{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR524-8C, 2x230V (6GK5524-8GS00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W778-1 M12 (6GK5778-1GY00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA6) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR552-12M (2HR2) (6GK5552-0AA00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-1 M12 (6GK5788-1GD00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V3 CPUs toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR524-8C, 1x230V (L3 int.) (6GK5524-8GR00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X208PRO (6GK5208-0HA10-2AA6) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AC0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1000 Unified Comfort Panel (6AV2128-3KB06-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X224 (6GK5224-0BA00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP2200 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3XB27-0BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE SC646-2C (6GK5646-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG10-1CR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200S IM 151-8F PN/DP CPU (6ES7151-8FB01-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X310 (6GK5310-0FA00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WAB762-1 (6GK5762-1AJ00-6AA0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG10-1JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W1788-2 EEC M12 (6GK5788-2GY01-0TA0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-3JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V2 CPUs toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XM408-4C (6GK5408-4GP00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X302-7 EEC (2x 24V) (6GK5302-7GD00-2EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DK00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1500 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3QB57-0BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-2 EEC (24V) (6GK5307-2FD00-1EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA6) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AC0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2 (6GK5308-2FL00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR526-8C, 1x230V (6GK5526-8GS00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP2200 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3XB57-0BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP700 Unified Comfort Panel (6AV2128-3GB06-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-3JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG10-1HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR528-6M (6GK5528-0AA00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP Open Controller CPU 1515SP PC3 V4 CPUs toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1500 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3QB27-1BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1500 Unified Comfort Panel (6AV2128-3QB06-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M874-2 (6GK5874-2AA00-2AA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC CFU PA (6ES7655-5PX11-0XX0) versions ant\u00e9rieures \u00e0 2.0.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-2 EEC (230V) (6GK5307-2FD00-3EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR526-8C, 24V (6GK5526-8GS00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W786-2 SFP (6GK5786-2FE00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1500 Unified Comfort Panel neutral design (6AV2128-3QB36-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC CFU PA (6ES7655-5PX11-1XX0) versions ant\u00e9rieures \u00e0 2.0.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1500 Unified Comfort Panel hygienic (6AV2128-3QB40-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W734-1 RJ45 (USA) (6GK5734-1FX00-0AB6) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X212-2 (6GK5212-2BB00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIPROTEC 5 versions sup\u00e9rieures ou \u00e9gales \u00e07.80 pour la vuln\u00e9rabilit\u00e9 CVE-2024-54017","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-2 M12 (6GK5788-2GD00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XF204-2 (6GK5204-2BC00-2AF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-12M TS (24V) (6GK5324-0GG00-1CR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR528-6M (2HR2, L3 int.) (6GK5528-0AR00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X302-7 EEC (230V, coated) (6GK5302-7GD00-3GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W1788-2IA M12 (6GK5788-2HY01-0AA0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG10-3HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X310FE (6GK5310-0BA00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1500 Unified Comfort Panel hygienic neutral design (6AV2128-3QB70-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1200 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3MB57-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200pro IM 154-8F PN/DP CPU (6ES7154-8FB01-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG10-1HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1514SPT-2 PN (6ES7514-2VN03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1000 Unified Comfort Panel hygienic neutral design (6AV2128-3KB70-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1900 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3UB27-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP2200 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3XB27-1BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7 PLCs Web Server versions ant\u00e9rieures \u00e0 2.9.9","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG10-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-12M (230V, ports on front) (6GK5324-0GG00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X204-2LD (6GK5204-2BC10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR552-12M (2HR2) (6GK5552-0AR00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XF204 (6GK5204-0BA00-2AF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2M (6GK5308-2GG10-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-1500 CPU 1516-3 PN/DP (6ES7516-3AN00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1900 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3UB57-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG10-2JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W778-1 M12 EEC (USA) (6GK5778-1GY00-0TB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-1500 CPU 1516F-3 PN/DP (6ES7516-3FN00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR552-12M (2HR2, L3 int.) (6GK5552-0AR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AC0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1514SP-2 PN (6ES7514-2DN03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIPROTEC 5 versions sup\u00e9rieures ou \u00e9gales \u00e07.80 et  versions ant\u00e9rieures \u00e0 11.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M816-1 ADSL-Router (6GK5816-1BA00-2AA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR524-8C, 2x230V (L3 int.) (6GK5524-8GR00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-3 (6GK5307-3BL10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1900 Unified Comfort Panel (6AV2128-3UB06-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WAM766-1 (6GK5766-1GE00-7DA0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC CN 4100 versions ant\u00e9rieures \u00e0 5.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1500 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3QB57-1BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE MUB852-1 (A1) (6GK5852-1EA10-1AA1) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2M (6GK5308-2GG00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP2200 Unified Comfort Panel (6AV2128-3XB06-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-4ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE MUB852-1 (B1) (6GK5852-1EA10-1BA1) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X204-2 (6GK5204-2BB10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X212-2LD (6GK5212-2BC00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1500 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3QB27-0BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AC0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP2200 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3XB57-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.9","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR552-12M (6GK5552-0AA00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR526-8C, 24V (L3 int.) (6GK5526-8GR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP2200 Unified Comfort Panel neutral design (6AV2128-3XB36-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1900 Unified Comfort Panel hygienic (6AV2128-3UB40-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DJ00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WUM766-1 (USA) (6GK5766-1GE00-3DB0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1500 Comfort Pro neutral design for support arm (not extendable, flange on top) (6AV2128-3QB57-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W721-1 RJ45 (6GK5721-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200pro IM 154-8FX PN/DP CPU (6ES7154-8FX00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DK00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR524-8C, 24V (L3 int.) (6GK5524-8GR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DK01-0AB0) versions ant\u00e9rieures \u00e0 2.9.9","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1000, Unified Comfort Panel neutral (6AV2128-3KB36-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M876-4 (6GK5876-4AA10-2BA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M PoE TS (24V, ports on front) (6GK5324-4QG00-1CR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2LH (6GK5308-2FN10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WUM766-1 (6GK5766-1GE00-3DA0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1900 Unified Comfort Panel hygienic neutral design (6AV2128-3UB70-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7 PLCs Web Server versions ant\u00e9rieures \u00e0 3.1.6","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W738-1 M12 (6GK5738-1GY00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-2 EEC (2x 230V) (6GK5307-2FD00-4EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-2 EEC (24V, coated) (6GK5307-2FD00-1GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SM03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-3 (6GK5307-3BL00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-1500 CPU 1513-1 PN (6ES7513-1AL00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SJ01-0AB0) versions ant\u00e9rieures \u00e0 2.9.9","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG10-3HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2M TS (6GK5308-2GG00-2CA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-2 M12 (6GK5788-2GD00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X204-2FM (6GK5204-2BB11-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X304-2FE (6GK5304-2BD00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2LH (6GK5308-2FN00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (24V, ports on rear) (6GK5324-4GG00-1JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (2x 24V, ports on rear) (6GK5324-4GG00-2JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7 PLCs Web Server toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200pro IM 154-8 PN/DP CPU (6ES7154-8AB01-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1200 Unified Comfort Panel hygienic neutral design (6AV2128-3MB70-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X208 (6GK5208-0BA10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X302-7 EEC (2x 230V, coated) (6GK5302-7GD00-4GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XM416-4C (6GK5416-4GS00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WUB762-1 (6GK5762-1AJ00-1AA0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X302-7 EEC (24V, coated) (6GK5302-7GD00-1GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X302-7 EEC (2x 24V, coated) (6GK5302-7GD00-2GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2M TS (6GK5308-2GG10-2CA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR528-6M (2HR2) (6GK5528-0AA00-2HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X206-1 (6GK5206-1BB10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1200 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3MB27-0BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M876-3 (6GK5876-3AA02-2BA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XM416-4C (L3 int.) (6GK5416-4GR00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2LH+ (6GK5308-2FP10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W748-1 M12 (6GK5748-1GD00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1500 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3QB27-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W774-1 RJ45 (USA) (6GK5774-1FX00-0AB6) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC Drive Controller CPU 1504D TF (6ES7615-4DF10-0AB0) versions ant\u00e9rieures \u00e0 3.1.6","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X302-7 EEC (230V) (6GK5302-7GD00-3EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP2200 Unified Comfort Hygienic neutral design (6AV2128-3XB70-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X320-1-2LD FE (6GK5320-3BF00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE SC626-2C (6GK5626-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-1 RJ45 (6GK5788-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1900 Unified Comfort Panel neutral design (6AV2128-3UB36-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP700 Unified Comfort Panel hygienic neutral design (6AV2128-3GB40-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X310 (6GK5310-0FA10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-2 EEC (2x 24V) (6GK5307-2FD00-2EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG00-2ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP700 Unified Comfort Panel hygienic neutral design (6AV2128-3GB70-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SJ00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-2 EEC (230V, coated) (6GK5307-2FD00-3GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1900 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3UB27-1BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W786-2 RJ45 (6GK5786-2FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR526-8C, 1x230V (L3 int.) (6GK5526-8GR00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X408-2 (6GK5408-2FD00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIPROTEC 5 versions ant\u00e9rieures \u00e0 11.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2LD (6GK5308-2FM00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG10-1AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WUB762-1 iFeatures (6GK5762-1AJ00-2AA0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR528-6M (L3 int.) (6GK5528-0AR00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X310FE (6GK5310-0BA10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1200 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3MB27-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP700, Unified Comfort Panel neutral design (6AV2128-3GB36-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (2x 24V, ports on front) (6GK5324-4GG10-2ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W748-1 RJ45 (6GK5748-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XM408-8C (L3 int.) (6GK5408-8GR00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-3ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7 PLCs Web Server toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W786-2IA RJ45 (6GK5786-2HC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-1500 CPU 1511F-1 PN (6ES7511-1FK00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2LD (6GK5308-2FM10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X306-1LD FE (6GK5306-1BF00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG10-1AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W778-1 M12 EEC (6GK5778-1GY00-0TA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SK03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1200 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3MB57-0BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M874-3 (6GK5874-3AA00-2AA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-12M TS (24V) (6GK5324-0GG10-1CR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1510SP F-1 PN (6ES7510-1SJ00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W774-1 M12 EEC (6GK5774-1FY00-0TB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W738-1 M12 (6GK5738-1GY00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M PoE (230V, ports on rear) (6GK5324-4QG00-3HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP HA IM155-6 PN versions ant\u00e9rieures \u00e0 1.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE SC642-2C (6GK5642-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TC0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-1 M12 (6GK5788-1GD00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG10-4JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2 RD (inkl. SIPLUS variants) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-3LD (6GK5307-3BM10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP2200 Comfort Pro for support arm (not extendable, flange on top) (6AV2128-3XB27-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP2200 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3XB57-1BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X302-7 EEC (2x 230V) (6GK5302-7GD00-4EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W786-1 RJ45 (6GK5786-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) versions ant\u00e9rieures \u00e0 10.2","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1900 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3UB57-1BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SK00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XF206-1 (6GK5206-1BC00-2AF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DJ00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2M PoE (6GK5308-2QG10-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC Drive Controller CPU 1507D TF (6ES7615-7DF10-0AB0) versions ant\u00e9rieures \u00e0 3.1.6","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR524-8C, 1x230V (6GK5524-8GS00-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE SC632-2C (6GK5632-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-1500 CPU 1515-2 PN (6ES7515-2AM00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR526-8C, 2x230V (6GK5526-8GS00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-3LD (6GK5307-3BM00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2M PoE (6GK5308-2QG00-2AA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XM408-4C (L3 int.) (6GK5408-4GQ00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M PoE (24V, ports on front) (6GK5324-4QG00-1AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1512SP F-1 PN (6ES7512-1SK00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP2200 Unified Comfort Hygienic (6AV2128-3XB40-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200S IM 151-8 PN/DP CPU (6ES7151-8AB01-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X320-1 FE (6GK5320-1BD00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X216 (6GK5216-0BA00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1514SP F-2 PN (6ES7514-2SN03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front) (6GK5324-4GG10-4ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC CFU DIQ (6ES7655-5PX31-1XX0) versions ant\u00e9rieures \u00e0 2.0.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear) (6GK5324-4GG00-4JR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W1748-1 M12 (6GK5748-1GY01-0TA0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1200 Unified Comfort Panel (6AV2128-3MB06-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front) (6GK5324-4GG00-3ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1200 Unified Comfort Panel hygienic (6AV2128-3MB40-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE SC636-2C (6GK5636-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DJ01-0AB0) versions ant\u00e9rieures \u00e0 2.9.9","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W774-1 RJ45 (6GK5774-1FX00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG10-1ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W734-1 RJ45 (6GK5734-1FX00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AB0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M PoE (24V, ports on rear) (6GK5324-4QG00-1HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-2 M12 EEC (6GK5788-2GD00-0TA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-1500 CPU 1515F-2 PN (6ES7515-2FM00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-12M (24V, ports on front) (6GK5324-0GG00-1AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M EEC (24V, ports on front) (6GK5324-4GG00-1ER2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W1788-2 M12 (6GK5788-2GY01-0AA0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1000 Unified Comfort Panel hygienic (6AV2128-3KB40-0AX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1200 Comfort Pro for stand (expandable, flange at the bottom) (6AV2128-3MB27-1BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X206-1LD (6GK5206-1BC10-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W761-1 RJ45 (6GK5761-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X302-7 EEC (24V) (6GK5302-7GD00-1EA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1510SP-1 PN (6ES7510-1DK03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X308-2LH+ (6GK5308-2FP00-2AA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-4M PoE (230V, ports on front) (6GK5324-4QG10-3AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W786-2 SFP (6GK5786-2FE00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR524-8C, 24V (6GK5524-8GS00-2AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1514SPT F-2 PN (6ES7514-2WN03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR526-8C, 2x230V (L3 int.) (6GK5526-8GR00-4AR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W788-2 RJ45 (6GK5788-2FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-12M (24V, ports on rear) (6GK5324-0GG00-1HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE SC622-2C (6GK5622-2GS00-2AC2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-1500 CPU 1511-1 PN (6ES7511-1AK00-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XF208 (6GK5208-0BA00-2AF2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XR324-12M (230V, ports on rear) (6GK5324-0GG00-3HR2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1200 Unified Comfort Panel neutral design (6AV2128-3MB36-0AX1) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-2 EEC (2x 24V, coated) (6GK5307-2FD00-2GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1200 Comfort Pro neutral design for stand (expandable, flange at the bottom) (6AV2128-3MB57-1BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1900 Comfort Pro for support arm (expandable, round tube) and extension unit (6AV2128-3UB27-0BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC HMI MTP1900 Comfort Pro neutral design for support arm (expandable, round tube) and extensio (6AV2128-3UB57-0BX0) versions ant\u00e9rieures \u00e0 21","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE XM408-8C (6GK5408-8GS00-2AM2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE WAM766-1 EEC (6GK5766-1GE00-7TA0) versions ant\u00e9rieures \u00e0 3.2.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W722-1 RJ45 (6GK5722-1FC00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W748-1 M12 (6GK5748-1GD00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC ET 200SP CPU 1512SP-1 PN (6ES7512-1DM03-0AB0) toutes versions pour les vuln\u00e9rabilit\u00e9s CVE-2026-25786, CVE-2026-25787 et CVE-2026-25789.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X204-2TS (6GK5204-2BB10-2CA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W778-1 M12 (6GK5778-1GY00-0AA0) versions ant\u00e9rieures \u00e0 6.6.0","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE W1788-1 M12 (6GK5788-1GY01-0AA0) toutes versions. L'\u00e9diteur indique que le produit ne b\u00e9n\u00e9ficiera pas de correctif de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833.","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M804PB (6GK5804-0AP00-2AA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X204-2LD TS (6GK5204-2BC10-2CA2) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE X307-2 EEC (2x 230V, coated) (6GK5307-2FD00-4GA3) toutes versions pour la vuln\u00e9rabilit\u00e9 CVE-2025-40833","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}},{"description":"SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Siemens","scada":true}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2025-47219","url":"https://www.cve.org/CVERecord?id=CVE-2025-47219"},{"name":"CVE-2025-39812","url":"https://www.cve.org/CVERecord?id=CVE-2025-39812"},{"name":"CVE-2026-21933","url":"https://www.cve.org/CVERecord?id=CVE-2026-21933"},{"name":"CVE-2026-21932","url":"https://www.cve.org/CVERecord?id=CVE-2026-21932"},{"name":"CVE-2025-38711","url":"https://www.cve.org/CVERecord?id=CVE-2025-38711"},{"name":"CVE-2025-39808","url":"https://www.cve.org/CVERecord?id=CVE-2025-39808"},{"name":"CVE-2025-9231","url":"https://www.cve.org/CVERecord?id=CVE-2025-9231"},{"name":"CVE-2025-39757","url":"https://www.cve.org/CVERecord?id=CVE-2025-39757"},{"name":"CVE-2025-39772","url":"https://www.cve.org/CVERecord?id=CVE-2025-39772"},{"name":"CVE-2025-39826","url":"https://www.cve.org/CVERecord?id=CVE-2025-39826"},{"name":"CVE-2025-39716","url":"https://www.cve.org/CVERecord?id=CVE-2025-39716"},{"name":"CVE-2025-39702","url":"https://www.cve.org/CVERecord?id=CVE-2025-39702"},{"name":"CVE-2025-39685","url":"https://www.cve.org/CVERecord?id=CVE-2025-39685"},{"name":"CVE-2025-39827","url":"https://www.cve.org/CVERecord?id=CVE-2025-39827"},{"name":"CVE-2025-39828","url":"https://www.cve.org/CVERecord?id=CVE-2025-39828"},{"name":"CVE-2025-6052","url":"https://www.cve.org/CVERecord?id=CVE-2025-6052"},{"name":"CVE-2025-38491","url":"https://www.cve.org/CVERecord?id=CVE-2025-38491"},{"name":"CVE-2025-38708","url":"https://www.cve.org/CVERecord?id=CVE-2025-38708"},{"name":"CVE-2025-40833","url":"https://www.cve.org/CVERecord?id=CVE-2025-40833"},{"name":"CVE-2025-39701","url":"https://www.cve.org/CVERecord?id=CVE-2025-39701"},{"name":"CVE-2026-25787","url":"https://www.cve.org/CVERecord?id=CVE-2026-25787"},{"name":"CVE-2026-22925","url":"https://www.cve.org/CVERecord?id=CVE-2026-22925"},{"name":"CVE-2025-39709","url":"https://www.cve.org/CVERecord?id=CVE-2025-39709"},{"name":"CVE-2025-39689","url":"https://www.cve.org/CVERecord?id=CVE-2025-39689"},{"name":"CVE-2025-39787","url":"https://www.cve.org/CVERecord?id=CVE-2025-39787"},{"name":"CVE-2025-55752","url":"https://www.cve.org/CVERecord?id=CVE-2025-55752"},{"name":"CVE-2025-38695","url":"https://www.cve.org/CVERecord?id=CVE-2025-38695"},{"name":"CVE-2025-39749","url":"https://www.cve.org/CVERecord?id=CVE-2025-39749"},{"name":"CVE-2025-39866","url":"https://www.cve.org/CVERecord?id=CVE-2025-39866"},{"name":"CVE-2025-39843","url":"https://www.cve.org/CVERecord?id=CVE-2025-39843"},{"name":"CVE-2025-23160","url":"https://www.cve.org/CVERecord?id=CVE-2025-23160"},{"name":"CVE-2025-9820","url":"https://www.cve.org/CVERecord?id=CVE-2025-9820"},{"name":"CVE-2025-39681","url":"https://www.cve.org/CVERecord?id=CVE-2025-39681"},{"name":"CVE-2025-39770","url":"https://www.cve.org/CVERecord?id=CVE-2025-39770"},{"name":"CVE-2025-38706","url":"https://www.cve.org/CVERecord?id=CVE-2025-38706"},{"name":"CVE-2025-38699","url":"https://www.cve.org/CVERecord?id=CVE-2025-38699"},{"name":"CVE-2025-38707","url":"https://www.cve.org/CVERecord?id=CVE-2025-38707"},{"name":"CVE-2025-39692","url":"https://www.cve.org/CVERecord?id=CVE-2025-39692"},{"name":"CVE-2025-38677","url":"https://www.cve.org/CVERecord?id=CVE-2025-38677"},{"name":"CVE-2025-39853","url":"https://www.cve.org/CVERecord?id=CVE-2025-39853"},{"name":"CVE-2025-39857","url":"https://www.cve.org/CVERecord?id=CVE-2025-39857"},{"name":"CVE-2025-39865","url":"https://www.cve.org/CVERecord?id=CVE-2025-39865"},{"name":"CVE-2025-39675","url":"https://www.cve.org/CVERecord?id=CVE-2025-39675"},{"name":"CVE-2025-38693","url":"https://www.cve.org/CVERecord?id=CVE-2025-38693"},{"name":"CVE-2025-38679","url":"https://www.cve.org/CVERecord?id=CVE-2025-38679"},{"name":"CVE-2025-38685","url":"https://www.cve.org/CVERecord?id=CVE-2025-38685"},{"name":"CVE-2025-38502","url":"https://www.cve.org/CVERecord?id=CVE-2025-38502"},{"name":"CVE-2025-39838","url":"https://www.cve.org/CVERecord?id=CVE-2025-39838"},{"name":"CVE-2025-39823","url":"https://www.cve.org/CVERecord?id=CVE-2025-39823"},{"name":"CVE-2026-21925","url":"https://www.cve.org/CVERecord?id=CVE-2026-21925"},{"name":"CVE-2025-39864","url":"https://www.cve.org/CVERecord?id=CVE-2025-39864"},{"name":"CVE-2025-39824","url":"https://www.cve.org/CVERecord?id=CVE-2025-39824"},{"name":"CVE-2025-39737","url":"https://www.cve.org/CVERecord?id=CVE-2025-39737"},{"name":"CVE-2025-38702","url":"https://www.cve.org/CVERecord?id=CVE-2025-38702"},{"name":"CVE-2025-38724","url":"https://www.cve.org/CVERecord?id=CVE-2025-38724"},{"name":"CVE-2025-38698","url":"https://www.cve.org/CVERecord?id=CVE-2025-38698"},{"name":"CVE-2025-39842","url":"https://www.cve.org/CVERecord?id=CVE-2025-39842"},{"name":"CVE-2025-37931","url":"https://www.cve.org/CVERecord?id=CVE-2025-37931"},{"name":"CVE-2025-39849","url":"https://www.cve.org/CVERecord?id=CVE-2025-39849"},{"name":"CVE-2026-28389","url":"https://www.cve.org/CVERecord?id=CVE-2026-28389"},{"name":"CVE-2025-39743","url":"https://www.cve.org/CVERecord?id=CVE-2025-39743"},{"name":"CVE-2025-39718","url":"https://www.cve.org/CVERecord?id=CVE-2025-39718"},{"name":"CVE-2025-38712","url":"https://www.cve.org/CVERecord?id=CVE-2025-38712"},{"name":"CVE-2025-38732","url":"https://www.cve.org/CVERecord?id=CVE-2025-38732"},{"name":"CVE-2025-39773","url":"https://www.cve.org/CVERecord?id=CVE-2025-39773"},{"name":"CVE-2025-38696","url":"https://www.cve.org/CVERecord?id=CVE-2025-38696"},{"name":"CVE-2025-38727","url":"https://www.cve.org/CVERecord?id=CVE-2025-38727"},{"name":"CVE-2025-38670","url":"https://www.cve.org/CVERecord?id=CVE-2025-38670"},{"name":"CVE-2025-55754","url":"https://www.cve.org/CVERecord?id=CVE-2025-55754"},{"name":"CVE-2025-39845","url":"https://www.cve.org/CVERecord?id=CVE-2025-39845"},{"name":"CVE-2025-39788","url":"https://www.cve.org/CVERecord?id=CVE-2025-39788"},{"name":"CVE-2025-38735","url":"https://www.cve.org/CVERecord?id=CVE-2025-38735"},{"name":"CVE-2025-7425","url":"https://www.cve.org/CVERecord?id=CVE-2025-7425"},{"name":"CVE-2025-43368","url":"https://www.cve.org/CVERecord?id=CVE-2025-43368"},{"name":"CVE-2025-38614","url":"https://www.cve.org/CVERecord?id=CVE-2025-38614"},{"name":"CVE-2025-23143","url":"https://www.cve.org/CVERecord?id=CVE-2025-23143"},{"name":"CVE-2025-38322","url":"https://www.cve.org/CVERecord?id=CVE-2025-38322"},{"name":"CVE-2025-9232","url":"https://www.cve.org/CVERecord?id=CVE-2025-9232"},{"name":"CVE-2025-38694","url":"https://www.cve.org/CVERecord?id=CVE-2025-38694"},{"name":"CVE-2025-61795","url":"https://www.cve.org/CVERecord?id=CVE-2025-61795"},{"name":"CVE-2025-38676","url":"https://www.cve.org/CVERecord?id=CVE-2025-38676"},{"name":"CVE-2025-38729","url":"https://www.cve.org/CVERecord?id=CVE-2025-38729"},{"name":"CVE-2025-38681","url":"https://www.cve.org/CVERecord?id=CVE-2025-38681"},{"name":"CVE-2026-28387","url":"https://www.cve.org/CVERecord?id=CVE-2026-28387"},{"name":"CVE-2025-39795","url":"https://www.cve.org/CVERecord?id=CVE-2025-39795"},{"name":"CVE-2026-28388","url":"https://www.cve.org/CVERecord?id=CVE-2026-28388"},{"name":"CVE-2025-38687","url":"https://www.cve.org/CVERecord?id=CVE-2025-38687"},{"name":"CVE-2025-38728","url":"https://www.cve.org/CVERecord?id=CVE-2025-38728"},{"name":"CVE-2025-38715","url":"https://www.cve.org/CVERecord?id=CVE-2025-38715"},{"name":"CVE-2025-39710","url":"https://www.cve.org/CVERecord?id=CVE-2025-39710"},{"name":"CVE-2025-48989","url":"https://www.cve.org/CVERecord?id=CVE-2025-48989"},{"name":"CVE-2025-39683","url":"https://www.cve.org/CVERecord?id=CVE-2025-39683"},{"name":"CVE-2025-39794","url":"https://www.cve.org/CVERecord?id=CVE-2025-39794"},{"name":"CVE-2025-39697","url":"https://www.cve.org/CVERecord?id=CVE-2025-39697"},{"name":"CVE-2026-25786","url":"https://www.cve.org/CVERecord?id=CVE-2026-25786"},{"name":"CVE-2025-38713","url":"https://www.cve.org/CVERecord?id=CVE-2025-38713"},{"name":"CVE-2025-39782","url":"https://www.cve.org/CVERecord?id=CVE-2025-39782"},{"name":"CVE-2025-38697","url":"https://www.cve.org/CVERecord?id=CVE-2025-38697"},{"name":"CVE-2025-38691","url":"https://www.cve.org/CVERecord?id=CVE-2025-38691"},{"name":"CVE-2025-39759","url":"https://www.cve.org/CVERecord?id=CVE-2025-39759"},{"name":"CVE-2025-39860","url":"https://www.cve.org/CVERecord?id=CVE-2025-39860"},{"name":"CVE-2025-39760","url":"https://www.cve.org/CVERecord?id=CVE-2025-39760"},{"name":"CVE-2025-39673","url":"https://www.cve.org/CVERecord?id=CVE-2025-39673"},{"name":"CVE-2025-39839","url":"https://www.cve.org/CVERecord?id=CVE-2025-39839"},{"name":"CVE-2025-38723","url":"https://www.cve.org/CVERecord?id=CVE-2025-38723"},{"name":"CVE-2024-57924","url":"https://www.cve.org/CVERecord?id=CVE-2024-57924"},{"name":"CVE-2025-39848","url":"https://www.cve.org/CVERecord?id=CVE-2025-39848"},{"name":"CVE-2025-39800","url":"https://www.cve.org/CVERecord?id=CVE-2025-39800"},{"name":"CVE-2025-39703","url":"https://www.cve.org/CVERecord?id=CVE-2025-39703"},{"name":"CVE-2025-39825","url":"https://www.cve.org/CVERecord?id=CVE-2025-39825"},{"name":"CVE-2025-38552","url":"https://www.cve.org/CVERecord?id=CVE-2025-38552"},{"name":"CVE-2026-28390","url":"https://www.cve.org/CVERecord?id=CVE-2026-28390"},{"name":"CVE-2025-39766","url":"https://www.cve.org/CVERecord?id=CVE-2025-39766"},{"name":"CVE-2025-39801","url":"https://www.cve.org/CVERecord?id=CVE-2025-39801"},{"name":"CVE-2025-39724","url":"https://www.cve.org/CVERecord?id=CVE-2025-39724"},{"name":"CVE-2025-39687","url":"https://www.cve.org/CVERecord?id=CVE-2025-39687"},{"name":"CVE-2025-39694","url":"https://www.cve.org/CVERecord?id=CVE-2025-39694"},{"name":"CVE-2025-40300","url":"https://www.cve.org/CVERecord?id=CVE-2025-40300"},{"name":"CVE-2025-39806","url":"https://www.cve.org/CVERecord?id=CVE-2025-39806"},{"name":"CVE-2025-38721","url":"https://www.cve.org/CVERecord?id=CVE-2025-38721"},{"name":"CVE-2025-39684","url":"https://www.cve.org/CVERecord?id=CVE-2025-39684"},{"name":"CVE-2025-38725","url":"https://www.cve.org/CVERecord?id=CVE-2025-38725"},{"name":"CVE-2025-38347","url":"https://www.cve.org/CVERecord?id=CVE-2025-38347"},{"name":"CVE-2025-39776","url":"https://www.cve.org/CVERecord?id=CVE-2025-39776"},{"name":"CVE-2025-6021","url":"https://www.cve.org/CVERecord?id=CVE-2025-6021"},{"name":"CVE-2025-37968","url":"https://www.cve.org/CVERecord?id=CVE-2025-37968"},{"name":"CVE-2026-22924","url":"https://www.cve.org/CVERecord?id=CVE-2026-22924"},{"name":"CVE-2025-38683","url":"https://www.cve.org/CVERecord?id=CVE-2025-38683"},{"name":"CVE-2026-21945","url":"https://www.cve.org/CVERecord?id=CVE-2026-21945"},{"name":"CVE-2025-39736","url":"https://www.cve.org/CVERecord?id=CVE-2025-39736"},{"name":"CVE-2025-39846","url":"https://www.cve.org/CVERecord?id=CVE-2025-39846"},{"name":"CVE-2026-31789","url":"https://www.cve.org/CVERecord?id=CVE-2026-31789"},{"name":"CVE-2025-39691","url":"https://www.cve.org/CVERecord?id=CVE-2025-39691"},{"name":"CVE-2025-39844","url":"https://www.cve.org/CVERecord?id=CVE-2025-39844"},{"name":"CVE-2025-39742","url":"https://www.cve.org/CVERecord?id=CVE-2025-39742"},{"name":"CVE-2025-61748","url":"https://www.cve.org/CVERecord?id=CVE-2025-61748"},{"name":"CVE-2025-9230","url":"https://www.cve.org/CVERecord?id=CVE-2025-9230"},{"name":"CVE-2026-21947","url":"https://www.cve.org/CVERecord?id=CVE-2026-21947"},{"name":"CVE-2025-38701","url":"https://www.cve.org/CVERecord?id=CVE-2025-38701"},{"name":"CVE-2024-58240","url":"https://www.cve.org/CVERecord?id=CVE-2024-58240"},{"name":"CVE-2025-8916","url":"https://www.cve.org/CVERecord?id=CVE-2025-8916"},{"name":"CVE-2024-54017","url":"https://www.cve.org/CVERecord?id=CVE-2024-54017"},{"name":"CVE-2025-39817","url":"https://www.cve.org/CVERecord?id=CVE-2025-39817"},{"name":"CVE-2024-47704","url":"https://www.cve.org/CVERecord?id=CVE-2024-47704"},{"name":"CVE-2025-39790","url":"https://www.cve.org/CVERecord?id=CVE-2025-39790"},{"name":"CVE-2026-2673","url":"https://www.cve.org/CVERecord?id=CVE-2026-2673"},{"name":"CVE-2025-38680","url":"https://www.cve.org/CVERecord?id=CVE-2025-38680"},{"name":"CVE-2025-38684","url":"https://www.cve.org/CVERecord?id=CVE-2025-38684"},{"name":"CVE-2025-39686","url":"https://www.cve.org/CVERecord?id=CVE-2025-39686"},{"name":"CVE-2025-39798","url":"https://www.cve.org/CVERecord?id=CVE-2025-39798"},{"name":"CVE-2026-27662","url":"https://www.cve.org/CVERecord?id=CVE-2026-27662"},{"name":"CVE-2025-39714","url":"https://www.cve.org/CVERecord?id=CVE-2025-39714"},{"name":"CVE-2025-39706","url":"https://www.cve.org/CVERecord?id=CVE-2025-39706"},{"name":"CVE-2026-25789","url":"https://www.cve.org/CVERecord?id=CVE-2026-25789"},{"name":"CVE-2025-39719","url":"https://www.cve.org/CVERecord?id=CVE-2025-39719"},{"name":"CVE-2025-39738","url":"https://www.cve.org/CVERecord?id=CVE-2025-39738"},{"name":"CVE-2025-39713","url":"https://www.cve.org/CVERecord?id=CVE-2025-39713"},{"name":"CVE-2025-31257","url":"https://www.cve.org/CVERecord?id=CVE-2025-31257"},{"name":"CVE-2025-39756","url":"https://www.cve.org/CVERecord?id=CVE-2025-39756"},{"name":"CVE-2025-38736","url":"https://www.cve.org/CVERecord?id=CVE-2025-38736"},{"name":"CVE-2025-39693","url":"https://www.cve.org/CVERecord?id=CVE-2025-39693"},{"name":"CVE-2025-53057","url":"https://www.cve.org/CVERecord?id=CVE-2025-53057"},{"name":"CVE-2025-39682","url":"https://www.cve.org/CVERecord?id=CVE-2025-39682"},{"name":"CVE-2025-39676","url":"https://www.cve.org/CVERecord?id=CVE-2025-39676"},{"name":"CVE-2025-39813","url":"https://www.cve.org/CVERecord?id=CVE-2025-39813"},{"name":"CVE-2025-39847","url":"https://www.cve.org/CVERecord?id=CVE-2025-39847"},{"name":"CVE-2025-39819","url":"https://www.cve.org/CVERecord?id=CVE-2025-39819"},{"name":"CVE-2025-39783","url":"https://www.cve.org/CVERecord?id=CVE-2025-39783"},{"name":"CVE-2025-39715","url":"https://www.cve.org/CVERecord?id=CVE-2025-39715"},{"name":"CVE-2025-39835","url":"https://www.cve.org/CVERecord?id=CVE-2025-39835"},{"name":"CVE-2025-38700","url":"https://www.cve.org/CVERecord?id=CVE-2025-38700"},{"name":"CVE-2025-53066","url":"https://www.cve.org/CVERecord?id=CVE-2025-53066"},{"name":"CVE-2025-39841","url":"https://www.cve.org/CVERecord?id=CVE-2025-39841"},{"name":"CVE-2026-31790","url":"https://www.cve.org/CVERecord?id=CVE-2026-31790"},{"name":"CVE-2025-14831","url":"https://www.cve.org/CVERecord?id=CVE-2025-14831"},{"name":"CVE-2025-38714","url":"https://www.cve.org/CVERecord?id=CVE-2025-38714"},{"name":"CVE-2025-39752","url":"https://www.cve.org/CVERecord?id=CVE-2025-39752"}],"links":[],"reference":"CERTFR-2026-AVI-0565","revisions":[{"description":"Version initiale","revision_date":"2026-05-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Siemens. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens","vendor_advisories":[{"published_at":"2026-05-12","title":"Bulletin de s\u00e9curit\u00e9 Siemens SSA-392349","url":"https://cert-portal.siemens.com/productcert/html/ssa-392349.html"},{"published_at":"2026-05-12","title":"Bulletin de s\u00e9curit\u00e9 Siemens SSA-032379","url":"https://cert-portal.siemens.com/productcert/html/ssa-032379.html"},{"published_at":"2026-05-12","title":"Bulletin de s\u00e9curit\u00e9 Siemens SSA-786884","url":"https://cert-portal.siemens.com/productcert/html/ssa-786884.html"},{"published_at":"2026-05-12","title":"Bulletin de s\u00e9curit\u00e9 Siemens SSA-688146","url":"https://cert-portal.siemens.com/productcert/html/ssa-688146.html"},{"published_at":"2026-05-12","title":"Bulletin de s\u00e9curit\u00e9 Siemens SSA-387223","url":"https://cert-portal.siemens.com/productcert/html/ssa-387223.html"}]}
