CVE-2020-25241
moderate-risk
Published 2021-03-15
A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.
Do I need to act?
-
0.39% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (7)
Simatic Mv440 Sr Firmware
Simatic Mv440 Hr Firmware
Simatic Mv440 Ur Firmware
Simatic Mv420 Sr-B Firmware
Simatic Mv420 Sr-P Firmware
Simatic Mv420 Sr-B Body Firmware
Simatic Mv420 Sr-P Body Firmware
Affected Vendors
References (2)
Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf
Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf
41
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
1/34 · Minimal
Exposure
14/34 · Moderate