CVE-2021-27384

Description

A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Panels V16 4\" - 22\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15.1 Update 6), SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced V15 (All versions < V15.1 Update 6), SIMATIC WinCC Runtime Advanced V16 (All versions < V16 Update 4), SINAMICS GH150 (All versions), SINAMICS GL150 (with option X30) (All versions), SINAMICS GM150 (with option X30) (All versions), SINAMICS SH150 (All versions), SINAMICS SL150 (All versions), SINAMICS SM120 (All versions), SINAMICS SM150 (All versions), SINAMICS SM150i (All versions). SmartVNC has an out-of-bounds memory access vulnerability in the device layout handler, represented by a binary data stream on client side, which can potentially result in code execution.

Category

9.8
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 1.43% Top 25%
Vendor Advisory siemens.com Vendor Advisory siemens.com
Affected: Siemens SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants)
Affected: Siemens SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants)
Affected: Siemens SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants)
Affected: Siemens SIMATIC HMI Comfort Panels V16 4\" - 22\" (incl. SIPLUS variants)
Affected: Siemens SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F
Affected: Siemens SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F
Affected: Siemens SIMATIC WinCC Runtime Advanced V15
Affected: Siemens SIMATIC WinCC Runtime Advanced V16
Affected: Siemens SINAMICS GH150
Affected: Siemens SINAMICS GL150 (with option X30)
Affected: Siemens SINAMICS GM150 (with option X30)
Affected: Siemens SINAMICS SH150
Affected: Siemens SINAMICS SL150
Affected: Siemens SINAMICS SM120
Affected: Siemens SINAMICS SM150
Affected: Siemens SINAMICS SM150i
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-27384?
CVE-2021-27384 has been scored as a critical severity vulnerability.
How to fix CVE-2021-27384?
To fix CVE-2021-27384, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2021-27384 being actively exploited in the wild?
It is possible that CVE-2021-27384 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-27384?
CVE-2021-27384 affects Siemens SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants), Siemens SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants) , Siemens SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants), Siemens SIMATIC HMI Comfort Panels V16 4\" - 22\" (incl. SIPLUS variants) , Siemens SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F, Siemens SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F , Siemens SIMATIC WinCC Runtime Advanced V15, Siemens SIMATIC WinCC Runtime Advanced V16, Siemens SINAMICS GH150, Siemens SINAMICS GL150 (with option X30), Siemens SINAMICS GM150 (with option X30), Siemens SINAMICS SH150, Siemens SINAMICS SL150, Siemens SINAMICS SM120, Siemens SINAMICS SM150, Siemens SINAMICS SM150i.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.