CVE-2019-19281

moderate-risk
Published 2020-03-10

A vulnerability has been identified in SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions >= V2.5 and < V20.8), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.5 and < V2.8), SIMATIC S7-1500 Software Controller (All versions >= V2.5 and < V20.8). Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a Denial-of-Service condition. The vulnerability can be triggered if specially crafted UDP packets are sent to the device. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise the device availability.

Do I need to act?

-
0.63% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10 High
NETWORK / LOW complexity

Affected Products (14)

Simatic Et 200Sp Open Controller Cpu 1515Sp Pc2 Firmware
Simatic S7-1500 Cpu 1511-1 Pn Firmware
Simatic S7-1500 Cpu 1513-1 Pn Firmware
Simatic S7-1500 Cpu 1515-2 Pn Firmware
Simatic S7-1500 Cpu 1516-3 Pn Firmware
Simatic S7-1500 Cpu 1516-3 Dp Firmware
Simatic S7-1500 Cpu 1517-3 Pn Firmware
Simatic S7-1500 Cpu 1517-3 Dp Firmware
Simatic S7-1500 Cpu 1518-4 Pn Firmware
Simatic S7-1500 Cpu 1518-4 Dp Firmware
Simatic S7-1500 Cpu 1507S Firmware
Simatic S7-1500 Cpu 1508S Firmware
Simatic S7-1500 Cpu 1507S F Firmware
Simatic S7-1500 Cpu 1508S F Firmware

Affected Vendors

46
/ 100
moderate-risk
Severity 26/34 · High
Exploitability 2/34 · Minimal
Exposure 18/34 · Moderate