Vulnerabilities (CVE)

Filtered by vendor Siemens Subscribe
Filtered by product Simatic Step 7
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-1601 1 Siemens 1 Simatic Step 7 2016-11-28 6.8 MEDIUM N/A
Siemens SIMATIC STEP 7 (TIA Portal) 12 and 13 before 13 SP1 Upd1 allows man-in-the-middle attackers to obtain sensitive information or modify transmitted data via unspecified vectors.
CVE-2015-1594 1 Siemens 5 Simatic Cfc, Simatic Prosave, Simatic Step 7 and 2 more 2016-08-24 6.9 MEDIUM N/A
Untrusted search path vulnerability in Siemens SIMATIC ProSave before 13 SP1; SIMATIC CFC before 8.0 SP4 Upd9 and 8.1 before Upd1; SIMATIC STEP 7 before 5.5 SP1 HF2, 5.5 SP2 before HF7, 5.5 SP3, and 5.5 SP4 before HF4; SIMOTION Scout before 4.4; and STARTER before 4.4 HF3 allows local users to gain privileges via a Trojan horse application file.
CVE-2015-1602 1 Siemens 1 Simatic Step 7 2015-04-23 2.1 LOW N/A
Siemens SIMATIC STEP 7 (TIA Portal) 12 and 13 before 13 SP1 Upd1 improperly stores password data within project files, which makes it easier for local users to determine cleartext (1) protection-level passwords or (2) web-server passwords by leveraging the ability to read these files.
CVE-2015-1356 1 Siemens 1 Simatic Step 7 2015-02-18 4.4 MEDIUM N/A
Siemens SIMATIC STEP 7 (TIA Portal) before 13 SP1 determines a user's privileges on the basis of project-file fields that lack integrity protection, which allows remote attackers to establish arbitrary authorization data via a modified file.
CVE-2015-1355 1 Siemens 1 Simatic Step 7 2015-02-18 2.1 LOW N/A
Siemens SIMATIC STEP 7 (TIA Portal) before 13 SP1 uses a weak password-hash algorithm, which makes it easier for local users to determine cleartext passwords by reading a project file and conducting a brute-force attack.
CVE-2012-3015 1 Siemens 2 Simatic Pcs7, Simatic Step 7 2012-07-30 6.9 MEDIUM N/A
Untrusted search path vulnerability in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier and other products, allows local users to gain privileges via a Trojan horse DLL in a STEP7 project folder.