Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
4 vulnerabilities found for simatic_rtu3000c_firmware by siemens
CVE-2020-36478 (GCVE-0-2020-36478)
Vulnerability from nvd – Published: 2021-08-23 00:00 – Updated: 2024-08-04 17:30
VLAI?
Summary
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:30:07.313Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/issues/3629"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf"
},
{
"name": "[debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html"
},
{
"name": "[debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-26T00:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0"
},
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9"
},
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18"
},
{
"url": "https://github.com/ARMmbed/mbedtls/issues/3629"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf"
},
{
"name": "[debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html"
},
{
"name": "[debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-36478",
"datePublished": "2021-08-23T00:00:00.000Z",
"dateReserved": "2021-08-23T00:00:00.000Z",
"dateUpdated": "2024-08-04T17:30:07.313Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-36475 (GCVE-0-2020-36475)
Vulnerability from nvd – Published: 2021-08-23 00:00 – Updated: 2024-08-04 17:30
VLAI?
Summary
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:30:08.223Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf"
},
{
"name": "[debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html"
},
{
"name": "[debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-26T00:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0"
},
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9"
},
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf"
},
{
"name": "[debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html"
},
{
"name": "[debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-36475",
"datePublished": "2021-08-23T00:00:00.000Z",
"dateReserved": "2021-08-23T00:00:00.000Z",
"dateUpdated": "2024-08-04T17:30:08.223Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-36478 (GCVE-0-2020-36478)
Vulnerability from cvelistv5 – Published: 2021-08-23 00:00 – Updated: 2024-08-04 17:30
VLAI?
Summary
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:30:07.313Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/issues/3629"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf"
},
{
"name": "[debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html"
},
{
"name": "[debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-26T00:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0"
},
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9"
},
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18"
},
{
"url": "https://github.com/ARMmbed/mbedtls/issues/3629"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf"
},
{
"name": "[debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html"
},
{
"name": "[debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-36478",
"datePublished": "2021-08-23T00:00:00.000Z",
"dateReserved": "2021-08-23T00:00:00.000Z",
"dateUpdated": "2024-08-04T17:30:07.313Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-36475 (GCVE-0-2020-36475)
Vulnerability from cvelistv5 – Published: 2021-08-23 00:00 – Updated: 2024-08-04 17:30
VLAI?
Summary
An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:30:08.223Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf"
},
{
"name": "[debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html"
},
{
"name": "[debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). The calculations performed by mbedtls_mpi_exp_mod are not limited; thus, supplying overly large parameters could lead to denial of service when generating Diffie-Hellman key pairs."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-26T00:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0"
},
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.9"
},
{
"url": "https://github.com/ARMmbed/mbedtls/releases/tag/v2.7.18"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-756638.pdf"
},
{
"name": "[debian-lts-announce] 20211123 [SECURITY] [DLA 2826-1] mbedtls security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00021.html"
},
{
"name": "[debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00036.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-36475",
"datePublished": "2021-08-23T00:00:00.000Z",
"dateReserved": "2021-08-23T00:00:00.000Z",
"dateUpdated": "2024-08-04T17:30:08.223Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}