User Account Password Hash Exposure in SIMATIC Products from Siemens
CVE-2021-40360

8.8HIGH

Key Information:

Vendor
Siemens
Vendor
CVE Published:
9 February 2022

Summary

A security flaw has been detected in various versions of Siemens SIMATIC products, where the password hash of a local user account can be exposed via a public API. An attacker, with authentication privileges, can exploit this vulnerability to perform a brute force attack on the password hash, potentially gaining unauthorized access to the affected systems. This vulnerability could lead to significant risks in environments relying on these industrial control systems.

Affected Version(s)

SIMATIC PCS 7 V8.2 All versions

SIMATIC PCS 7 V9.0 All versions

SIMATIC PCS 7 V9.1 All versions < V9.1 SP1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.