A RUGGEDCOM i802 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM i802NC toutes les versions
Siemens N/A RUGGEDCOM i803 versions antérieures à V4.3.8
Siemens N/A RUGGEDCOM i803NC toutes les versions
Siemens N/A SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) toutes les versions
Siemens N/A SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) toutes les versions
Siemens N/A SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) toutes les versions
Siemens N/A SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) toutes les versions
Siemens N/A SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) toutes les versions
Siemens N/A SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) toutes les versions
Siemens N/A SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) toutes les versions
Siemens N/A SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) toutes les versions
Siemens N/A SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) toutes les versions
Siemens N/A SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) toutes les versions
Siemens N/A SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) toutes les versions
Siemens N/A SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) toutes les versions
Siemens N/A SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) toutes les versions
Siemens N/A SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) toutes les versions
Siemens N/A SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) toutes les versions
Siemens N/A SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) toutes les versions
Siemens N/A SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) toutes les versions
Siemens N/A SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) toutes les versions
Siemens N/A SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) toutes les versions
Siemens N/A SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) toutes les versions
Siemens N/A SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) toutes les versions
Siemens N/A SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) toutes les versions
Siemens N/A SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) toutes les versions
Siemens N/A SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) toutes les versions
Siemens N/A SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) toutes les versions
Siemens N/A SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) toutes les versions
Siemens N/A SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) toutes les versions
Siemens N/A SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) toutes les versions
Siemens N/A SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) toutes les versions
Siemens N/A SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) toutes les versions
Siemens N/A SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) toutes les versions
Siemens N/A SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) toutes les versions
Siemens N/A SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) toutes les versions
Siemens N/A SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) toutes les versions
Siemens N/A SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) toutes les versions
Siemens N/A SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) toutes les versions
Siemens N/A SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) toutes les versions
Siemens N/A SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) toutes les versions
Siemens N/A SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) toutes les versions
Siemens N/A SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) toutes les versions
Siemens N/A SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) toutes les versions
Siemens N/A SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) toutes les versions
Siemens N/A SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) toutes les versions
Siemens N/A SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) toutes les versions
Siemens N/A SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) toutes les versions
Siemens N/A SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) toutes les versions
Siemens N/A SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) toutes les versions
Siemens N/A SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) toutes les versions
Siemens N/A SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) toutes les versions
Siemens N/A SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes les versions
Siemens N/A SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes les versions
Siemens N/A SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes les versions
Siemens N/A SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes les versions
Siemens N/A SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes les versions
Siemens N/A SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes les versions
Siemens N/A SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) toutes les versions
Siemens N/A SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) toutes les versions
Siemens N/A SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) toutes les versions
Siemens N/A SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) toutes les versions
Siemens N/A SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) toutes les versions
Siemens N/A SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) toutes les versions
Siemens N/A SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) toutes les versions
Siemens N/A SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) toutes les versions
Siemens N/A SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) toutes les versions
Siemens N/A SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2) versions antérieures à V4.5
Siemens N/A SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2) versions antérieures à V4.5
Siemens N/A SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC208 (6GK5208-0BA00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC208EEC (6GK5208-0BA00-2FC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC208G (6GK5208-0GA00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC208G EEC (6GK5208-0GA00-2FC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC208G PoE (6GK5208-0RA00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC216 (6GK5216-0BA00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC216-4C (6GK5216-4BS00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC216-4C G (6GK5216-4GS00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC216EEC (6GK5216-0BA00-2FC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC224 (6GK5224-0BA00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC224-4C G (6GK5224-4GS00-2AC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2) versions antérieures à V4.5
Siemens N/A SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2) versions antérieures à V4.5
Siemens N/A SCALANCE XF204 (6GK5204-0BA00-2GF2) versions antérieures à V4.5
Siemens N/A SCALANCE XF204 DNA (6GK5204-0BA00-2YF2) versions antérieures à V4.5
Siemens N/A SCALANCE XF204-2BA (6GK5204-2AA00-2GF2) versions antérieures à V4.5
Siemens N/A SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2) versions antérieures à V4.5
Siemens N/A SCALANCE XP208 (6GK5208-0HA00-2AS6) versions antérieures à V4.5
Siemens N/A SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6) versions antérieures à V4.5
Siemens N/A SCALANCE XP208EEC (6GK5208-0HA00-2ES6) versions antérieures à V4.5
Siemens N/A SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6) versions antérieures à V4.5
Siemens N/A SCALANCE XP216 (6GK5216-0HA00-2AS6) versions antérieures à V4.5
Siemens N/A SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6) versions antérieures à V4.5
Siemens N/A SCALANCE XP216EEC (6GK5216-0HA00-2ES6) versions antérieures à V4.5
Siemens N/A SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6) versions antérieures à V4.5
Siemens N/A SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3) versions antérieures à V4.5
Siemens N/A SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3) versions antérieures à V4.5
Siemens N/A SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3) versions antérieures à V4.5
Siemens N/A SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3) versions antérieures à V4.5
Siemens N/A SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3) versions antérieures à V4.5
Siemens N/A SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3) versions antérieures à V4.5
Siemens N/A SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3) versions antérieures à V4.5
Siemens N/A SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3) versions antérieures à V4.5
Siemens N/A SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3) versions antérieures à V4.5
Siemens N/A SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3) versions antérieures à V4.5
Siemens N/A SIMATIC MV500 family versions antérieures à V3.3.5
Siemens N/A SIMATIC PCS neo versions antérieures à V4.1
Siemens N/A SINEC PNI versions antérieures à V2.0
Siemens N/A SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2) versions antérieures à V4.5
Siemens N/A SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2) versions antérieures à V4.5
Siemens N/A SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2) versions antérieures à V4.5
Siemens N/A SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2) versions antérieures à V4.5
Siemens N/A SIPROTEC 4 7SJ66 versions antérieures à V4.41
Siemens N/A Siemens OPC UA Modelling Editor (SiOME) versions antérieures à V2.8
Siemens N/A Simcenter Femap V2301 versions antérieures à V2301.0003
Siemens N/A Simcenter Femap V2306 versions antérieures à V2306.0001
Siemens N/A Tecnomatix Plant Simulation V2201 versions antérieures à V2201.0010
Siemens N/A Tecnomatix Plant Simulation V2302 versions antérieures à V2302.0004

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "COMOS versions ant\u00e9rieures \u00e0 V10.4.4, les vuln\u00e9rabilit\u00e9s CVE-2023-43505, CVE-2023-46601 ne seront pas corrig\u00e9es par l\u0027\u00e9diteur",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Desigo CC product family V5.0 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Desigo CC product family V5.1 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Desigo CC product family V6 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Desigo CC product family V7 toutes les versions sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Applications Mendix bas\u00e9es sur Mendix 10 versions ant\u00e9rieures \u00e0 V10.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Applications Mendix bas\u00e9es sur Mendix 7.x versions ant\u00e9rieures \u00e0 V7.23.37",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Applications Mendix bas\u00e9es sur Mendix 8.x versions ant\u00e9rieures \u00e0 V8.18.27",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Applications Mendix bas\u00e9es sur Mendix 9.x versions ant\u00e9rieures \u00e0 V9.24.10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix Studio Pro 10 versions ant\u00e9rieures \u00e0 V10.3.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix Studio Pro 7 versions ant\u00e9rieures \u00e0 V7.23.37",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix Studio Pro 8 versions ant\u00e9rieures \u00e0 V8.18.27",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix Studio Pro 9 versions ant\u00e9rieures \u00e0 V9.24.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 toutes versions utilis\u00e9es avec Nozomi Guardian / CMC versions V22.6.3 \u00e0 23.1.0sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM M2100 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM M2100F toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM M2100NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM M2200 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM M2200F toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM M2200NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM M969 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM M969F toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM M969NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RMC30 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RMC30NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RMC8388 V4.X versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RMC8388 V5.X versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RMC8388NC V4.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RMC8388NC V5.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RP110 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RP110NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS1600 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS1600F versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS1600FNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS1600NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS1600T versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS1600TNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS400 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS400F toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS400NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS401 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS401NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416F toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416NCv2 V4.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416NCv2 V5.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416P versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416PF toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416PNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416PNCv2 V4.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416PNCv2 V5.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416Pv2 V4.X versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416Pv2 V5.X versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416v2 V4.X versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS416v2 V5.X versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS8000 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS8000A versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS8000ANC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS8000H versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS8000HNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS8000NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS8000T versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS8000TNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900 (32M) V4.X versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900 (32M) V5.X versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900F toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900G (32M) V4.X versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900G (32M) V5.X versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900G versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900GF toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900GNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900GNC(32M) V4.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900GNC(32M) V5.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900GP versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900GPF toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900GPNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900L versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900LNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900M-GETS-C01 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900M-GETS-XX versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900M-STND-C01 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900M-STND-XX versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900MNC-GETS-C01 toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900MNC-GETS-XX toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900MNC-STND-XX toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900MNC-STND-XX-C01 toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900NC(32M) V4.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900NC(32M) V5.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS900W versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS910 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS910L versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS910LNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS910NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS910W versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS920L versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS920LNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS920W versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS930L versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS930LNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS930W versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS940G versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS940GF toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS940GNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS969 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RS969NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2100 (32M) V4.X versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2100 (32M) V5.X versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2100 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2100F toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2100NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2100NC(32M) V4.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2100NC(32M) V5.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2100P versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2100PF toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2100PNC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2200 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2200F toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2200NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2288 V4.X versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2288 V5.X versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2288NC V4.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2288NC V5.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2300 V4.X versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2300 V5.X versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2300F toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2300NC V4.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2300NC V5.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2300P V4.X versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2300P V5.X versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2300PF toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2300PNC V4.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2300PNC V5.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2488 V4.X versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2488 V5.X versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2488F toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2488NC V4.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG2488NC V5.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG907R versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG908C versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG909R versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG910C versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG920P V4.X versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG920P V5.X versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG920PNC V4.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSG920PNC V5.X toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSL910 versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RSL910NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RST2228 versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RST2228P versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RST916C versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM RST916P versions ant\u00e9rieures \u00e0 V5.6.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM i800 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM i800NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM i801 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM i801NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM i802 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM i802NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM i803 versions ant\u00e9rieures \u00e0 V4.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM i803NC toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) toutes les versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208 (6GK5208-0BA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208EEC (6GK5208-0BA00-2FC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208G (6GK5208-0GA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208G EEC (6GK5208-0GA00-2FC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC208G PoE (6GK5208-0RA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216 (6GK5216-0BA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-4C (6GK5216-4BS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-4C G (6GK5216-4GS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC216EEC (6GK5216-0BA00-2FC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC224 (6GK5224-0BA00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC224-4C G (6GK5224-4GS00-2AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XF204 (6GK5204-0BA00-2GF2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XF204 DNA (6GK5204-0BA00-2YF2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XF204-2BA (6GK5204-2AA00-2GF2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP208 (6GK5208-0HA00-2AS6) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP208EEC (6GK5208-0HA00-2ES6) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP216 (6GK5216-0HA00-2AS6) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP216EEC (6GK5216-0HA00-2ES6) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV500 family versions ant\u00e9rieures \u00e0 V3.3.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo versions ant\u00e9rieures \u00e0 V4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SINEC PNI versions ant\u00e9rieures \u00e0 V2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2) versions ant\u00e9rieures \u00e0 V4.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPROTEC 4 7SJ66 versions ant\u00e9rieures \u00e0 V4.41",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Siemens OPC UA Modelling Editor (SiOME) versions ant\u00e9rieures \u00e0 V2.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Simcenter Femap V2301 versions ant\u00e9rieures \u00e0 V2301.0003",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Simcenter Femap V2306 versions ant\u00e9rieures \u00e0 V2306.0001",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Tecnomatix Plant Simulation V2201 versions ant\u00e9rieures \u00e0 V2201.0010",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Tecnomatix Plant Simulation V2302 versions ant\u00e9rieures \u00e0 V2302.0004",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-24895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24895"
    },
    {
      "name": "CVE-2023-0216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
    },
    {
      "name": "CVE-2020-35460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-35460"
    },
    {
      "name": "CVE-2023-0401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
    },
    {
      "name": "CVE-2023-33135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33135"
    },
    {
      "name": "CVE-2023-1530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1530"
    },
    {
      "name": "CVE-2023-22669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22669"
    },
    {
      "name": "CVE-2023-44321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44321"
    },
    {
      "name": "CVE-2023-3935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3935"
    },
    {
      "name": "CVE-2023-46096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46096"
    },
    {
      "name": "CVE-2023-44317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44317"
    },
    {
      "name": "CVE-2022-4304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
    },
    {
      "name": "CVE-2023-38072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38072"
    },
    {
      "name": "CVE-2023-24897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24897"
    },
    {
      "name": "CVE-2022-44792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44792"
    },
    {
      "name": "CVE-2023-3817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
    },
    {
      "name": "CVE-2023-38075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38075"
    },
    {
      "name": "CVE-2019-12256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12256"
    },
    {
      "name": "CVE-2023-35788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35788"
    },
    {
      "name": "CVE-2022-28809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28809"
    },
    {
      "name": "CVE-2023-24936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24936"
    },
    {
      "name": "CVE-2023-38073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38073"
    },
    {
      "name": "CVE-2023-46097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46097"
    },
    {
      "name": "CVE-2019-12258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12258"
    },
    {
      "name": "CVE-2020-25020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25020"
    },
    {
      "name": "CVE-2022-4203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
    },
    {
      "name": "CVE-2022-44793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44793"
    },
    {
      "name": "CVE-2023-33128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33128"
    },
    {
      "name": "CVE-2019-12259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12259"
    },
    {
      "name": "CVE-2023-0217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
    },
    {
      "name": "CVE-2023-44320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44320"
    },
    {
      "name": "CVE-2022-39158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39158"
    },
    {
      "name": "CVE-2022-28808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28808"
    },
    {
      "name": "CVE-2019-12261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12261"
    },
    {
      "name": "CVE-2023-46099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46099"
    },
    {
      "name": "CVE-2023-46590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46590"
    },
    {
      "name": "CVE-2023-2932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2932"
    },
    {
      "name": "CVE-2023-41033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41033"
    },
    {
      "name": "CVE-2023-46098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46098"
    },
    {
      "name": "CVE-2022-37434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
    },
    {
      "name": "CVE-2021-20094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20094"
    },
    {
      "name": "CVE-2022-28807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28807"
    },
    {
      "name": "CVE-2023-38071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38071"
    },
    {
      "name": "CVE-2023-45794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45794"
    },
    {
      "name": "CVE-2019-12263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12263"
    },
    {
      "name": "CVE-2021-20093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20093"
    },
    {
      "name": "CVE-2023-44319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44319"
    },
    {
      "name": "CVE-2023-46601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46601"
    },
    {
      "name": "CVE-2023-32032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32032"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2023-2650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
    },
    {
      "name": "CVE-2022-47522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47522"
    },
    {
      "name": "CVE-2023-38070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38070"
    },
    {
      "name": "CVE-2022-23095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23095"
    },
    {
      "name": "CVE-2023-44322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44322"
    },
    {
      "name": "CVE-2023-29245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29245"
    },
    {
      "name": "CVE-2023-43503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43503"
    },
    {
      "name": "CVE-2019-12260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12260"
    },
    {
      "name": "CVE-2022-23218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
    },
    {
      "name": "CVE-2023-28260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28260"
    },
    {
      "name": "CVE-2023-43505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43505"
    },
    {
      "name": "CVE-2023-38074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38074"
    },
    {
      "name": "CVE-2019-12262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12262"
    },
    {
      "name": "CVE-2023-29331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29331"
    },
    {
      "name": "CVE-2019-12255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12255"
    },
    {
      "name": "CVE-2023-44374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44374"
    },
    {
      "name": "CVE-2023-43504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43504"
    },
    {
      "name": "CVE-2023-0933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0933"
    },
    {
      "name": "CVE-2023-2567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2567"
    },
    {
      "name": "CVE-2023-32649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32649"
    },
    {
      "name": "CVE-2022-41032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41032"
    },
    {
      "name": "CVE-2023-4863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
    },
    {
      "name": "CVE-2023-21808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21808"
    },
    {
      "name": "CVE-2023-2931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2931"
    },
    {
      "name": "CVE-2023-2975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
    },
    {
      "name": "CVE-2022-30184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30184"
    },
    {
      "name": "CVE-2019-12265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12265"
    },
    {
      "name": "CVE-2023-44373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44373"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2022-23219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
    },
    {
      "name": "CVE-2023-38076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38076"
    },
    {
      "name": "CVE-2023-41032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41032"
    },
    {
      "name": "CVE-2023-33126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33126"
    },
    {
      "name": "CVE-2023-44318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44318"
    },
    {
      "name": "CVE-2023-22670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22670"
    }
  ],
  "links": [],
  "reference": "CERTFR-2023-AVI-0935",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-11-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un\nd\u00e9ni de service \u00e0 distance et une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-617233 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-292063.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-268517 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-084182.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-197270 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-787941.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-099606 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-625850.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-137900 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-137900.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-456933 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-456933.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-787941 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-457702.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-084182 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-887122.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-887122 du 08 novembre 2022",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-150063.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-150063 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-268517.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-699386 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-197270.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-292063 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-617233.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-625850 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-457702 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-099606.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-478780 du 14 novembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-478780.html"
    }
  ]
}

CERTFR-2023-AVI-0819

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A SINEC NMS versions antérieures à V2.0
Siemens N/A SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0) versions antérieures à V8.10.0.6
Siemens N/A Simcenter Amesim versions antérieures à V2021.1
Siemens N/A Mendix Forgot Password (Mendix 8 compatible) versions antérieures à V4.1.3
Siemens N/A Mendix Forgot Password (Mendix 10 compatible) versions antérieures à V5.4.0
Siemens N/A SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0) versions antérieures à V8.10.0.6
Siemens N/A Tecnomatix Plant Simulation V2201 versions antérieures à V2201.0009
Siemens N/A Mendix Forgot Password (Mendix 9 compatible) versions antérieures à V5.4.0
Siemens N/A Parasolid V35.1 versions antérieures à V35.1.250
Siemens N/A SIMATIC WinCC OA V3.19 versions antérieures à V3.19 P005
Siemens N/A CP-8050 MASTER MODULE (6MF2805-0AA00) versions antérieures à CPCI85 V05.11
Siemens N/A CP-8050 MASTER MODULE (6MF2805-0AA00) versions antérieures à CPCI85 V05.11 (uniquement avec le support debug activé)
Siemens N/A Parasolid V36.0 versions antérieures à V36.0.169
Siemens N/A SIMATIC WinCC OA V3.17 versions antérieures à V3.17 P029
Siemens N/A CP-8031 MASTER MODULE (6MF2803-1AA00) versions antérieures à CPCI85 V05.11
Siemens N/A Mendix Forgot Password (Mendix 7 compatible) versions antérieures à V3.7.3
Siemens N/A CP-8031 MASTER MODULE (6MF2803-1AA00) versions antérieures à CPCI85 V05.11 (uniquement avec le support debug activé)
Siemens N/A SICAM PAS/PQS versions supérieures ou égales à V8.00 versions antérieures à V8.22
Siemens N/A SIMATIC WinCC OA V3.18 versions antérieures à V3.18 P019
Siemens N/A Parasolid V35.0 versions antérieures à V35.0.262
Siemens N/A Tecnomatix Plant Simulation V2302 versions antérieures à V2302.0003
Siemens N/A SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0) versions antérieures à V8.10.0.6
Siemens N/A Xpedition Layout Browser versions antérieures à VX.2.14

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SINEC NMS versions ant\u00e9rieures \u00e0 V2.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1750D (JP) (6GK5750-2HX01-1AD0) versions ant\u00e9rieures \u00e0 V8.10.0.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Simcenter Amesim versions ant\u00e9rieures \u00e0 V2021.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix Forgot Password (Mendix 8 compatible) versions ant\u00e9rieures \u00e0 V4.1.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix Forgot Password (Mendix 10 compatible) versions ant\u00e9rieures \u00e0 V5.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1750D (ROW) (6GK5750-2HX01-1AA0) versions ant\u00e9rieures \u00e0 V8.10.0.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Tecnomatix Plant Simulation V2201 versions ant\u00e9rieures \u00e0 V2201.0009",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix Forgot Password (Mendix 9 compatible) versions ant\u00e9rieures \u00e0 V5.4.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Parasolid V35.1 versions ant\u00e9rieures \u00e0 V35.1.250",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC OA V3.19 versions ant\u00e9rieures \u00e0 V3.19 P005",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "CP-8050 MASTER MODULE (6MF2805-0AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "CP-8050 MASTER MODULE (6MF2805-0AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05.11 (uniquement avec le support debug activ\u00e9)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Parasolid V36.0 versions ant\u00e9rieures \u00e0 V36.0.169",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC OA V3.17 versions ant\u00e9rieures \u00e0 V3.17 P029",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "CP-8031 MASTER MODULE (6MF2803-1AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Mendix Forgot Password (Mendix 7 compatible) versions ant\u00e9rieures \u00e0 V3.7.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "CP-8031 MASTER MODULE (6MF2803-1AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05.11 (uniquement avec le support debug activ\u00e9)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SICAM PAS/PQS versions sup\u00e9rieures ou \u00e9gales \u00e0 V8.00 versions ant\u00e9rieures \u00e0 V8.22",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC OA V3.18 versions ant\u00e9rieures \u00e0 V3.18 P019",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Parasolid V35.0 versions ant\u00e9rieures \u00e0 V35.0.262",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Tecnomatix Plant Simulation V2302 versions ant\u00e9rieures \u00e0 V2302.0003",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SCALANCE W1750D (USA) (6GK5750-2HX01-1AB0) versions ant\u00e9rieures \u00e0 V8.10.0.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Xpedition Layout Browser versions ant\u00e9rieures \u00e0 VX.2.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-44081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44081"
    },
    {
      "name": "CVE-2023-22788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22788"
    },
    {
      "name": "CVE-2023-30900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30900"
    },
    {
      "name": "CVE-2023-22783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22783"
    },
    {
      "name": "CVE-2022-30527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30527"
    },
    {
      "name": "CVE-2023-44083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44083"
    },
    {
      "name": "CVE-2023-22785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22785"
    },
    {
      "name": "CVE-2023-45204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45204"
    },
    {
      "name": "CVE-2023-44315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44315"
    },
    {
      "name": "CVE-2023-44086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44086"
    },
    {
      "name": "CVE-2023-45205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45205"
    },
    {
      "name": "CVE-2023-44082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44082"
    },
    {
      "name": "CVE-2023-44084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44084"
    },
    {
      "name": "CVE-2023-37195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37195"
    },
    {
      "name": "CVE-2023-35796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35796"
    },
    {
      "name": "CVE-2023-44085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44085"
    },
    {
      "name": "CVE-2023-22784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22784"
    },
    {
      "name": "CVE-2023-23903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23903"
    },
    {
      "name": "CVE-2023-22378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22378"
    },
    {
      "name": "CVE-2023-22781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22781"
    },
    {
      "name": "CVE-2023-22789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22789"
    },
    {
      "name": "CVE-2023-22790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22790"
    },
    {
      "name": "CVE-2023-22843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22843"
    },
    {
      "name": "CVE-2023-24471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24471"
    },
    {
      "name": "CVE-2023-38640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38640"
    },
    {
      "name": "CVE-2023-24477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24477"
    },
    {
      "name": "CVE-2023-22787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22787"
    },
    {
      "name": "CVE-2023-36380",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36380"
    },
    {
      "name": "CVE-2023-42796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42796"
    },
    {
      "name": "CVE-2023-22791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22791"
    },
    {
      "name": "CVE-2023-43625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43625"
    },
    {
      "name": "CVE-2023-22780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22780"
    },
    {
      "name": "CVE-2023-22786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22786"
    },
    {
      "name": "CVE-2023-43623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43623"
    },
    {
      "name": "CVE-2023-24015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24015"
    },
    {
      "name": "CVE-2023-23574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23574"
    },
    {
      "name": "CVE-2023-22779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22779"
    },
    {
      "name": "CVE-2023-44087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44087"
    },
    {
      "name": "CVE-2023-37194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37194"
    },
    {
      "name": "CVE-2023-22782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22782"
    },
    {
      "name": "CVE-2023-45601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45601"
    }
  ],
  "links": [],
  "reference": "CERTFR-2023-AVI-0819",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-10-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-160243 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-035466.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-386812 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-386812.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-843070 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-843070.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-829656 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-594373.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-647455 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-134651.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-295483 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-647455.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-711309 du 12 septembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-711309.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-524778 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-160243.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-784849 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-295483.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-134651 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-524778.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-770890 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-829656.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-035466 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-770890.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-594373 du 10 octobre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-784849.html"
    }
  ]
}

CERTFR-2023-AVI-0749

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A Spectrum Power 7 versions antérieures à V23Q3
Siemens N/A SIMATIC PCS neo (Administration Console) V4.0 et V4.0 Update 1 sans le correctif de sécurité Security Patch 01
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Spectrum Power 7 versions ant\u00e9rieures \u00e0 V23Q3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC PCS neo (Administration Console) V4.0 et V4.0 Update 1 sans le correctif de s\u00e9curit\u00e9 Security Patch 01",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-38558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38558"
    },
    {
      "name": "CVE-2023-38557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38557"
    }
  ],
  "links": [],
  "reference": "CERTFR-2023-AVI-0749",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-09-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-646240 du 14 septembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-357182.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-357182 du 14 septembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-646240.html"
    }
  ]
}

CERTFR-2023-AVI-0733

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A SIMIT Simulation Platform toutes versions
Siemens N/A SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN02-0AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM01-2AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1515R-2 PN (6AG1515-2RM00-7AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL01-2AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TK01-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00) versions antérieures à 2.2
Siemens N/A SIMATIC S7-1500 CPU 1518HF-4 PN (6ES7518-4JP00-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK (6ES7518-4AP00-3AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-7AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1517H-3 PN (6AG1517-3HP00-4AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN02-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL (6AG2516-3AN01-4AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-2AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UK01-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions antérieures à 3.0.3
Siemens N/A JT2Go versions antérieures à 14.3.0.1
Siemens N/A SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK02-4AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN (6ES7516-2PN00-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions antérieures à 3.0.3
Siemens N/A SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-7AB0) versions antérieures à 2.9.7
Siemens N/A RUGGEDCOM APE1808CLA-S5 CC (6GK6015-0AL20-1AF1) versions antérieures à 1.0.212N
Siemens N/A SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-7AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN (6ES7513-2PL00-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK (6ES7518-4FP00-3AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL01-0AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-4AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-1AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL (6AG2516-3AN02-4AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1517H-3 PN (6ES7517-3HP00-0AB0) versions antérieures à 3.0.3
Siemens N/A RUGGEDCOM APE1808W10 CC (6GK6015-0AL20-0GJ1) versions antérieures à 1.0.212N
Siemens N/A SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions antérieures à 3.0.3
Siemens N/A QMS Automotive versions antérieures à 12.39
Siemens N/A Parasolid versions 36.0.x antérieures à 36.0.142
Siemens N/A SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-2AB0) versions antérieures à 2.9.7
Siemens N/A Teamcenter Visualization versions 14.3.x antérieures à 14.3.0.1
Siemens N/A SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-1AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK01-0AB0) versions antérieures à 2.9.7
Siemens N/A PSS(R)ODMS versions 13.1.x antérieures à 13.1.12.1
Siemens N/A SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM02-0AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-2AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN01-0AB0) versions antérieures à 2.9.7
Siemens N/A RUGGEDCOM APE1808CLA-S1 CC (6GK6015-0AL20-1AB1) versions antérieures à 1.0.212N
Siemens N/A SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-2AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-7AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TM01-0AB0) versions antérieures à 2.9.7
Siemens N/A Teamcenter Visualization versions 14.2.x antérieures à 14.2.0.6
Siemens N/A SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-1AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RL00-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions antérieures à 3.0.3
Siemens N/A SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK01-2AB0) versions antérieures à 2.9.7
Siemens N/A PSS(R)E V35 toutes versions
Siemens N/A SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK01-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UM01-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK02-1AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions antérieures à 3.0.3
Siemens N/A RUGGEDCOM APE1808 SAM-L CC (6GK6015-0AL20-0GN1) versions antérieures à 1.0.212N
Siemens N/A RUGGEDCOM APE1808CLA-S5 (6GK6015-0AL20-1AF0) versions antérieures à 1.0.212N
Siemens N/A SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00) versions antérieures à 2.2
Siemens N/A SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN01-2AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-7AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK01-0AB0) versions antérieures à 2.9.7
Siemens N/A PSS(R)CAPE versions 15.x antérieures à 15.0.22
Siemens N/A SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-7AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions antérieures à 3.0.3
Siemens N/A SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM02-2AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK01-4AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions antérieures à 3.0.3
Siemens N/A RUGGEDCOM APE1808 ADM CC (6GK6015-0AL20-0GL1) versions antérieures à 1.0.212N
Siemens N/A SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK00-0AB0) versions antérieures à 2.9.7
Siemens N/A RUGGEDCOM APE1808 ADM (6GK6015-0AL20-0GL0) versions antérieures à 1.0.212N
Siemens N/A SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK01-0AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN02-2AB0) versions antérieures à 2.9.7
Siemens N/A RUGGEDCOM APE1808CLA-S3 (6GK6015-0AL20-1AD0) versions antérieures à 1.0.212N
Siemens N/A SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK01-0AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL02-2AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-7AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-2AB0) versions antérieures à 2.9.7
Siemens N/A PSS(R)CAPE versions 14.x antérieures à 14.2023-08-23
Siemens N/A SIPLUS ET 200SP CPU 1510SP F-1 PN (6AG1510-1SJ01-2AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-2AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions antérieures à 3.0.3
Siemens N/A RUGGEDCOM APE1808 CKP CC (6GK6015-0AL20-0GK1) versions antérieures à 1.0.212N
Siemens N/A SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK02-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RM03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM02-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions antérieures à 3.0.3
Siemens N/A PSS(R)ODMS V13.0 toutes versions
Siemens N/A SIMATIC WinCC OA versions 3.19.x antérieures à 3.19 P006
Siemens N/A SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK02-0AB0) versions antérieures à 2.9.7
Siemens N/A Parasolid versions 35.1.x antérieures à 35.1.184
Siemens N/A SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-4AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM01-0AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL (6AG2510-1SJ01-1AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL (6AG2515-2FM01-2AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL01-0AB0) versions antérieures à 2.9.7
Siemens N/A RUGGEDCOM APE1808CLA-S3 CC (6GK6015-0AL20-1AD1) versions antérieures à 1.0.212N
Siemens N/A SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK01-1AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL02-0AB0) versions antérieures à 2.9.7
Siemens N/A RUGGEDCOM APE1808 ELAN (6GK6015-0AL20-0GP0) versions antérieures à 1.0.212N
Siemens N/A SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-4AB0) versions antérieures à 2.9.7
Siemens N/A RUGGEDCOM APE1808CLA-P CC (6GK6015-0AL20-1AA1) versions antérieures à 1.0.212N
Siemens N/A SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RM00-0AB0) versions antérieures à 2.9.7
Siemens N/A Parasolid versions 35.0.x antérieures à 35.0.253
Siemens N/A SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN (6ES7516-2GN00-0AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1515F-2 PN RAIL (6AG2515-2FM02-4AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0) versions antérieures à 2.9.7
Siemens N/A RUGGEDCOM APE1808 CLOUDCONNECT (6GK6015-0AL20-0GM0) versions antérieures à 1.0.212N
Siemens N/A SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0) versions antérieures à 2.9.7
Siemens N/A Teamcenter Visualization versions 14.1.x antérieures à 14.1.0.11
Siemens N/A RUGGEDCOM APE1808 SAM-L (6GK6015-0AL20-0GN0) versions antérieures à 1.0.212N
Siemens N/A SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) versions antérieures à 21.9.7
Siemens N/A SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK02-2AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL02-0AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN01-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 Software Controller V2 versions antérieures à 21.9.7
Siemens N/A RUGGEDCOM APE1808LNX (6GK6015-0AL20-0GH0) versions antérieures à 1.0.212N
Siemens N/A SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions antérieures à 3.0.3
Siemens N/A SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-2AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-2AB0) versions antérieures à 2.9.7
Siemens N/A RUGGEDCOM APE1808 CLOUDCONNECT CC (6GK6015-0AL20-0GM1) versions antérieures à 1.0.212N
Siemens N/A SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-2AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-2AB0) versions antérieures à 2.9.7
Siemens N/A RUGGEDCOM APE1808LNX CC (6GK6015-0AL20-0GH1) versions antérieures à 1.0.212N
Siemens N/A RUGGEDCOM APE1808CLA-P (6GK6015-0AL20-1AA0) versions antérieures à 1.0.212N
Siemens N/A SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK00-0AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-7AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-4AB0) versions antérieures à 2.9.7
Siemens N/A PSS(R)E versions 34.x antérieures à 34.9.6
Siemens N/A SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions antérieures à 3.0.3
Siemens N/A Parasolid versions 34.1.x antérieures à 34.1.258
Siemens N/A SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RN03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL (6AG2515-2RM00-4AB0) versions antérieures à 2.9.7
Siemens N/A SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-7AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions antérieures à 3.0.3
Siemens N/A SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM01-0AB0) versions antérieures à 2.9.7
Siemens N/A SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions antérieures à 3.0.3
Siemens N/A RUGGEDCOM APE1808CLA-S1 (6GK6015-0AL20-1AB0) versions antérieures à 1.0.212N
Siemens N/A RUGGEDCOM APE1808W10 (6GK6015-0AL20-0GJ0) versions antérieures à 1.0.212N
Siemens N/A SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN (6ES7513-2GL00-0AB0) versions antérieures à 2.9.7
Siemens N/A RUGGEDCOM APE1808 ELAN CC (6GK6015-0AL20-0GP1) versions antérieures à 1.0.212N
Siemens N/A SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions antérieures à 3.0.3
Siemens N/A Teamcenter Visualization versions 13.3.x antérieures à 13.3.0.12
Siemens N/A RUGGEDCOM APE1808 CKP (6GK6015-0AL20-0GK0) versions antérieures à 1.0.212N
Siemens N/A SIPLUS S7-1500 CPU 1518HF-4 PN (6AG1518-4JP00-4AB0) versions antérieures à 3.0.3

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMIT Simulation Platform toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1515R-2 PN (6AG1515-2RM00-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Cloud Connect 7 CC716 (6GK1411-5AC00) versions ant\u00e9rieures \u00e0 2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518HF-4 PN (6ES7518-4JP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK (6ES7518-4AP00-3AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1517H-3 PN (6AG1517-3HP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL (6AG2516-3AN01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "JT2Go versions ant\u00e9rieures \u00e0 14.3.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN (6ES7516-2PN00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518TF-4 PN/DP (6ES7518-4UP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808CLA-S5 CC (6GK6015-0AL20-1AF1) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN (6ES7513-2PL00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK (6ES7518-4FP00-3AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL (6AG2516-3AN02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1517H-3 PN (6ES7517-3HP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808W10 CC (6GK6015-0AL20-0GJ1) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1517T-3 PN/DP (6ES7517-3TP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "QMS Automotive versions ant\u00e9rieures \u00e0 12.39",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Parasolid versions 36.0.x ant\u00e9rieures \u00e0 36.0.142",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization versions 14.3.x ant\u00e9rieures \u00e0 14.3.0.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "PSS(R)ODMS versions 13.1.x ant\u00e9rieures \u00e0 13.1.12.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808CLA-S1 CC (6GK6015-0AL20-1AB1) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL02-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization versions 14.2.x ant\u00e9rieures \u00e0 14.2.0.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FP03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1512SP-1 PN RAIL (6AG2512-1DK01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RL00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518T-4 PN/DP (6ES7518-4TP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "PSS(R)E V35 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1517TF-3 PN/DP (6ES7517-3UP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515T-2 PN (6ES7515-2TN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK02-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 SAM-L CC (6GK6015-0AL20-0GN1) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808CLA-S5 (6GK6015-0AL20-1AF0) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Cloud Connect 7 CC712 (6GK1411-1AC00) versions ant\u00e9rieures \u00e0 2.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK02-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "PSS(R)CAPE versions 15.x ant\u00e9rieures \u00e0 15.0.22",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516TF-3 PN/DP (6ES7516-3UN00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1515F-2 PN (6AG1515-2FM02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1511-1 PN TX RAIL (6AG2511-1AK01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 ADM CC (6GK6015-0AL20-0GL1) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 ADM (6GK6015-0AL20-0GL0) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP (6AG1516-3FN02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808CLA-S3 (6GK6015-0AL20-1AD0) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511C-1 PN (6ES7511-1CK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1513F-1 PN (6AG1513-1FL02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1511-1 PN (6AG1511-1AK01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "PSS(R)CAPE versions 14.x ant\u00e9rieures \u00e0 14.2023-08-23",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1510SP F-1 PN (6AG1510-1SJ01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AP03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516T-3 PN/DP (6ES7516-3TN00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 CKP CC (6GK6015-0AL20-0GK1) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518-4 PN/DP (6ES7518-4AP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1517F-3 PN/DP (6ES7517-3FP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1513R-1 PN (6ES7513-1RM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP (6ES7518-4FP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "PSS(R)ODMS V13.0 toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC WinCC OA versions 3.19.x ant\u00e9rieures \u00e0 3.19 P006",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Parasolid versions 35.1.x ant\u00e9rieures \u00e0 35.1.184",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL (6AG2512-1SK01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL (6AG2510-1SJ01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL (6AG2515-2FM01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808CLA-S3 CC (6GK6015-0AL20-1AD1) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL (6AG2511-1AK01-1AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1513F-1 PN (6ES7513-1FL02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 ELAN (6GK6015-0AL20-0GP0) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1510SP-1 PN RAIL (6AG2510-1DJ01-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808CLA-P CC (6GK6015-0AL20-1AA1) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RM00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Parasolid versions 35.0.x ant\u00e9rieures \u00e0 35.0.253",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN (6ES7516-2GN00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1515F-2 PN RAIL (6AG2515-2FM02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1518F-4 PN/DP (6AG1518-4FP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511T-1 PN (6ES7511-1TL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1517-3 PN/DP (6ES7517-3AP00-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515TF-2 PN (6ES7515-2UN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 CLOUDCONNECT (6GK6015-0AL20-0GM0) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization versions 14.1.x ant\u00e9rieures \u00e0 14.1.0.11",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 SAM-L (6GK6015-0AL20-0GN0) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 21.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1511F-1 PN (6AG1511-1FK02-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL02-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 Software Controller V2 versions ant\u00e9rieures \u00e0 21.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808LNX (6GK6015-0AL20-0GH0) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1518-4 PN/DP (6AG1518-4AP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1512SP-1 PN (6AG1512-1DK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1512SP F-1 PN (6AG1512-1SK01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 CLOUDCONNECT CC (6GK6015-0AL20-0GM1) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS ET 200SP CPU 1510SP-1 PN (6AG1510-1DJ01-2AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808LNX CC (6GK6015-0AL20-0GH1) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808CLA-P (6GK6015-0AL20-1AA0) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1512C-1 PN (6ES7512-1CK00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1516-3 PN/DP (6AG1516-3AN01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL (6AG2516-3FN02-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "PSS(R)E versions 34.x ant\u00e9rieures \u00e0 34.9.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Parasolid versions 34.1.x ant\u00e9rieures \u00e0 34.1.258",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515R-2 PN (6ES7515-2RN03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL (6AG2515-2RM00-4AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1513-1 PN (6AG1513-1AL01-7AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511TF-1 PN (6ES7511-1UL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM01-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AL03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808CLA-S1 (6GK6015-0AL20-1AB0) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808W10 (6GK6015-0AL20-0GJ0) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN (6ES7513-2GL00-0AB0) versions ant\u00e9rieures \u00e0 2.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 ELAN CC (6GK6015-0AL20-0GP1) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC S7-1500 CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Teamcenter Visualization versions 13.3.x ant\u00e9rieures \u00e0 13.3.0.12",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM APE1808 CKP (6GK6015-0AL20-0GK0) versions ant\u00e9rieures \u00e0 1.0.212N",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIPLUS S7-1500 CPU 1518HF-4 PN (6AG1518-4JP00-4AB0) versions ant\u00e9rieures \u00e0 3.0.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-40728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40728"
    },
    {
      "name": "CVE-2022-35894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35894"
    },
    {
      "name": "CVE-2022-32953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32953"
    },
    {
      "name": "CVE-2023-40724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40724"
    },
    {
      "name": "CVE-2023-27373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27373"
    },
    {
      "name": "CVE-2023-3935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3935"
    },
    {
      "name": "CVE-2023-38072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38072"
    },
    {
      "name": "CVE-2023-38075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38075"
    },
    {
      "name": "CVE-2022-30283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30283"
    },
    {
      "name": "CVE-2023-38073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38073"
    },
    {
      "name": "CVE-2023-40730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40730"
    },
    {
      "name": "CVE-2023-24932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24932"
    },
    {
      "name": "CVE-2023-40732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40732"
    },
    {
      "name": "CVE-2022-32475",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32475"
    },
    {
      "name": "CVE-2022-29275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29275"
    },
    {
      "name": "CVE-2022-35893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35893"
    },
    {
      "name": "CVE-2022-32954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32954"
    },
    {
      "name": "CVE-2023-40725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40725"
    },
    {
      "name": "CVE-2021-38578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38578"
    },
    {
      "name": "CVE-2022-32469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32469"
    },
    {
      "name": "CVE-2022-43958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43958"
    },
    {
      "name": "CVE-2023-41033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41033"
    },
    {
      "name": "CVE-2022-27405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27405"
    },
    {
      "name": "CVE-2022-40982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
    },
    {
      "name": "CVE-2023-38071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38071"
    },
    {
      "name": "CVE-2022-35895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35895"
    },
    {
      "name": "CVE-2023-40726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40726"
    },
    {
      "name": "CVE-2022-24350",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24350"
    },
    {
      "name": "CVE-2023-38070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38070"
    },
    {
      "name": "CVE-2022-32470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32470"
    },
    {
      "name": "CVE-2023-38074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38074"
    },
    {
      "name": "CVE-2022-35896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35896"
    },
    {
      "name": "CVE-2022-36338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36338"
    },
    {
      "name": "CVE-2017-5715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
    },
    {
      "name": "CVE-2023-28831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28831"
    },
    {
      "name": "CVE-2022-32477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32477"
    },
    {
      "name": "CVE-2023-40727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40727"
    },
    {
      "name": "CVE-2022-32471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32471"
    },
    {
      "name": "CVE-2023-40731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40731"
    },
    {
      "name": "CVE-2023-31041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31041"
    },
    {
      "name": "CVE-2023-40729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40729"
    },
    {
      "name": "CVE-2022-30772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30772"
    },
    {
      "name": "CVE-2023-38076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38076"
    },
    {
      "name": "CVE-2023-41032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41032"
    },
    {
      "name": "CVE-2022-24351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24351"
    }
  ],
  "links": [],
  "reference": "CERTFR-2023-AVI-0733",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-09-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Siemens\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-278349 du 12 septembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-981975.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-147266 du 12 septembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-147266.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-240541 du 12 septembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-957369.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-957369 du 12 septembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-240541.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-190839 du 12 septembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-190839.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-981975 du 12 septembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-711309.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-711309 du 12 septembre 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-278349.html"
    }
  ]
}

CERTFR-2023-AVI-0526

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Siemens N/A SIMATIC MV540 H (6GF3540-0GE10) versions antérieures à 3.3.4
Siemens N/A SIMATIC MV560 X (6GF3560-0HE10) versions antérieures à 3.3.4
Siemens N/A RUGGEDCOM ROX RX5000 versions antérieures à 2.16.0
Siemens N/A RUGGEDCOM ROX MX5000 versions antérieures à 2.16.0
Siemens N/A Tecnomatix Plant Simulation versions 2302.x antérieures à 2302.0002
Siemens N/A SIMATIC MV540 S (6GF3540-0CD10) versions antérieures à 3.3.4
Siemens N/A RUGGEDCOM ROX RX1512 versions antérieures à 2.16.0
Siemens N/A RUGGEDCOM ROX RX1501 versions antérieures à 2.16.0
Siemens N/A SIMATIC MV550 H (6GF3550-0GE10) versions antérieures à 3.3.4
Siemens N/A RUGGEDCOM ROX RX1524 versions antérieures à 2.16.0
Siemens N/A SIMATIC MV550 S (6GF3550-0CD10) versions antérieures à 3.3.4
Siemens N/A SIMATIC MV560 U (6GF3560-0LE10) versions antérieures à 3.3.4
Siemens N/A RUGGEDCOM ROX RX1536 versions antérieures à 2.16.0
Siemens N/A RUGGEDCOM ROX RX1400 versions antérieures à 2.16.0
Siemens N/A SIMATIC CN 4100 versions antérieures à 2.5
Siemens N/A RUGGEDCOM ROX RX1511 versions antérieures à 2.16.0
Siemens N/A RUGGEDCOM ROX RX1500 versions antérieures à 2.16.0
Siemens N/A RUGGEDCOM ROX RX1510 versions antérieures à 2.16.0
Siemens N/A Tecnomatix Plant Simulation versions 2201.x antérieures à 2201.0008
Siemens N/A SiPass integrated versions antérieures à 2.90.3.8
Siemens N/A RUGGEDCOM ROX MX5000RE versions antérieures à 2.16.0

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "SIMATIC MV540 H (6GF3540-0GE10) versions ant\u00e9rieures \u00e0 3.3.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV560 X (6GF3560-0HE10) versions ant\u00e9rieures \u00e0 3.3.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX RX5000 versions ant\u00e9rieures \u00e0 2.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX MX5000 versions ant\u00e9rieures \u00e0 2.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Tecnomatix Plant Simulation versions 2302.x ant\u00e9rieures \u00e0 2302.0002",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV540 S (6GF3540-0CD10) versions ant\u00e9rieures \u00e0 3.3.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX RX1512 versions ant\u00e9rieures \u00e0 2.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX RX1501 versions ant\u00e9rieures \u00e0 2.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV550 H (6GF3550-0GE10) versions ant\u00e9rieures \u00e0 3.3.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX RX1524 versions ant\u00e9rieures \u00e0 2.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV550 S (6GF3550-0CD10) versions ant\u00e9rieures \u00e0 3.3.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC MV560 U (6GF3560-0LE10) versions ant\u00e9rieures \u00e0 3.3.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX RX1536 versions ant\u00e9rieures \u00e0 2.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX RX1400 versions ant\u00e9rieures \u00e0 2.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SIMATIC CN 4100 versions ant\u00e9rieures \u00e0 2.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX RX1511 versions ant\u00e9rieures \u00e0 2.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX RX1500 versions ant\u00e9rieures \u00e0 2.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX RX1510 versions ant\u00e9rieures \u00e0 2.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "Tecnomatix Plant Simulation versions 2201.x ant\u00e9rieures \u00e0 2201.0008",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "SiPass integrated versions ant\u00e9rieures \u00e0 2.90.3.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    },
    {
      "description": "RUGGEDCOM ROX MX5000RE versions ant\u00e9rieures \u00e0 2.16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Siemens",
          "scada": true
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-36751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36751"
    },
    {
      "name": "CVE-2023-37247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37247"
    },
    {
      "name": "CVE-2022-27781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
    },
    {
      "name": "CVE-2022-4304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
    },
    {
      "name": "CVE-2023-36755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36755"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2023-36753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36753"
    },
    {
      "name": "CVE-2023-36749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36749"
    },
    {
      "name": "CVE-2022-32207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2022-48285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48285"
    },
    {
      "name": "CVE-2023-36390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36390"
    },
    {
      "name": "CVE-2023-37376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37376"
    },
    {
      "name": "CVE-2023-36389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36389"
    },
    {
      "name": "CVE-2023-36750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36750"
    },
    {
      "name": "CVE-2023-29131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29131"
    },
    {
      "name": "CVE-2022-2068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
    },
    {
      "name": "CVE-2023-36521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36521"
    },
    {
      "name": "CVE-2022-27782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
    },
    {
      "name": "CVE-2022-22576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
    },
    {
      "name": "CVE-2021-22946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
    },
    {
      "name": "CVE-2023-35920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35920"
    },
    {
      "name": "CVE-2023-29130",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29130"
    },
    {
      "name": "CVE-2022-29562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29562"
    },
    {
      "name": "CVE-2021-46828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
    },
    {
      "name": "CVE-2019-14196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14196"
    },
    {
      "name": "CVE-2023-35921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35921"
    },
    {
      "name": "CVE-2023-36754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36754"
    },
    {
      "name": "CVE-2022-37434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
    },
    {
      "name": "CVE-2023-36752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36752"
    },
    {
      "name": "CVE-2022-1012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2023-36386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36386"
    },
    {
      "name": "CVE-2023-37374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37374"
    },
    {
      "name": "CVE-2022-36946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
    },
    {
      "name": "CVE-2023-37375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37375"
    },
    {
      "name": "CVE-2022-29561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29561"
    },
    {
      "name": "CVE-2022-30767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30767"
    },
    {
      "name": "CVE-2023-36748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36748"
    },
    {
      "name": "CVE-2023-37248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37248"
    },
    {
      "name": "CVE-2022-31810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31810"
    },
    {
      "name": "CVE-2023-37246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37246"
    },
    {
      "name": "CVE-2022-24903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
    }
  ],
  "links": [],
  "reference": "CERTFR-2023-AVI-0526",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-07-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-764801 du 11 juillet 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-764801.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-561322 du 11 juillet 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-561322.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-313488 du 11 juillet 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-313488.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-924149 du 11 juillet 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-924149.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-146325 du 11 juillet 2023",
      "url": "https://cert-portal.siemens.com/productcert/html/ssa-146325.html"
    }
  ]
}