A vulnerability has been identified in SIMATIC CN 4100 (All versions < V3.0). The affected device contains hard coded password which is used for the privileged system user `root` and for the boot loader `GRUB` by default . An attacker who manages to crack the password hash gains root access to the device.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-273900.html | Vendor Advisory |
https://cert-portal.siemens.com/productcert/html/ssa-273900.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
26 Aug 2025, 20:16
Type | Values Removed | Values Added |
---|---|---|
CPE |
21 Aug 2025, 12:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:simatic_cn_4100:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:simatic_cn_4100:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_cn_4100_firmware:*:*:*:*:*:*:*:* |
|
First Time |
Siemens
Siemens simatic Cn 4100 Firmware Siemens simatic Cn 4100 |
|
References | () https://cert-portal.siemens.com/productcert/html/ssa-273900.html - Vendor Advisory |
Information
Published : 2024-05-14 16:17
Updated : 2025-08-26 20:16
NVD link : CVE-2024-32741
Mitre link : CVE-2024-32741
CVE.ORG link : CVE-2024-32741
JSON object : View
Products Affected
siemens
- simatic_cn_4100_firmware
- simatic_cn_4100
CWE
CWE-259
Use of Hard-coded Password