Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2015-2177
Siemens SIMATIC S7-300 CPU devices allow remote attackers to cause a denial of service (defect-mode transition) via crafted packets on (1) TCP port 102 or (2) Profibus.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.506
EPSS Ranking
97.7%
CVSS Severity
CVSS v2 Score
7.8
References
http://www.securityfocus.com/bid/72973
http://www.securitytracker.com/id/1032040
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-987029.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-987029.pdf
https://ics-cert.us-cert.gov/advisories/ICSA-15-064-04
https://www.exploit-db.com/exploits/44802/
http://www.securityfocus.com/bid/72973
http://www.securitytracker.com/id/1032040
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-987029.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-987029.pdf
https://ics-cert.us-cert.gov/advisories/ICSA-15-064-04
https://www.exploit-db.com/exploits/44802/
Products affected by CVE-2015-2177
Siemens
»
Simatic S7-300 Cpu
»
Version:
N/A
cpe:2.3:h:siemens:simatic_s7-300_cpu:-
Siemens
»
Simatic S7-300 Cpu Firmware
»
Version:
N/A
cpe:2.3:o:siemens:simatic_s7-300_cpu_firmware:-
Siemens
»
Simatic S7-300 Cpu Firmware
»
Version:
3.2.17
cpe:2.3:o:siemens:simatic_s7-300_cpu_firmware:3.2.17
Siemens
»
Simatic S7-300 Cpu Firmware
»
Version:
3.3.17
cpe:2.3:o:siemens:simatic_s7-300_cpu_firmware:3.3.17
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved