{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T03:24:17.649","vulnerabilities":[{"cve":{"id":"CVE-2018-13805","sourceIdentifier":"productcert@siemens.com","published":"2018-10-10T17:29:04.170","lastModified":"2024-11-21T03:48:05.947","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in SIMATIC ET 200SP Open Controller (All versions >= V2.0 and < V2.1.6), SIMATIC S7-1500 Software Controller (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 incl. F (All versions >= V2.0 and < V2.5). An attacker can cause a denial-of-service condition on the network stack by sending a large number of specially crafted packets to the PLC. The PLC will lose its ability to communicate over the network. This vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no privileges and no user interaction. An attacker could use this vulnerability to compromise availability of the network connectivity. At the time of advisory publication no public exploitation of this vulnerability was known."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en SIMATIC ET 200SP Open Controller (todas las versiones desde la V2.0 y antes de la V2.1.6), SIMATIC S7-1500 Software Controller (todas las versiones desde la V2.0 y antes de la V2.5) y SIMATIC S7-1500 incl. F (todas las versiones desde la V2.0 y antes de la V2.5). Un atacante puede provocar una condición de denegación de servicio (DoS) en la pila de red mediante el envío de un gran número de paquetes especialmente manipulados al PLC. El PLC perderá su capacidad de comunicarse a través de la red. Esta vulnerabilidad podría ser explotada por atacantes con acceso de red a los sistemas afectados. Su explotación con éxito no requiere privilegios de usuario ni interacción. Un atacante podría usar la vulnerabilidad para comprometer la disponibilidad de la conectividad de red. En el momento de la publicación del advisory, no se conoce ninguna explotación pública de la vulnerabilidad."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_et_200sp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","matchCriteriaId":"0E475B89-0EDF-4260-BAF9-B948C05F74C7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_et_200sp:-:*:*:*:*:*:*:*","matchCriteriaId":"691CA334-4394-4ED6-B417-F67FC92228AE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndExcluding":"2.5","matchCriteriaId":"C1AD7226-DED7-4760-9428-43381006FE42"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*","matchCriteriaId":"30DDEA9B-E1BF-4572-8E12-D13C54603E77"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_s7-1500f_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndExcluding":"2.5","matchCriteriaId":"4E4296D7-D658-43B9-A750-DDF6ED7D332F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:simatic_s7-1500f:-:*:*:*:*:*:*:*","matchCriteriaId":"A255BC06-2776-4111-A525-76B17371B295"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-347726.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-347726.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}