CVE-2020-25241

moderate-risk
Published 2021-03-15

A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.

Do I need to act?

-
0.39% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10 High
NETWORK / LOW complexity

Affected Products (7)

Simatic Mv440 Sr Firmware
Simatic Mv440 Hr Firmware
Simatic Mv440 Ur Firmware
Simatic Mv420 Sr-B Firmware
Simatic Mv420 Sr-P Firmware
Simatic Mv420 Sr-B Body Firmware
Simatic Mv420 Sr-P Body Firmware

Affected Vendors

41
/ 100
moderate-risk
Severity 26/34 · High
Exploitability 1/34 · Minimal
Exposure 14/34 · Moderate