{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T19:27:59.122","vulnerabilities":[{"cve":{"id":"CVE-2021-37172","sourceIdentifier":"productcert@siemens.com","published":"2021-08-10T11:15:09.280","lastModified":"2024-11-21T06:14:47.323","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (V4.5.0). Affected devices fail to authenticate against configured passwords when provisioned using TIA Portal V13. This could allow an attacker using TIA Portal V13 or later versions to bypass authentication and download arbitrary programs to the PLC. The vulnerability does not occur when TIA Portal V13 SP1 or any later version was used to provision the device."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en la familia de CPUs SIMATIC S7-1200 (Incluyendo las variantes SIPLUS) (V4.5.0). Los dispositivos afectados no se autentican con las contraseñas configuradas cuando se aprovisionan con TIA Portal V13. Esto podría permitir a un atacante que utilice TIA Portal V13 o versiones posteriores eludir la autenticación y descargar programas arbitrarios en el PLC. La vulnerabilidad no se produce cuando se utiliza TIA Portal V13 SP1 o cualquier versión posterior para aprovisionar el dispositivo"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:simatic_s7-1200_cpu_firmware:4.5.0:*:*:*:*:*:*:*","matchCriteriaId":"F6394ED6-C200-4673-882B-7FC2A4C89C42"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:cpu_1211c:-:*:*:*:*:*:*:*","matchCriteriaId":"172D341B-D863-4C24-9B6E-633EBE87C8C9"},{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:cpu_1212c:-:*:*:*:*:*:*:*","matchCriteriaId":"1B475E4F-EE4F-4435-9F0B-8E4FA35377BE"},{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:cpu_1212fc:-:*:*:*:*:*:*:*","matchCriteriaId":"1402D624-5AF3-4E25-A2B0-9D9F214EE8FE"},{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:cpu_1214c:-:*:*:*:*:*:*:*","matchCriteriaId":"1F714315-8BEB-4BD3-BE59-C6649A0A105E"},{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:cpu_1214fc:-:*:*:*:*:*:*:*","matchCriteriaId":"2A988C9F-60DF-4BC5-A890-F03F445DD9BD"},{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:cpu_1215c:-:*:*:*:*:*:*:*","matchCriteriaId":"C90820D3-3F3E-4DC4-9DCE-A498CC26268D"},{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:cpu_1215fc:-:*:*:*:*:*:*:*","matchCriteriaId":"BAF22AB6-6DAA-4983-99DB-4F2A2E76856F"},{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:cpu_1217c:-:*:*:*:*:*:*:*","matchCriteriaId":"4C95F12D-563A-4915-9F26-A461EB4F8FA1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:siemens:simatic_step_7_\\(tia_portal\\):*:*:*:*:*:*:*:*","versionEndIncluding":"13.0","matchCriteriaId":"8EA4509B-FC68-42FC-9CB6-ED3C3E65E153"}]}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-830194.pdf","source":"productcert@siemens.com","tags":["Patch","Vendor Advisory"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-830194.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}