Siemens ST7 ScadaConnect
Multiple memory safety and input validation vulnerabilities in Siemens ST7 ScadaConnect versions prior to 1.1. These include integer overflow (CWE-190), use-after-free (CWE-415), missing certificate validation (CWE-295), integer underflow (CWE-1333), missing error handling (CWE-754), improper input validation (CWE-20), null pointer dereference (CWE-476), missing encryption (CWE-311), buffer overflow (CWE-119), and resource exhaustion (CWE-400). An unauthenticated remote attacker can trigger these flaws to cause denial of service or corrupt data processed by the device.
- Network access to ST7 ScadaConnect device (port unspecified in advisory)
- No authentication required
/api/v1/advisories/2e49272d-0f17-42db-86a3-b1b55aa488aaGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.