A vulnerability has been identified in LOGO! CMR2020 (All versions < V2.2), LOGO! CMR2040 (All versions < V2.2), SIMATIC RTU3010C (All versions < V4.0.9), SIMATIC RTU3030C (All versions < V4.0.9), SIMATIC RTU3031C (All versions < V4.0.9), SIMATIC RTU3041C (All versions < V4.0.9). The underlying TCP/IP stack does not properly calculate the random numbers used as ISN (Initial Sequence Numbers). An adjacent attacker with network access to the LAN interface could interfere with traffic, spoof the connection and gain access to sensitive information.
                
            References
                    | Link | Resource | 
|---|---|
| https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf | Patch Vendor Advisory | 
| https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
Configuration 3 (hide)
| AND | 
 
 | 
Configuration 4 (hide)
| AND | 
 
 | 
Configuration 5 (hide)
| AND | 
 
 | 
Configuration 6 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 06:14
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf - Patch, Vendor Advisory | 
Information
                Published : 2021-09-14 11:15
Updated : 2024-11-21 06:14
NVD link : CVE-2021-37186
Mitre link : CVE-2021-37186
CVE.ORG link : CVE-2021-37186
JSON object : View
Products Affected
                siemens
- logo\!_cmr2040_firmware
- simatic_rtu3030c
- simatic_rtu3030c_firmware
- simatic_rtu3010c
- logo\!_cmr2040
- logo\!_cmr2020
- logo\!_cmr2020_firmware
- simatic_rtu3010c_firmware
- simatic_rtu3041c_firmware
- simatic_rtu3041c
- simatic_rtu3031c_firmware
- simatic_rtu3031c
CWE
                
                    
                        
                        CWE-330
                        
            Use of Insufficiently Random Values
