Brand Name: | Siemens |
Model Number: | 6DD1681-0GK0 |
MOQ: | 1 |
Price: | Negotiations |
Attribute | Value |
---|---|
Type | Interface Module |
Series | 6DD |
Siemens simadyn D 6DD1681-0GK0 SU13 E D Interface Module-Distressed Surplus New In Box
New units are no longer continuously manufactured, and therefore supply is scarce. However, at AoteWell Automation we specialize in sourcing hard-to-find products, and although the lead time varies, the average is between 5-7 business days.
AoteWell Automation always gives customers excellent service and prices that are highly competitive. Requirements for delivery and availability do affect pricing. Contact us for a timely quote.
Payment options include all major credit cards, company checks and wire transfers. We are also able to work with escrow companies at the request of our customers.
Typically, we use major carriers, including UPS, FedEx, USPS, and DHL. If our customer has a particular shipping requirement, we will work with other carriers to ship the product.
We frequently work with companies to help them move and migrate excess inventory. All too frequently, companies dispose of end-of-life equipment for scrap value. Our goal is to obtain top market value for companies who need to dispose of excess industrial equipment.
SCALANCE X switches are used to connect industrial components like Programmable Logic Controllers (PLCs) or Human Machine Interfaces (HMIs).
The vulnerability classification has been performed by using the CVSS scoring system in version 3.0 (CVSS v3.0). The CVSS environmental score is specific to the customer's environment and will impact the overall CVSS score. The environmental score should therefore be individually defined by the customer to accomplish final scoring.
The device contains a vulnerability that could allow an attacker to trigger a denial-of-service condition by sending large message packages repeatedly to the telnet service.
The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device.
At the time of advisory publication no public exploitation of this security vulnerability was known.
Yasakawa Motor, Driver SG- | Mitsubishi Motor HC-,HA- |
Westinghouse Modules 1C-,5X- | Emerson VE-,KJ- |
Honeywell TC-,TK- | GE Modules IC - |
Fanuc motor A0- | Yokogawa transmitter EJA- |