{"containers":{"cna":{"affected":[{"product":"SIMATIC PCS 7 V8.2","vendor":"Siemens","versions":[{"status":"affected","version":"All versions"}]},{"product":"SIMATIC PCS 7 V9.0","vendor":"Siemens","versions":[{"status":"affected","version":"All versions"}]},{"product":"SIMATIC PCS 7 V9.1","vendor":"Siemens","versions":[{"status":"affected","version":"All versions < V9.1 SP1"}]},{"product":"SIMATIC WinCC V15 and earlier","vendor":"Siemens","versions":[{"status":"affected","version":"All versions < V15 SP1 Update 7"}]},{"product":"SIMATIC WinCC V16","vendor":"Siemens","versions":[{"status":"affected","version":"All versions < V16 Update 5"}]},{"product":"SIMATIC WinCC V17","vendor":"Siemens","versions":[{"status":"affected","version":"All versions < V17 Update 2"}]},{"product":"SIMATIC WinCC V7.4","vendor":"Siemens","versions":[{"status":"affected","version":"All versions < V7.4 SP1 Update 19"}]},{"product":"SIMATIC WinCC V7.5","vendor":"Siemens","versions":[{"status":"affected","version":"All versions < V7.5 SP2 Update 6"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-05-10T09:46:42.000Z","orgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","shortName":"siemens"},"references":[{"tags":["x_refsource_MISC"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"productcert@siemens.com","ID":"CVE-2021-40360","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"SIMATIC PCS 7 V8.2","version":{"version_data":[{"version_value":"All versions"}]}},{"product_name":"SIMATIC PCS 7 V9.0","version":{"version_data":[{"version_value":"All versions"}]}},{"product_name":"SIMATIC PCS 7 V9.1","version":{"version_data":[{"version_value":"All versions < V9.1 SP1"}]}},{"product_name":"SIMATIC WinCC V15 and earlier","version":{"version_data":[{"version_value":"All versions < V15 SP1 Update 7"}]}},{"product_name":"SIMATIC WinCC V16","version":{"version_data":[{"version_value":"All versions < V16 Update 5"}]}},{"product_name":"SIMATIC WinCC V17","version":{"version_data":[{"version_value":"All versions < V17 Update 2"}]}},{"product_name":"SIMATIC WinCC V7.4","version":{"version_data":[{"version_value":"All versions < V7.4 SP1 Update 19"}]}},{"product_name":"SIMATIC WinCC V7.5","version":{"version_data":[{"version_value":"All versions < V7.5 SP2 Update 6"}]}}]},"vendor_name":"Siemens"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"}]}]},"references":{"reference_data":[{"name":"https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf","refsource":"MISC","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T02:44:09.157Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf"}]}]},"cveMetadata":{"assignerOrgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","assignerShortName":"siemens","cveId":"CVE-2021-40360","datePublished":"2022-02-09T15:17:03.000Z","dateReserved":"2021-09-01T00:00:00.000Z","dateUpdated":"2024-08-04T02:44:09.157Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}