Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-5698 (GCVE-0-2015-5698)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T06:59:03.900Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1033419",
"tags": [
"vdb-entry",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1033419"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02"
},
{
"tags": [
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf"
},
{
"tags": [
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-08-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-15T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1033419",
"tags": [
"vdb-entry"
],
"url": "http://www.securitytracker.com/id/1033419"
},
{
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf"
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02"
},
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf"
},
{
"url": "http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2015-5698",
"datePublished": "2015-08-30T00:00:00",
"dateReserved": "2015-07-29T00:00:00",
"dateUpdated": "2024-08-06T06:59:03.900Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2015-5698\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-08-30T14:59:03.313\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de CSRF en el servidor web en dispositivos Siemens SIMATIC S7-1200 CPU con firmware en versiones anteriores a 4.1.3, permite a atacantes remotos secuestrar la autenticaci\u00f3n de v\u00edctimas no especificadas a trav\u00e9s de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7_1200_cpu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.1.2\",\"matchCriteriaId\":\"5876D57A-A65A-4968-BDDA-EAA7EEB8BFCB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7_1200_cpu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79270F18-B58F-4F16-ACAD-297AE91F27EB\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1033419\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1033419\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
CERTFR-2015-AVI-364
Vulnerability from certfr_avis
Une vulnérabilité a été corrigée dans Siemens SIMATIC . Elle permet à un attaquant de provoquer une injection de requêtes illégitimes par rebond (CSRF).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
SIMATIC S7-1200 CPU versions antérieures à V4.1.3
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eSIMATIC S7-1200 CPU versions ant\u00e9rieures \u00e0 V4.1.3\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-5698",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5698"
}
],
"initial_release_date": "2015-08-28T00:00:00",
"last_revision_date": "2015-08-28T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-364",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-08-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eSiemens\nSIMATIC\u003c/span\u003e . Elle permet \u00e0 un attaquant de provoquer une injection\nde requ\u00eates ill\u00e9gitimes par rebond (CSRF).\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Siemens SIMATIC",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-134003 du 27 ao\u00fbt 2015",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf"
}
]
}
CERTFR-2020-AVI-077
Vulnerability from certfr_avis
Cet avis concerne une mise à jour en date du 10 février 2020 de 58 avis Siemens (cf. section documentation). Les avis Siemens listent désormais les variantes SIPLUS parmi les systèmes affectés.
De multiples vulnérabilités ont été découvertes dans les produits Siemens de variante SIPLUS. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
[Important] Certains avis étant anciens et étant donné le nombre de vulnérabilités traitées par les bulletins, le CERT-FR recommande de déterminer la version applicable pour chaque configuration et d'appliquer les mesures de protection établies par l'éditeur dans la section "workarounds and migitations" des bulletins de sécurité (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | CP 343-1 Advanced variante SIPLUS versions antérieures à 3.0.44 | ||
| Siemens | N/A | SITOP UPS1600 PROFINET variante SIPLUS versions antérieures à 2.2.0 | ||
| Siemens | N/A | SIMATIC IPC427D et IPC427E variante SIPLUS BIOS versions antérieures à V17.0x.14 et V21.01.18 | ||
| Siemens | N/A | CP 343-1 tous types et variante SIPLUS toutes versions antérieures à 3.1.1 | ||
| Siemens | N/A | CP 1543-1 variante SIPLUS versions antérieures à 2.1 | ||
| Siemens | N/A | SCALANCE X414 variante SIPLUS versions antérieures à 3.10.2 | ||
| Siemens | N/A | TIM 1531 IRC variante SIPLUS versions antérieures à 2.0 | ||
| Siemens | N/A | SIMATIC S7-1200 CPU variante SIPLUS versions antérieures à 4.1.3 4.3 | ||
| Siemens | N/A | TIM 4R-IE variante SIPLUS versions antérieures à 2.6.0 | ||
| Siemens | N/A | CP 1243-1 tous types et variante SIPLUS versions antérieures à 3.1 | ||
| Siemens | N/A | SIMATIC S7-400 tous types en variante SIPLUS toutes versions | ||
| Siemens | N/A | SCALANCE X-200IRT variante SIPLUS versions antérieures à 5.4.0 | ||
| Siemens | N/A | SCALANCE X-300 variante SIPLUS versions antérieures à 4.1.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU variante SIPLUS versions antérieures à 2.5 2.6 | ||
| Siemens | N/A | LOGO!8 BM variante SIPLUS toutes versions | ||
| Siemens | N/A | SINAMICS G120(C/P/D) avec PN variante SIPLUS versions antérieures à 4.7 SP9 HF1 | ||
| Siemens | N/A | SIMOCODE pro V PN variante SIPLUS versions antérieures à 2.1.1 | ||
| Siemens | N/A | SIMATIC S7-410 CPU variante SIPLUS variante SIPLUS versions antérieures à 8.2.1 | ||
| Siemens | N/A | SINAMICS S120 variante SIPLUS versions antérieures à 4.7 HF29, 4.8 HF5 et 5.1 SP1 | ||
| Siemens | N/A | SIMATIC ET200pro et ET200S variante SIPLUS toutes versions | ||
| Siemens | N/A | SCALANCE X-200 variante SIPLUS versions antérieures à 5.2.2 | ||
| Siemens | N/A | IE/PB-Link variante SIPLUS versions antérieures à 3.0 | ||
| Siemens | N/A | SIMATIC ET200M variante SIPLUS toutes versions | ||
| Siemens | N/A | SIMATIC S7-300 CPU sans support PROFINET variante SIPLUS versions antérieures à 3.X.16 | ||
| Siemens | N/A | SIMATIC ET200MP variante SIPLUS versions antérieures à 4.2 | ||
| Siemens | N/A | SIMOCODE pro V EIP variante SIPLUS versions antérieures à 1.0.2 | ||
| Siemens | N/A | SIMATIC ET200SP Open Controller variante SIPLUS versions antérieures à 2.6 et 4.2 | ||
| Siemens | N/A | SIMATIC PN/PN Coupler variante SIPLUS versions antérieures à 4.2.0 | ||
| Siemens | N/A | TIM 4R-IE DNP3 variante SIPLUS versions antérieures à 3.1.0 | ||
| Siemens | N/A | CP 1542SP-1 et 1543SP-1 variante SIPLUS versions antérieures à 1.0.15 | ||
| Siemens | N/A | IM 3V-IE / TIM 3V-IE Advanced variante SIPLUS versions antérieures à 2.6.0 | ||
| Siemens | N/A | SIMOTION variante SIPLUS versions antérieures à 5.1 HF1 | ||
| Siemens | N/A | TIM 3V-IE DNP3 variante SIPLUS versions antérieures à 3.1.0 | ||
| Siemens | N/A | CP 443-1 tous types et variante SIPLUS toutes versions antérieures à 3.2.9 3.2.17 | ||
| Siemens | N/A | SIMATIC HMI Basic Panels 2nd Generation, Comfort 15-22, Comfort 4-12, Comfort Pro Panels variante SIPLUS versions antérieures à V14 SP1 Upd 6 et V15.1 Upd 1 | ||
| Siemens | N/A | SIMATIC S7-300 CPU avec support PROFINET variante SIPLUS versions antérieures à 3.X.16 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CP 343-1 Advanced variante SIPLUS versions ant\u00e9rieures \u00e0 3.0.44",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SITOP UPS1600 PROFINET variante SIPLUS versions ant\u00e9rieures \u00e0 2.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC427D et IPC427E variante SIPLUS BIOS versions ant\u00e9rieures \u00e0 V17.0x.14 et V21.01.18",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 343-1 tous types et variante SIPLUS toutes versions ant\u00e9rieures \u00e0 3.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 1543-1 variante SIPLUS versions ant\u00e9rieures \u00e0 2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X414 variante SIPLUS versions ant\u00e9rieures \u00e0 3.10.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 1531 IRC variante SIPLUS versions ant\u00e9rieures \u00e0 2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1200 CPU variante SIPLUS versions ant\u00e9rieures \u00e0 4.1.3 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 4R-IE variante SIPLUS versions ant\u00e9rieures \u00e0 2.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 1243-1 tous types et variante SIPLUS versions ant\u00e9rieures \u00e0 3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 tous types en variante SIPLUS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200IRT variante SIPLUS versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-300 variante SIPLUS versions ant\u00e9rieures \u00e0 4.1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU variante SIPLUS versions ant\u00e9rieures \u00e0 2.5 2.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO!8 BM variante SIPLUS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G120(C/P/D) avec PN variante SIPLUS versions ant\u00e9rieures \u00e0 4.7 SP9 HF1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOCODE pro V PN variante SIPLUS versions ant\u00e9rieures \u00e0 2.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-410 CPU variante SIPLUS variante SIPLUS versions ant\u00e9rieures \u00e0 8.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS S120 variante SIPLUS versions ant\u00e9rieures \u00e0 4.7 HF29, 4.8 HF5 et 5.1 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200pro et ET200S variante SIPLUS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200 variante SIPLUS versions ant\u00e9rieures \u00e0 5.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "IE/PB-Link variante SIPLUS versions ant\u00e9rieures \u00e0 3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200M variante SIPLUS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU sans support PROFINET variante SIPLUS versions ant\u00e9rieures \u00e0 3.X.16",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200MP variante SIPLUS versions ant\u00e9rieures \u00e0 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOCODE pro V EIP variante SIPLUS versions ant\u00e9rieures \u00e0 1.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200SP Open Controller variante SIPLUS versions ant\u00e9rieures \u00e0 2.6 et 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PN/PN Coupler variante SIPLUS versions ant\u00e9rieures \u00e0 4.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 4R-IE DNP3 variante SIPLUS versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 1542SP-1 et 1543SP-1 variante SIPLUS versions ant\u00e9rieures \u00e0 1.0.15",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "IM 3V-IE / TIM 3V-IE Advanced variante SIPLUS versions ant\u00e9rieures \u00e0 2.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION variante SIPLUS versions ant\u00e9rieures \u00e0 5.1 HF1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 3V-IE DNP3 variante SIPLUS versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 443-1 tous types et variante SIPLUS toutes versions ant\u00e9rieures \u00e0 3.2.9 3.2.17",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI Basic Panels 2nd Generation, Comfort 15-22, Comfort 4-12, Comfort Pro Panels variante SIPLUS versions ant\u00e9rieures \u00e0 V14 SP1 Upd 6 et V15.1 Upd 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU avec support PROFINET variante SIPLUS versions ant\u00e9rieures \u00e0 3.X.16",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solution\n\n**\\[Important\\]** Certains avis \u00e9tant anciens et \u00e9tant donn\u00e9 le nombre\nde vuln\u00e9rabilit\u00e9s trait\u00e9es par les bulletins, le CERT-FR recommande de\nd\u00e9terminer la version applicable pour chaque configuration et\nd\u0027appliquer les mesures de protection \u00e9tablies par l\u0027\u00e9diteur dans la\nsection \"workarounds and migitations\" des bulletins de s\u00e9curit\u00e9 (cf.\nsection Documentation).\n\n\u00a0\n",
"cves": [
{
"name": "CVE-2016-8561",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8561"
},
{
"name": "CVE-2014-2909",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2909"
},
{
"name": "CVE-2014-2248",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2248"
},
{
"name": "CVE-2014-2254",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2254"
},
{
"name": "CVE-2018-16558",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16558"
},
{
"name": "CVE-2014-2246",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2246"
},
{
"name": "CVE-2016-2200",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2200"
},
{
"name": "CVE-2014-2251",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2251"
},
{
"name": "CVE-2014-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2255"
},
{
"name": "CVE-2013-0700",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0700"
},
{
"name": "CVE-2014-8479",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8479"
},
{
"name": "CVE-2017-2680",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2680"
},
{
"name": "CVE-2014-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2908"
},
{
"name": "CVE-2014-2258",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2258"
},
{
"name": "CVE-2014-2257",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2257"
},
{
"name": "CVE-2018-16556",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16556"
},
{
"name": "CVE-2014-8478",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8478"
},
{
"name": "CVE-2017-12741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12741"
},
{
"name": "CVE-2015-8214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8214"
},
{
"name": "CVE-2018-13807",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13807"
},
{
"name": "CVE-2014-2259",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2259"
},
{
"name": "CVE-2013-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2780"
},
{
"name": "CVE-2018-16561",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16561"
},
{
"name": "CVE-2014-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2253"
},
{
"name": "CVE-2018-4850",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4850"
},
{
"name": "CVE-2015-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1048"
},
{
"name": "CVE-2018-16559",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16559"
},
{
"name": "CVE-2016-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2201"
},
{
"name": "CVE-2014-2247",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2247"
},
{
"name": "CVE-2014-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2249"
},
{
"name": "CVE-2014-2250",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2250"
},
{
"name": "CVE-2018-16557",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16557"
},
{
"name": "CVE-2016-2846",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2846"
},
{
"name": "CVE-2015-5698",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5698"
},
{
"name": "CVE-2014-2256",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2256"
},
{
"name": "CVE-2016-8562",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8562"
},
{
"name": "CVE-2016-3949",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3949"
},
{
"name": "CVE-2015-2177",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2177"
},
{
"name": "CVE-2014-2252",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2252"
}
],
"initial_release_date": "2020-02-11T00:00:00",
"last_revision_date": "2020-02-12T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-818183 du 08 juin 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-818183.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-268644 du 09 septembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"
},
{
"title": "Avis CERTFR-2018-AVI-429",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-429/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-892715 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-994726 du 05 mars 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf"
},
{
"title": "Avis CERTFR-2015-AVI-090",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2015-AVI-090/"
},
{
"title": "Avis CERTFR-2018-AVI-235",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-235/"
},
{
"title": "Avis CERTFR-2014-AVI-137",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2014-AVI-137/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-447396 du 11 septembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-447396.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-804486 du 14 mai 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-987029 du 05 mars 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-987029.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-240718 du 13 septembre 2012",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-240718.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-168644 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-168644.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-180635 du 08 janvier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180635.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-293562 du 08 mai 2017",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-310688 du 14 ao\u00fbt 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310688.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-546832 du 03 mai 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-546832.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-100232 du 13 ao\u00fbt 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914382 du 15 mai 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-914382.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-744850 du 11 juin 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-134003 du 27 ao\u00fbt 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf"
},
{
"title": "Avis CERTFR-2016-AVI-384",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2016-AVI-384/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-321046 du 19 janvier 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-321046.pdf"
},
{
"title": "Avis CERTFR-2018-AVI-543",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-543/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-306710 du 08 janvier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-944083 du 13 novembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-944083.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-724606 du 20 d\u00e9cembre 2012",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-724606.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-253230 du 08 f\u00e9vrier 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-346262 du 23 novembre 2017",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-346262.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-179516 du 07 ao\u00fbt 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf"
},
{
"title": "Avis CERTFR-2015-AVI-364",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2015-AVI-364/"
},
{
"title": "Avis CERTFR-2017-AVI-140",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2017-AVI-140/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-584286 du 13 novembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-584286.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-874235 du 26 juin 2017",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-234763 du 17 juillet 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-742938 du 04 d\u00e9cembre 2013",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-742938.pdf"
},
{
"title": "Avis CERTFR-2017-AVI-428",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2017-AVI-428/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-377318 du 12 f\u00e9vrier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-892012 du 24 avril 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892012.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-087240 du 30 ao\u00fbt 2017",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-087240.pdf"
},
{
"title": "Avis CERTFR-2019-AVI-004",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2019-AVI-004/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-850708 du 11 septembre 2013",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-850708.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-110922 du 27 mars 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-507847 du 09 octobre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-507847.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-113131 du 13 novembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-113131.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-176087 du 01 octobre 2013",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-176087.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-763427 du 27 novembre 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-763427.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-623229 du 08 avril 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-623229.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-592007 du 20 mars 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-592007.pdf"
},
{
"title": "Avis CERTFR-2016-AVI-196",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2016-AVI-196/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-233109 du 13 novembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-954136 du 02 f\u00e9vrier 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-954136.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-672373 du 18 novembre 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-672373.pdf"
},
{
"title": "Avis CERTFR-2014-AVI-126",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2014-AVI-126/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-487246 du 08 avril 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-487246.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-542701 du 14 mai 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-542701.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-347726 du 09 octobre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-347726.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-254686 du 09 octobre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-279823 du 08 octobre 2012",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-279823.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-982399 du 11 d\u00e9cembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-982399.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-456423 du 12 mars 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf"
},
{
"title": "Avis CERTFR-2016-AVI-062",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2016-AVI-062/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-635659 du 15 avril 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-130874 du 05 avril 2012",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-130874.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-141614 du 09 avril 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-141614.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-597212 du 21 janvier 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-597212.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-654382 du 20 mars 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-654382.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-833048 du 14 mars 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-833048.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-625789 du 10 juin 2011",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-625789.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-731239 du 09 d\u00e9cembre 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-731239.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-470231 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-470231.pdf"
}
],
"reference": "CERTFR-2020-AVI-077",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-02-11T00:00:00.000000"
},
{
"description": "int\u00e9gration des 58 avis",
"revision_date": "2020-02-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "\u003cstrong\u003eCet avis concerne une mise \u00e0 jour en date du 10 f\u00e9vrier 2020 de 58\navis Siemens (cf. section documentation). Les avis Siemens listent\nd\u00e9sormais les variantes SIPLUS parmi les syst\u00e8mes affect\u00e9s.\u003c/strong\u003e\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens de variante SIPLUS. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens de variante SIPLUS",
"vendor_advisories": []
}
ghsa-62q2-fh79-mxq5
Vulnerability from github
Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
{
"affected": [],
"aliases": [
"CVE-2015-5698"
],
"database_specific": {
"cwe_ids": [
"CWE-352"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2015-08-30T14:59:00Z",
"severity": "HIGH"
},
"details": "Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.",
"id": "GHSA-62q2-fh79-mxq5",
"modified": "2022-05-17T03:19:37Z",
"published": "2022-05-17T03:19:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5698"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1033419"
},
{
"type": "WEB",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf"
}
],
"schema_version": "1.4.0",
"severity": []
}
icsa-15-239-02
Vulnerability from csaf_cisa
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-15-239-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2015/icsa-15-239-02.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-15-239-02 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-15-239-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Siemens SIMATIC S7-1200 CSRF Vulnerability",
"tracking": {
"current_release_date": "2025-06-06T16:08:35.760091Z",
"generator": {
"date": "2025-06-06T16:08:35.760027Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-15-239-02",
"initial_release_date": "2015-05-30T06:00:00.000000Z",
"revision_history": [
{
"date": "2015-05-30T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2025-06-06T16:08:35.760091Z",
"legacy_version": "CSAF Conversion",
"number": "2",
"summary": "Advisory converted into a CSAF"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV4.1.3",
"product": {
"name": "Siemens SIMATIC S7-1200 CPU family: \u003cV4.1.3",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1200 CPU family"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-5698",
"cwe": {
"id": "CWE-352",
"name": "Cross-Site Request Forgery (CSRF)"
},
"notes": [
{
"category": "summary",
"text": "Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens provides firmware update V4.1.3 for SIMATIC S7-1200 V4 CPUs which fixes the vulnerability and recommends customers to update to the new fixed version. This update can be found on their web site at the following locations: (https://support.industry.siemens.com/cs/ww/en/ps/13685/dl) (https://support.industry.siemens.com/cs/ww/en/ps/13686/dl)",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/ps/13685/dl"
},
{
"category": "mitigation",
"details": "Siemens provides firmware update V4.1.3 for SIMATIC S7-1200 V4 CPUs which fixes the vulnerability and recommends customers to update to the new fixed version. This update can be found on their web site at the following locations: (https://support.industry.siemens.com/cs/ww/en/ps/13685/dl) (https://support.industry.siemens.com/cs/ww/en/ps/13686/dl)",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/ps/13686/dl"
},
{
"category": "mitigation",
"details": "As a general security measure Siemens strongly recommends to protect network access to the web interface of S7-1200 CPUs with appropriate mechanisms. Siemens advises to configure the environment according to Siemens operational guidelines in order to run the devices in a protected IT environment.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information on these vulnerabilities and detailed instructions, please see Siemens Security Advisory SSA-134003 at the following location: (https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf)",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf"
}
],
"scores": [
{
"cvss_v2": {
"baseScore": 6.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
var-201508-0076
Vulnerability from variot
Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. The Siemens SIMATIC S7-1200 CPU device is a small programmable controller from Siemens AG that is well suited to the needs of small and medium-sized automation systems. A remote attacker could exploit this vulnerability to perform unauthorized operations. Siemens SIMATIC S7-1200 is prone to a cross-site request-forgery vulnerability because it fails to properly validate HTTP requests. Other attacks are also possible. Versions prior to SIMATIC S7-1200 4.1.3 are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201508-0076",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "simatic s7-1200 cpu",
"scope": null,
"trust": 1.4,
"vendor": "siemens",
"version": null
},
{
"model": "simatic s7 1200 cpu",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "simatic s7 1200 cpu",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "4.1.2"
},
{
"model": "simatic s7-1200 cpu",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "4.1.3"
},
{
"model": "simatic s7 1200 cpu",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "4.1.2"
},
{
"model": "simatic s7-1200",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "4.0"
},
{
"model": "simatic s7-1200",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "3.0.1"
},
{
"model": "simatic s7-1200",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "3.0.0"
},
{
"model": "simatic s7-1200",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "3.0"
},
{
"model": "simatic s7-1200",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "2.0.3"
},
{
"model": "simatic s7-1200",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "2.0.2"
},
{
"model": "simatic s7-1200",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "4.1.3"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "simatic s7 1200 cpu",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "simatic s7 1200 cpu",
"version": "4.1.2"
}
],
"sources": [
{
"db": "IVD",
"id": "78a4444c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-05789"
},
{
"db": "BID",
"id": "76507"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004505"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-570"
},
{
"db": "NVD",
"id": "CVE-2015-5698"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:siemens:simatic_s7_1200_cpu",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:simatic_s7_1200_cpu_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-004505"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "RoseSecurity",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201508-570"
}
],
"trust": 0.6
},
"cve": "CVE-2015-5698",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2015-5698",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2015-05789",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "78a4444c-2351-11e6-abef-000c29c66e3d",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-83659",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-5698",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-5698",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2015-05789",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201508-570",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "78a4444c-2351-11e6-abef-000c29c66e3d",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-83659",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2015-5698",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "78a4444c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-05789"
},
{
"db": "VULHUB",
"id": "VHN-83659"
},
{
"db": "VULMON",
"id": "CVE-2015-5698"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004505"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-570"
},
{
"db": "NVD",
"id": "CVE-2015-5698"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. The Siemens SIMATIC S7-1200 CPU device is a small programmable controller from Siemens AG that is well suited to the needs of small and medium-sized automation systems. A remote attacker could exploit this vulnerability to perform unauthorized operations. Siemens SIMATIC S7-1200 is prone to a cross-site request-forgery vulnerability because it fails to properly validate HTTP requests. Other attacks are also possible. \nVersions prior to SIMATIC S7-1200 4.1.3 are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-5698"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004505"
},
{
"db": "CNVD",
"id": "CNVD-2015-05789"
},
{
"db": "BID",
"id": "76507"
},
{
"db": "IVD",
"id": "78a4444c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "VULHUB",
"id": "VHN-83659"
},
{
"db": "VULMON",
"id": "CVE-2015-5698"
}
],
"trust": 2.79
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-83659",
"trust": 0.1,
"type": "unknown"
},
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=44667",
"trust": 0.1,
"type": "exploit"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-83659"
},
{
"db": "VULMON",
"id": "CVE-2015-5698"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-5698",
"trust": 3.7
},
{
"db": "ICS CERT",
"id": "ICSA-15-239-02",
"trust": 3.5
},
{
"db": "SIEMENS",
"id": "SSA-134003",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1033419",
"trust": 1.8
},
{
"db": "PACKETSTORM",
"id": "172315",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-201508-570",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2015-05789",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004505",
"trust": 0.8
},
{
"db": "CXSECURITY",
"id": "WLB-2023050052",
"trust": 0.6
},
{
"db": "BID",
"id": "76507",
"trust": 0.4
},
{
"db": "IVD",
"id": "78A4444C-2351-11E6-ABEF-000C29C66E3D",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "147789",
"trust": 0.1
},
{
"db": "SEEBUG",
"id": "SSVID-89492",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-83659",
"trust": 0.1
},
{
"db": "EXPLOIT-DB",
"id": "44667",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-5698",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "78a4444c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-05789"
},
{
"db": "VULHUB",
"id": "VHN-83659"
},
{
"db": "VULMON",
"id": "CVE-2015-5698"
},
{
"db": "BID",
"id": "76507"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004505"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-570"
},
{
"db": "NVD",
"id": "CVE-2015-5698"
}
]
},
"id": "VAR-201508-0076",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "78a4444c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-05789"
},
{
"db": "VULHUB",
"id": "VHN-83659"
}
],
"trust": 1.566485105
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "78a4444c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-05789"
}
]
},
"last_update_date": "2024-11-23T23:02:40.126000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-134003",
"trust": 0.8,
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf"
},
{
"title": "Patch for Siemens SIMATIC S7-1200 CPU device cross-site request forgery vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/63513"
},
{
"title": "Siemens SIMATIC S7-1200 CPU Fixing measures for device cross-site request forgery vulnerability",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=237629"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=dbf83786001d547f6a6371945436b27c"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-05789"
},
{
"db": "VULMON",
"id": "CVE-2015-5698"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004505"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-570"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-352",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-83659"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004505"
},
{
"db": "NVD",
"id": "CVE-2015-5698"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.6,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-15-239-02"
},
{
"trust": 1.8,
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf"
},
{
"trust": 1.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id/1033419"
},
{
"trust": 1.7,
"url": "http://packetstormsecurity.com/files/172315/siemens-simatic-s7-1200-cross-site-request-forgery.html"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5698"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5698"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/issue/wlb-2023050052"
},
{
"trust": 0.3,
"url": "http://www.siemens.com/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/352.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.exploit-db.com/exploits/44667/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-05789"
},
{
"db": "VULHUB",
"id": "VHN-83659"
},
{
"db": "VULMON",
"id": "CVE-2015-5698"
},
{
"db": "BID",
"id": "76507"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004505"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-570"
},
{
"db": "NVD",
"id": "CVE-2015-5698"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "78a4444c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-05789"
},
{
"db": "VULHUB",
"id": "VHN-83659"
},
{
"db": "VULMON",
"id": "CVE-2015-5698"
},
{
"db": "BID",
"id": "76507"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-004505"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-570"
},
{
"db": "NVD",
"id": "CVE-2015-5698"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-09-06T00:00:00",
"db": "IVD",
"id": "78a4444c-2351-11e6-abef-000c29c66e3d"
},
{
"date": "2015-09-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-05789"
},
{
"date": "2015-08-30T00:00:00",
"db": "VULHUB",
"id": "VHN-83659"
},
{
"date": "2015-08-30T00:00:00",
"db": "VULMON",
"id": "CVE-2015-5698"
},
{
"date": "2015-08-27T00:00:00",
"db": "BID",
"id": "76507"
},
{
"date": "2015-09-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-004505"
},
{
"date": "2015-08-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201508-570"
},
{
"date": "2015-08-30T14:59:03.313000",
"db": "NVD",
"id": "CVE-2015-5698"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-09-06T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-05789"
},
{
"date": "2016-12-22T00:00:00",
"db": "VULHUB",
"id": "VHN-83659"
},
{
"date": "2023-05-15T00:00:00",
"db": "VULMON",
"id": "CVE-2015-5698"
},
{
"date": "2015-08-27T00:00:00",
"db": "BID",
"id": "76507"
},
{
"date": "2015-09-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-004505"
},
{
"date": "2023-05-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201508-570"
},
{
"date": "2024-11-21T02:33:39.987000",
"db": "NVD",
"id": "CVE-2015-5698"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201508-570"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens SIMATIC S7-1200 CPU Device Cross-Site Request Forgery Vulnerability",
"sources": [
{
"db": "IVD",
"id": "78a4444c-2351-11e6-abef-000c29c66e3d"
},
{
"db": "CNVD",
"id": "CNVD-2015-05789"
},
{
"db": "CNNVD",
"id": "CNNVD-201508-570"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "cross-site request forgery",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201508-570"
}
],
"trust": 0.6
}
}
tid-322
Vulnerability from emb3d
If a threat actor can include malicious JavaScript within a page viewed by a legitimate device user, that script can send malicious authenticated HTTP requests (using XMLHttpRequest) to the device. Due to the Same Origin Policy defined by most web browsers, the HTTP requests sent to the device will include any valid session tokens the user/browser has previously established for that device. Therefore, this could be used to send malicious requests to a device to change key functions or configurations, including changing device credentials. This requires that the threat actor tricks the user into viewing another page while they have an authenticated session with the device.
- CWE-352: Cross-Site Request Forgery (CSRF) (Compound)
fkie_cve-2015-5698
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html | ||
| cve@mitre.org | http://www.securitytracker.com/id/1033419 | ||
| cve@mitre.org | http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf | Patch, Vendor Advisory | |
| cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf | ||
| cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1033419 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02 | Third Party Advisory, US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| siemens | simatic_s7_1200_cpu_firmware | * | |
| siemens | simatic_s7_1200_cpu | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_s7_1200_cpu_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5876D57A-A65A-4968-BDDA-EAA7EEB8BFCB",
"versionEndIncluding": "4.1.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_s7_1200_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79270F18-B58F-4F16-ACAD-297AE91F27EB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de CSRF en el servidor web en dispositivos Siemens SIMATIC S7-1200 CPU con firmware en versiones anteriores a 4.1.3, permite a atacantes remotos secuestrar la autenticaci\u00f3n de v\u00edctimas no especificadas a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2015-5698",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-08-30T14:59:03.313",
"references": [
{
"source": "cve@mitre.org",
"url": "http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1033419"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf"
},
{
"source": "cve@mitre.org",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1033419"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2015-5698
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2015-5698",
"description": "Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.",
"id": "GSD-2015-5698",
"references": [
"https://packetstormsecurity.com/files/cve/CVE-2015-5698"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-5698"
],
"details": "Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.",
"id": "GSD-2015-5698",
"modified": "2023-12-13T01:20:06.210550Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-5698",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1033419",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1033419"
},
{
"name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf"
},
{
"name": "http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_s7_1200_cpu_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_s7_1200_cpu:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-5698"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-134003.pdf"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02"
},
{
"name": "1033419",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id/1033419"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf",
"refsource": "CONFIRM",
"tags": [],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf"
},
{
"name": "http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html",
"refsource": "MISC",
"tags": [],
"url": "http://packetstormsecurity.com/files/172315/Siemens-SIMATIC-S7-1200-Cross-Site-Request-Forgery.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-05-15T17:15Z",
"publishedDate": "2015-08-30T14:59Z"
}
}
}
cnvd-2015-05789
Vulnerability from cnvd
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://support.industry.siemens.com/cs/ww/en/ps/13685/dl
| Name | Siemens SIMATIC S7-1200 CPU |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2015-5698"
}
},
"description": "Siemens SIMATIC S7-1200 CPU device\u662f\u5fb7\u56fd\u897f\u95e8\u5b50\uff08Siemens\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5145\u5206\u6ee1\u8db3\u4e8e\u4e2d\u5c0f\u578b\u81ea\u52a8\u5316\u7cfb\u7edf\u9700\u6c42\u7684\u5c0f\u578b\u53ef\u7f16\u7a0b\u63a7\u5236\u5668\u3002\r\n\r\n\u4f7f\u75284.1.3\u4e4b\u524d\u7248\u672c\u56fa\u4ef6\u7684Siemens SIMATIC S7-1200 CPU\u8bbe\u5907\u4e2d\u7684Web\u670d\u52a1\u5668\u4e2d\u5b58\u5728\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u672a\u6388\u6743\u64cd\u4f5c\u3002",
"discovererName": "ICS-CERT",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a https://support.industry.siemens.com/cs/ww/en/ps/13685/dl",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-05789",
"openTime": "2015-09-06",
"patchDescription": "Siemens SIMATIC S7-1200 CPU device\u662f\u5fb7\u56fd\u897f\u95e8\u5b50\uff08Siemens\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5145\u5206\u6ee1\u8db3\u4e8e\u4e2d\u5c0f\u578b\u81ea\u52a8\u5316\u7cfb\u7edf\u9700\u6c42\u7684\u5c0f\u578b\u53ef\u7f16\u7a0b\u63a7\u5236\u5668\u3002 \r\n\r\n\u4f7f\u75284.1.3\u4e4b\u524d\u7248\u672c\u56fa\u4ef6\u7684Siemens SIMATIC S7-1200 CPU\u8bbe\u5907\u4e2d\u7684Web\u670d\u52a1\u5668\u4e2d\u5b58\u5728\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u672a\u6388\u6743\u64cd\u4f5c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Siemens SIMATIC S7-1200 CPU\u8bbe\u5907\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Siemens SIMATIC S7-1200 CPU"
},
"referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-15-239-02",
"serverity": "\u4e2d",
"submitTime": "2015-09-01",
"title": "Siemens SIMATIC S7-1200 CPU\u8bbe\u5907\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.