CVE-2021-3449

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).

References

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148

https://www.openssl.org/news/secadv/20210325.txt

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd

https://www.debian.org/security/2021/dsa-4875

https://security.netapp.com/advisory/ntap-20210326-0006/

https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc

http://www.openwall.com/lists/oss-security/2021/03/27/1

http://www.openwall.com/lists/oss-security/2021/03/27/2

http://www.openwall.com/lists/oss-security/2021/03/28/3

http://www.openwall.com/lists/oss-security/2021/03/28/4

https://security.gentoo.org/glsa/202103-03

https://www.tenable.com/security/tns-2021-06

https://www.tenable.com/security/tns-2021-05

https://lists.fedoraproject.org/archives/list/[email protected]/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/

https://kc.mcafee.com/corporate/index?page=content&id=SB10356

https://www.tenable.com/security/tns-2021-09

https://security.netapp.com/advisory/ntap-20210513-0002/

https://www.tenable.com/security/tns-2021-10

https://www.oracle.com/security-alerts/cpuApr2021.html

https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013

https://www.oracle.com//security-alerts/cpujul2021.html

https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html

https://www.oracle.com/security-alerts/cpuoct2021.html

Details

Source: MITRE

Published: 2021-03-25

Updated: 2021-10-20

Type: CWE-476

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 5.9

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 2.2

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*

cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:*

cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:* versions up to 8.13.1 (inclusive)

cpe:2.3:a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:*

cpe:2.3:a:tenable:nessus_network_monitor:5.11.1:*:*:*:*:*:*:*

cpe:2.3:a:tenable:nessus_network_monitor:5.12.0:*:*:*:*:*:*:*

cpe:2.3:a:tenable:nessus_network_monitor:5.12.1:*:*:*:*:*:*:*

cpe:2.3:a:tenable:nessus_network_monitor:5.13.0:*:*:*:*:*:*:*

cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:* versions from 5.13.0 to 5.17.0 (inclusive)

Configuration 6

OR

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 7

OR

cpe:2.3:a:mcafee:web_gateway:8.2.19:*:*:*:*:*:*:*

cpe:2.3:a:mcafee:web_gateway:9.2.10:*:*:*:*:*:*:*

cpe:2.3:a:mcafee:web_gateway:10.1.1:*:*:*:*:*:*:*

cpe:2.3:a:mcafee:web_gateway_cloud_service:8.2.19:*:*:*:*:*:*:*

cpe:2.3:a:mcafee:web_gateway_cloud_service:9.2.10:*:*:*:*:*:*:*

cpe:2.3:a:mcafee:web_gateway_cloud_service:10.1.1:*:*:*:*:*:*:*

Configuration 8

AND

OR

cpe:2.3:o:checkpoint:quantum_security_management_firmware:r80.40:*:*:*:*:*:*:*

cpe:2.3:o:checkpoint:quantum_security_management_firmware:r81:*:*:*:*:*:*:*

OR

cpe:2.3:h:checkpoint:quantum_security_management:-:*:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:o:checkpoint:multi-domain_management_firmware:r80.40:*:*:*:*:*:*:*

cpe:2.3:o:checkpoint:multi-domain_management_firmware:r81:*:*:*:*:*:*:*

OR

cpe:2.3:h:checkpoint:multi-domain_management:-:*:*:*:*:*:*:*

Configuration 10

AND

OR

cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*

cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r81:*:*:*:*:*:*:*

OR

cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*

Configuration 11

OR

cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*

cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*

cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*

cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:* versions up to 8.0.23 (inclusive)

cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* versions up to 5.7.33 (inclusive)

cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* versions from 8.0.15 to 8.0.23 (inclusive)

cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:* versions up to 8.0.23 (inclusive)

cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*

cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*

cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*

cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*

cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

Configuration 12

AND

OR

cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:sonicwall:sma100:-:*:*:*:*:*:*:*

Configuration 13

OR

cpe:2.3:a:sonicwall:capture_client:3.5:*:*:*:*:*:*:*

cpe:2.3:o:sonicwall:sonicos:7.0.1.0:*:*:*:*:*:*:*

Configuration 14

AND

OR

cpe:2.3:o:siemens:ruggedcom_rcm1224_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:ruggedcom_rcm1224:-:*:*:*:*:*:*:*

Configuration 15

AND

OR

cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*

Configuration 16

AND

OR

cpe:2.3:o:siemens:scalance_m-800_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_m-800:-:*:*:*:*:*:*:*

Configuration 17

AND

OR

cpe:2.3:o:siemens:scalance_s602_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_s602:-:*:*:*:*:*:*:*

Configuration 18

AND

OR

cpe:2.3:o:siemens:scalance_s612_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_s612:-:*:*:*:*:*:*:*

Configuration 19

AND

OR

cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*

Configuration 20

AND

OR

cpe:2.3:o:siemens:scalance_s623_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_s623:-:*:*:*:*:*:*:*

Configuration 21

AND

OR

cpe:2.3:o:siemens:scalance_s627-2m_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_s627-2m:-:*:*:*:*:*:*:*

Configuration 22

AND

OR

cpe:2.3:o:siemens:scalance_sc-600_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_sc-600:-:*:*:*:*:*:*:*

Configuration 23

AND

OR

cpe:2.3:o:siemens:scalance_w700_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_w700:-:*:*:*:*:*:*:*

Configuration 24

AND

OR

cpe:2.3:o:siemens:scalance_w1700_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_w1700:-:*:*:*:*:*:*:*

Configuration 25

AND

OR

cpe:2.3:o:siemens:scalance_xb-200_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_xb-200:-:*:*:*:*:*:*:*

Configuration 26

AND

OR

cpe:2.3:o:siemens:scalance_xc-200_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_xc-200:-:*:*:*:*:*:*:*

Configuration 27

AND

OR

cpe:2.3:o:siemens:scalance_xf-200ba_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_xf-200ba:-:*:*:*:*:*:*:*

Configuration 28

AND

OR

cpe:2.3:o:siemens:scalance_xm-400_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_xm-400:-:*:*:*:*:*:*:*

Configuration 29

AND

OR

cpe:2.3:o:siemens:scalance_xp-200_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_xp-200:-:*:*:*:*:*:*:*

Configuration 30

AND

OR

cpe:2.3:o:siemens:scalance_xr-300wg_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_xr-300wg:-:*:*:*:*:*:*:*

Configuration 31

AND

OR

cpe:2.3:o:siemens:scalance_xr524-8c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_xr524-8c:-:*:*:*:*:*:*:*

Configuration 32

AND

OR

cpe:2.3:o:siemens:scalance_xr526-8c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_xr526-8c:-:*:*:*:*:*:*:*

Configuration 33

AND

OR

cpe:2.3:o:siemens:scalance_xr528-6m_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_xr528-6m:-:*:*:*:*:*:*:*

Configuration 34

AND

OR

cpe:2.3:o:siemens:scalance_xr552-12_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:scalance_xr552-12:-:*:*:*:*:*:*:*

Configuration 35

AND

OR

cpe:2.3:o:siemens:simatic_cloud_connect_7_firmware:-:*:*:*:*:*:*:*

cpe:2.3:o:siemens:simatic_cloud_connect_7_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_cloud_connect_7:-:*:*:*:*:*:*:*

Configuration 36

AND

OR

cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:-:*:*:*:*:*:*:*

cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_v2_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_cp_1242-7_gprs_v2:-:*:*:*:*:*:*:*

Configuration 37

AND

OR

cpe:2.3:o:siemens:simatic_hmi_basic_panels_2nd_generation_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_hmi_basic_panels_2nd_generation:-:*:*:*:*:*:*:*

Configuration 38

AND

OR

cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels:-:*:*:*:*:*:*:*

Configuration 39

AND

OR

cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels:-:*:*:*:*:*:*:*

Configuration 40

AND

OR

cpe:2.3:o:siemens:simatic_mv500_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_mv500:-:*:*:*:*:*:*:*

Configuration 41

AND

OR

cpe:2.3:o:siemens:simatic_net_cp_1243-1_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_net_cp_1243-1:-:*:*:*:*:*:*:*

Configuration 42

AND

OR

cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_eu_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_eu:-:*:*:*:*:*:*:*

Configuration 43

AND

OR

cpe:2.3:o:siemens:simatic_net_cp1243-7_lte_us_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_net_cp1243-7_lte_us:-:*:*:*:*:*:*:*

Configuration 44

AND

OR

cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*

Configuration 45

AND

OR

cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_irc_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_net_cp_1542sp-1_irc:-:*:*:*:*:*:*:*

Configuration 46

AND

OR

cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*

Configuration 47

AND

OR

cpe:2.3:o:siemens:simatic_net_cp_1543sp-1_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_net_cp_1543sp-1:-:*:*:*:*:*:*:*

Configuration 48

AND

OR

cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*

Configuration 49

AND

OR

cpe:2.3:o:siemens:simatic_pcs_7_telecontrol_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_pcs_7_telecontrol:-:*:*:*:*:*:*:*

Configuration 50

AND

OR

cpe:2.3:o:siemens:simatic_pcs_neo_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_pcs_neo:-:*:*:*:*:*:*:*

Configuration 51

AND

OR

cpe:2.3:o:siemens:simatic_pdm_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_pdm:-:*:*:*:*:*:*:*

Configuration 52

AND

OR

cpe:2.3:o:siemens:simatic_process_historian_opc_ua_server_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_process_historian_opc_ua_server:-:*:*:*:*:*:*:*

Configuration 53

AND

OR

cpe:2.3:o:siemens:simatic_rf166c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_rf166c:-:*:*:*:*:*:*:*

Configuration 54

AND

OR

cpe:2.3:o:siemens:simatic_rf185c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_rf185c:-:*:*:*:*:*:*:*

Configuration 55

AND

OR

cpe:2.3:o:siemens:simatic_rf186c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_rf186c:-:*:*:*:*:*:*:*

Configuration 56

AND

OR

cpe:2.3:o:siemens:simatic_rf186ci_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_rf186ci:-:*:*:*:*:*:*:*

Configuration 57

AND

OR

cpe:2.3:o:siemens:simatic_rf188c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_rf188c:-:*:*:*:*:*:*:*

Configuration 58

AND

OR

cpe:2.3:o:siemens:simatic_rf188ci_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_rf188ci:-:*:*:*:*:*:*:*

Configuration 59

AND

OR

cpe:2.3:o:siemens:simatic_rf360r_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_rf360r:-:*:*:*:*:*:*:*

Configuration 60

AND

OR

cpe:2.3:o:siemens:simatic_s7-1200_cpu_1211c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1200_cpu_1211c:-:*:*:*:*:*:*:*

Configuration 61

AND

OR

cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212c:-:*:*:*:*:*:*:*

Configuration 62

AND

OR

cpe:2.3:o:siemens:simatic_s7-1200_cpu_1212fc_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1200_cpu_1212fc:-:*:*:*:*:*:*:*

Configuration 63

AND

OR

cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:*

Configuration 64

AND

OR

cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214c:-:*:*:*:*:*:*:*

Configuration 65

AND

OR

cpe:2.3:o:siemens:simatic_s7-1200_cpu_1214_fc_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1200_cpu_1214_fc:-:*:*:*:*:*:*:*

Configuration 66

AND

OR

cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215_fc_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215_fc:-:*:*:*:*:*:*:*

Configuration 67

AND

OR

cpe:2.3:o:siemens:simatic_s7-1200_cpu_1215c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1200_cpu_1215c:-:*:*:*:*:*:*:*

Configuration 68

AND

OR

cpe:2.3:o:siemens:simatic_s7-1200_cpu_1217c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1200_cpu_1217c:-:*:*:*:*:*:*:*

Configuration 69

AND

OR

cpe:2.3:o:siemens:simatic_s7-1500_cpu_1518-4_pn\/dp_mfp_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1500_cpu_1518-4_pn\/dp_mfp:-:*:*:*:*:*:*:*

Configuration 70

AND

OR

cpe:2.3:o:siemens:sinamics_connect_300_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:sinamics_connect_300:-:*:*:*:*:*:*:*

Configuration 71

AND

OR

cpe:2.3:o:siemens:tim_1531_irc_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:tim_1531_irc:-:*:*:*:*:*:*:*

Configuration 72

OR

cpe:2.3:a:siemens:simatic_logon:1.5:sp3_update_1:*:*:*:*:*:*

cpe:2.3:a:siemens:simatic_logon:*:*:*:*:*:*:*:*

cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*

cpe:2.3:a:siemens:simatic_wincc_telecontrol:-:*:*:*:*:*:*:*

cpe:2.3:a:siemens:sinec_nms:1.0:-:*:*:*:*:*:*

cpe:2.3:a:siemens:sinec_nms:1.0:sp1:*:*:*:*:*:*

cpe:2.3:a:siemens:sinec_pni:-:*:*:*:*:*:*:*

cpe:2.3:a:siemens:sinema_server:14.0:-:*:*:*:*:*:*

cpe:2.3:a:siemens:sinema_server:14.0:sp1:*:*:*:*:*:*

cpe:2.3:a:siemens:sinema_server:14.0:sp2:*:*:*:*:*:*

cpe:2.3:a:siemens:sinema_server:14.0:sp2_update1:*:*:*:*:*:*

cpe:2.3:a:siemens:sinema_server:14.0:sp2_update2:*:*:*:*:*:*

cpe:2.3:a:siemens:sinumerik_opc_ua_server:*:*:*:*:*:*:*:*

cpe:2.3:a:siemens:tia_administrator:*:*:*:*:*:*:*:*

Tenable Plugins

View all (50 total)

IDNameProductFamilySeverity
154051Security Updates for Microsoft Visual Studio Products (October 2021)NessusWindows : Microsoft Bulletins
high
152986Tenable SecurityCenter < 5.19.0 Multiple Vulnerabilities (TNS-2021-14)NessusMisc.
high
152966Debian DLA-2751-1 : postgresql-9.6 - LTS security updateNessusDebian Local Security Checks
medium
152539Ubuntu 18.04 LTS / 20.04 LTS / 21.04 : PostgreSQL vulnerabilities (USN-5038-1)NessusUbuntu Local Security Checks
medium
152272SUSE SLES12 Security Update : nodejs12 (SUSE-SU-2021:2326-1)NessusSuSE Local Security Checks
high
151823openSUSE 15 Security Update : nodejs12 (openSUSE-SU-2021:1059-1)NessusSuSE Local Security Checks
high
151818openSUSE 15 Security Update : nodejs10 (openSUSE-SU-2021:1061-1)NessusSuSE Local Security Checks
high
151772EulerOS 2.0 SP5 : openssl1.1.1d (EulerOS-SA-2021-2225)NessusHuawei Local Security Checks
medium
151758SUSE SLES15 Security Update : nodejs10 (SUSE-SU-2021:2353-1)NessusSuSE Local Security Checks
high
151727openSUSE 15 Security Update : nodejs12 (openSUSE-SU-2021:2327-1)NessusSuSE Local Security Checks
high
151723openSUSE 15 Security Update : nodejs10 (openSUSE-SU-2021:2353-1)NessusSuSE Local Security Checks
high
151656SUSE SLES12 Security Update : nodejs10 (SUSE-SU-2021:2323-1)NessusSuSE Local Security Checks
high
151655SUSE SLES15 Security Update : nodejs12 (SUSE-SU-2021:2327-1)NessusSuSE Local Security Checks
high
151239EulerOS 2.0 SP9 : openssl (EulerOS-SA-2021-2063)NessusHuawei Local Security Checks
medium
151230EulerOS 2.0 SP9 : openssl (EulerOS-SA-2021-2052)NessusHuawei Local Security Checks
medium
151159EulerOS Virtualization for ARM 64 3.0.6.0 : openssl (EulerOS-SA-2021-2020)NessusHuawei Local Security Checks
medium
151033EulerOS 2.0 SP8 : openssl (EulerOS-SA-2021-1985)NessusHuawei Local Security Checks
medium
150252EulerOS Virtualization 2.9.0 : openssl (EulerOS-SA-2021-1970)NessusHuawei Local Security Checks
medium
150247EulerOS Virtualization 2.9.1 : openssl (EulerOS-SA-2021-1960)NessusHuawei Local Security Checks
medium
150139Tenable Log Correlation Engine (LCE) < 6.0.9 (TNS-2021-10)NessusMisc.
medium
149403Nessus Network Monitor < 5.13.1 Multiple Vulnerabilities (TNS-2021-09)NessusMisc.
high
148937MySQL 8.0.x < 8.0.24 Multiple Vulnerabilities (Apr 2021 CPU)NessusDatabases
medium
148936MySQL 5.7.x < 5.7.34 Multiple Vulnerabilities (Apr 2021 CPU)NessusDatabases
medium
148869FreeBSD : MySQL -- Multiple vulnerabilities (56ba4513-a1be-11eb-9072-d4c9ef517024)NessusFreeBSD Local Security Checks
high
148568RHEL 7 : Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP7 (RHSA-2021:1199)NessusRed Hat Local Security Checks
high
148563RHEL 7 : Red Hat JBoss Web Server 3.1 Service Pack 12 (RHSA-2021:1202)NessusRed Hat Local Security Checks
high
148562RHEL 7 : Red Hat JBoss Web Server 5.4.2 Security Update (Important) (RHSA-2021:1195)NessusRed Hat Local Security Checks
high
148547Oracle Linux 8 : openssl (ELSA-2021-1024)NessusOracle Linux Local Security Checks
high
148542RHEL 8 : Red Hat Virtualization (RHSA-2021:1189)NessusRed Hat Local Security Checks
high
148534FreeBSD : Node.js -- April 2021 Security Releases (c0c1834c-9761-11eb-acfd-0022489ad614)NessusFreeBSD Local Security Checks
high
148404Tenable.sc 5.16.0 / 5.17.0 OpenSSL DoS (TNS-2021-06)NessusMisc.
medium
148379RHEL 8 : openssl (RHSA-2021:1131)NessusRed Hat Local Security Checks
medium
148355Photon OS 4.0: Openssl PHSA-2021-4.0-0007NessusPhotonOS Local Security Checks
high
148317RHEL 8 : openssl (RHSA-2021:1063)NessusRed Hat Local Security Checks
medium
148297Tenable Nessus 8.9.0 < 8.13.2 Multiple Vulnerabilities (TNS-2021-05)NessusMisc.
high
148281CentOS 8 : openssl (CESA-2021:1024)NessusCentOS Local Security Checks
high
148280Tenable SecurityCenter 5.13.x < 5.18.0 DoS (TNS-2021-06)NessusMisc.
medium
148271GLSA-202103-03 : OpenSSL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
148259Oracle Linux 8 : openssl (ELSA-2021-9151) (deprecated)NessusOracle Linux Local Security Checks
high
148249RHEL 8 : openssl (RHSA-2021:1024)NessusRed Hat Local Security Checks
high
148200FreeBSD : OpenSSL -- Multiple vulnerabilities (5a668ab3-8d86-11eb-b8d6-d4c9ef517024)NessusFreeBSD Local Security Checks
high
148196Amazon Linux 2 : openssl11 (ALAS-2021-1622)NessusAmazon Linux Local Security Checks
high
148192Photon OS 3.0: Nxtgn PHSA-2021-3.0-0210NessusPhotonOS Local Security Checks
high
148186Photon OS 2.0: Nxtgn PHSA-2021-2.0-0331NessusPhotonOS Local Security Checks
high
148176openSUSE Security Update : openssl-1_1 (openSUSE-2021-476)NessusSuSE Local Security Checks
medium
148170Debian DSA-4875-1 : openssl - security updateNessusDebian Local Security Checks
medium
148167SUSE SLED15 / SLES15 Security Update : openssl-1_1 (SUSE-SU-2021:0955-1)NessusSuSE Local Security Checks
medium
148150SUSE SLES12 Security Update : openssl-1_1 (SUSE-SU-2021:0954-1)NessusSuSE Local Security Checks
medium
148130Ubuntu 18.04 LTS / 20.04 LTS / 20.10 : OpenSSL vulnerability (USN-4891-1)NessusUbuntu Local Security Checks
medium
148125OpenSSL 1.1.1 < 1.1.1k Multiple VulnerabilitiesNessusWeb Servers
high