Vulnerability Details : CVE-2020-7587
A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions < V2.6), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending multiple specially crafted packets to the affected service could cause a partial remote denial-of-service, that would cause the service to restart itself. On some cases the vulnerability could leak random information from the remote service.
Vulnerability category: Denial of service
Products affected by CVE-2020-7587
- cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_step_7:16:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_step_7:16:update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_step_7:15.1:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_it_production_suite:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_quality:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_neo:3.0:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_execution_discrete:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_execution_foundation:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_execution_process:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:opcenter_rd\&l:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_notifier_server:*:*:*:*:*:windows:*:*
- cpe:2.3:a:siemens:simocode_es:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simocode_es:15.1:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simocode_es:16:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:soft_starter_es:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:soft_starter_es:15.1:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_it_lms:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-7587
0.25%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-7587
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:P |
10.0
|
4.9
|
NIST | |
8.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L |
3.9
|
4.2
|
NIST |
CWE ids for CVE-2020-7587
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by:
- nvd@nist.gov (Secondary)
- productcert@siemens.com (Primary)
References for CVE-2020-7587
-
https://cert-portal.siemens.com/productcert/pdf/ssa-841348.pdf
Vendor Advisory
Jump to