Vulnerability Description
A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Specially crafted packets sent to port 4443/tcp could cause a Denial-of-Service condition or potential remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Siprotec 5 With Cpu Variant Cp050 | < 8.80 |
| Siemens | Siprotec 5 With Cpu Variant Cp100 | < 8.80 |
| Siemens | Siprotec 5 With Cpu Variant Cp300 | < 8.80 |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-847986.pdfPatchVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-847986.pdfPatchVendor Advisory
FAQ
What is CVE-2021-33719?
CVE-2021-33719 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU va...
How severe is CVE-2021-33719?
CVE-2021-33719 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-33719?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Siprotec 5 With Cpu Variant Cp050, Siemens Siprotec 5 With Cpu Variant Cp100, Siemens Siprotec 5 With Cpu Variant Cp300.