Vulnerability Details : CVE-2021-40363
A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions <= V17 Update 4), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system.
Products affected by CVE-2021-40363
- cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:update_1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:13:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:13:sp1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:14.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_3:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_4:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:16:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp1_update2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update10:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update11:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update12:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update13:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update3:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update4:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update5:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update6:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update7:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update8:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update9:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update3:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update4:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.5:sp2_update5:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:13:sp2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:16:update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:16:update2:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:16:update3:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:16:update4:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:17:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:17:update1:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_6:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:15.1:update_5:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update14:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update15:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update16:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update17:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_wincc:7.4:sp1_update18:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_7:9.0:-:*:*:*:*:*:*
- cpe:2.3:a:siemens:simatic_pcs_7:9.1:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-40363
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-40363
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2021-40363
-
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.Assigned by: nvd@nist.gov (Secondary)
-
The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.Assigned by: productcert@siemens.com (Primary)
References for CVE-2021-40363
-
https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf
Patch;Vendor Advisory
Jump to