Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-35920 : What You Need to Know

Learn about CVE-2023-35920 affecting Siemens SIMATIC MV540 H, SIMATIC MV540 S, SIMATIC MV550 H, SIMATIC MV550 S, SIMATIC MV560 U, SIMATIC MV560 X devices, leading to denial of service attacks. Read for mitigation steps.

A vulnerability has been identified in SIMATIC MV540 H, SIMATIC MV540 S, SIMATIC MV550 H, SIMATIC MV550 S, SIMATIC MV560 U, SIMATIC MV560 X devices, making them susceptible to a denial of service attack.

Understanding CVE-2023-35920

This CVE identifies a vulnerability in Siemens' SIMATIC MV series devices that could allow an unauthenticated remote attacker to disrupt the devices' operation.

What is CVE-2023-35920?

The vulnerability affects SIMATIC MV540 H, SIMATIC MV540 S, SIMATIC MV550 H, SIMATIC MV550 S, SIMATIC MV560 U, and SIMATIC MV560 X devices, potentially leading to a denial of service condition when receiving specially crafted IP packets.

The Impact of CVE-2023-35920

The vulnerability could be exploited by a remote attacker to manipulate the affected devices, forcing them into a state requiring manual restart and causing service disruption.

Technical Details of CVE-2023-35920

This CVE has a base CVSS V3.1 score of 7.5, categorizing it as a high-severity vulnerability. The root cause is the devices' inability to handle malicious IP packets, leading to denial of service.

Vulnerability Description

The vulnerability resides in all versions of SIMATIC MV540 H, SIMATIC MV540 S, SIMATIC MV550 H, SIMATIC MV550 S, SIMATIC MV560 U, and SIMATIC MV560 X devices below V3.3.4, making them susceptible to a denial of service attack.

Affected Systems and Versions

All versions of the aforementioned Siemens SIMATIC MV series devices below V3.3.4 are impacted by this vulnerability, leaving them exposed to remote denial of service attacks.

Exploitation Mechanism

By sending specially crafted IP packets to the affected devices, an unauthenticated remote attacker can trigger the denial of service condition, necessitating manual restart for recovery.

Mitigation and Prevention

To safeguard against CVE-2023-35920, immediate action and long-term security practices are crucial.

Immediate Steps to Take

Ensure perimeter security measures, restrict network access, and deploy patches or updates provided by Siemens to mitigate the vulnerability.

Long-Term Security Practices

Regularly monitor and update firmware, conduct security assessments, and follow best practices for network segmentation to enhance overall resilience.

Patching and Updates

Stay informed about security advisories from Siemens and promptly apply recommended patches or updates to address vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now