Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-5743 (GCVE-0-2016-5743)
Vulnerability from cvelistv5
- n/a
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T01:08:00.812Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1036441",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1036441"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"name": "92112",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/92112"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-07-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "1036441",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1036441"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"name": "92112",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/92112"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-5743",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1036441",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036441"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"name": "92112",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92112"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-5743",
"datePublished": "2016-07-22T15:00:00",
"dateReserved": "2016-06-22T00:00:00",
"dateUpdated": "2024-08-06T01:08:00.812Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2016-5743\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-07-22T15:59:00.147\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.\"},{\"lang\":\"es\",\"value\":\"Siemens SIMATIC WinCC en versiones anteriores a 7.3 Update 10 y 7.4 en versiones anteriores a Update 1, SIMATIC BATCH en versiones anteriores a 8.1 SP1 Update 9 seg\u00fan se distribuye en SIMATIC PCS 7 hasta la versi\u00f3n 8.1 SP1, SIMATIC OpenPCS 7 en versiones anteriores a 8.1 Update 3 seg\u00fan se distribuye en SIMATIC PCS 7 hasta la versi\u00f3n 8.1 SP1, SIMATIC OpenPCS 7 en versiones anteriores a 8.2 Update 1 seg\u00fan se distribuye en SIMATIC PCS 7 8.2 y SIMATIC WinCC Runtime Professional en versiones anteriores a 13 SP1 Update 9 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes manipulados.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_batch:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.1\",\"matchCriteriaId\":\"640FFC01-A0B7-466F-AE23-4BAEAADA4D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.3\",\"matchCriteriaId\":\"441E574D-1A66-4D8B-A0C5-4CC03E1D89D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.4\",\"matchCriteriaId\":\"CA2E9785-246F-496B-9139-02E2F4003352\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:siemens:simatic_pcs_7:*:sp1:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.1\",\"matchCriteriaId\":\"9B434F8E-7E14-4D76-AC55-A15EF8EC10FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_openpcs_7:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.1\",\"matchCriteriaId\":\"E38B1737-F40A-4278-8687-6928AE03B0C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:siemens:simatic_pcs_7:*:sp1:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.1\",\"matchCriteriaId\":\"9B434F8E-7E14-4D76-AC55-A15EF8EC10FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:simatic_openpcs_7:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.2\",\"matchCriteriaId\":\"4A18AA81-7FC3-4977-AFC9-77920845C8B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.2\",\"matchCriteriaId\":\"8B62697B-2F75-44EA-A1F8-14BF9D1F99CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:sp1:*:*:*:*:*:*\",\"versionEndIncluding\":\"13\",\"matchCriteriaId\":\"7F133189-C3AB-4FFD-9B5C-F181CFE50671\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/92112\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036441\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/92112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036441\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
ghsa-m243-hgqw-35jc
Vulnerability from github
Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.
{
"affected": [],
"aliases": [
"CVE-2016-5743"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2016-07-22T15:59:00Z",
"severity": "CRITICAL"
},
"details": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.",
"id": "GHSA-m243-hgqw-35jc",
"modified": "2022-05-17T03:40:18Z",
"published": "2022-05-17T03:40:18Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5743"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/92112"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1036441"
},
{
"type": "WEB",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
gsd-2016-5743
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2016-5743",
"description": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.",
"id": "GSD-2016-5743"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-5743"
],
"details": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.",
"id": "GSD-2016-5743",
"modified": "2023-12-13T01:21:25.113711Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-5743",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1036441",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036441"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
"refsource": "CONFIRM",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"name": "92112",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92112"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_batch:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_pcs_7:*:sp1:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.1",
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_openpcs_7:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_pcs_7:*:sp1:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.1",
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_openpcs_7:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:sp1:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13",
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.2",
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-5743"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
"refsource": "CONFIRM",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"name": "92112",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/92112"
},
{
"name": "1036441",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1036441"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01",
"refsource": "MISC",
"tags": [],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": true,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2016-11-28T20:29Z",
"publishedDate": "2016-07-22T15:59Z"
}
}
}
icsa-16-208-01c
Vulnerability from csaf_cisa
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-16-208-01C JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2016/icsa-16-208-01c.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-16-208-01C - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-16-208-01c"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Siemens SIMATIC WinCC, PCS 7, and WinCC Runtime Professional Vulnerabilities (Update C)",
"tracking": {
"current_release_date": "2025-06-25T18:13:26.602224Z",
"generator": {
"date": "2025-06-25T18:13:26.602197Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-16-208-01C",
"initial_release_date": "2016-04-29T06:00:00.000000Z",
"revision_history": [
{
"date": "2016-04-29T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2025-06-25T18:13:26.602224Z",
"legacy_version": "CSAF Conversion",
"number": "2",
"summary": "Advisory converted into a CSAF"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cUpdate_12",
"product": {
"name": "Siemens SIMATIC WinCC 7.0 SP2: \u003cUpdate_12",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC 7.0 SP2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cUpdate_8",
"product": {
"name": "Siemens SIMATIC WinCC 7.0 SP3: \u003cUpdate_8",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC 7.0 SP3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cUpdate_13",
"product": {
"name": "Siemens SIMATIC WinCC 7.2: \u003cUpdate_13",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC 7.2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cUpdate_10",
"product": {
"name": "Siemens SIMATIC WinCC 7.3: \u003cUpdate_10",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC 7.3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cUpdate_1",
"product": {
"name": "Siemens SIMATIC WinCC 7.4: \u003cUpdate_1",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC 7.4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.1_SP4_with_WinCC_V7.0_SP2_Update_12",
"product": {
"name": "Siemens SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7): \u003cV7.1_SP4_with_WinCC_V7.0_SP2_Update_12",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV8.0_SP2_with_WinCC_V7.2_Update_13",
"product": {
"name": "Siemens SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7): \u003cV8.0_SP2_with_WinCC_V7.2_Update_13",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.1_SP1_with_WinCC_V7.3_Update_10",
"product": {
"name": "Siemens SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7): \u003c8.1_SP1_with_WinCC_V7.3_Update_10",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.2_with_WinCC_V7.4_Update_1",
"product": {
"name": "Siemens SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7): \u003c8.2_with_WinCC_V7.4_Update_1",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "SIMATIC PCS 7 (WinCC, Batch, Route Control, OPEN PCS 7)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV13_SP_1_Update_9",
"product": {
"name": "Siemens SIMATIC WinCC Runtime Professional: \u003cV13_SP_1_Update_9",
"product_id": "CSAFPID-0010"
}
}
],
"category": "product_name",
"name": "SIMATIC WinCC Runtime Professional"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5743",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens has produced updates for the following products and strongly encourages users to upgrade to the new versions as soon as possible: SIMATIC WinCC V7.0 SP2: Update to V7.0 SP2 Update 12 (https://support.industry.siemens.com/cs/ww/en/view/109741519)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741519"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.0 SP3:: Update to V7.0 SP3 Update 8 (https://support.industry.siemens.com/cs/ww/en/view/109741127)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741127"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.2: Update to WinCC V7.2 Update 13 (https://support.industry.siemens.com/cs/ww/en/view/109739416)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109739416"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.3: Update to WinCC V7.3 Update 10 (https://support.industry.siemens.com/cs/ww/en/view/109738470)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738470"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.4: Update to WinCC V7.4 Update 1 (https://support.industry.siemens.com/cs/ww/de/view/109738653)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/de/view/109738653"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V7.1 SP4 and earlier versions: WinCC: Update to WinCC V7.0 SP2 Update 12 (https://support.industry.siemens.com/cs/ww/en/view/109741519)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741519"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V7.1 SP1 Update 21 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V7.1 SP2 Update 11 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V7.1 SP2 Update 6 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V7.1 SP4 Update 2 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.0 SP2: WinCC: Update to WinCC V7.2 Update 13 (https://support.industry.siemens.com/cs/ww/en/view/109739416)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109739416"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.0 SP1 Update 17 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.0 SP1 Update 6 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V8.0 SP1 Update 8 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.1 SP1: WinCC: Update to WinCC V7.3 Update 10 (https://support.industry.siemens.com/cs/ww/en/view/109738470)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738470"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.1 SP1 Update 11 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.1 Update 2 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V8.1 Update 3 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.2: WinCC: Update to WinCC V7.4 Update 1 (https://support.industry.siemens.com/cs/ww/de/view/109738653)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/de/view/109738653"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.2 Update 1 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.2 Update 1 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS7 V8.2 Update 1",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Contact Customer Support: (https://support.industry.siemens.com/cs/de/en/)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/de/en/"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC Runtime Professional V13: Update to WinCC Runtime Professional V13 SP1 Update 9: (https://support.industry.siemens.com/cs/ww/en/view/109311724)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109311724"
},
{
"category": "mitigation",
"details": "Until updates can be applied, Siemens recommends the following steps to mitigate the risk: Always run WinCC, WinCC Runtime Professional, and PCS 7 stations within a trusted network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Ensure that WinCC, WinCC Runtime Professional, and PCS 7 stations communicate via encrypted channels only (e.g., activate feature \u201cEncrypted Communications\u201d in WinCC V7.3 and PCS 7 V8.1 SP1, or establish a VPN tunnel).",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Restrict access to the WinCC, WinCC Runtime Professional and PCS 7 stations to trusted entities.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Apply up-to-date application whitelisting software and virus scanners.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "For more information on these vulnerabilities and more detailed mitigation instructions, please see Siemens Security Advisory SSA-378531 at the following location: (http://www.siemens.com/cert/en/cert-security-advisories.htm)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "http://www.siemens.com/cert/en/cert-security-advisories.htm"
},
{
"category": "mitigation",
"details": "As a general security measure Siemens strongly recommends protecting network access to the WinCC and PCS 7 stations with appropriate mechanisms. Siemens advises configuring the environment according to Siemens operational guidelines in order to run the devices in a protected IT environment. (https://www.siemens.com/cert/operational-guidelines-industrial-security)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
}
]
},
{
"cve": "CVE-2016-5744",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens has produced updates for the following products and strongly encourages users to upgrade to the new versions as soon as possible: SIMATIC WinCC V7.0 SP2: Update to V7.0 SP2 Update 12 (https://support.industry.siemens.com/cs/ww/en/view/109741519)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741519"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.0 SP3:: Update to V7.0 SP3 Update 8 (https://support.industry.siemens.com/cs/ww/en/view/109741127)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741127"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.2: Update to WinCC V7.2 Update 13 (https://support.industry.siemens.com/cs/ww/en/view/109739416)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109739416"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.3: Update to WinCC V7.3 Update 10 (https://support.industry.siemens.com/cs/ww/en/view/109738470)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738470"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC V7.4: Update to WinCC V7.4 Update 1 (https://support.industry.siemens.com/cs/ww/de/view/109738653)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/de/view/109738653"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V7.1 SP4 and earlier versions: WinCC: Update to WinCC V7.0 SP2 Update 12 (https://support.industry.siemens.com/cs/ww/en/view/109741519)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109741519"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V7.1 SP1 Update 21 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V7.1 SP2 Update 11 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V7.1 SP2 Update 6 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V7.1 SP4 Update 2 (https://support.industry.siemens.com/cs/ww/en/view/109738681)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738681"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.0 SP2: WinCC: Update to WinCC V7.2 Update 13 (https://support.industry.siemens.com/cs/ww/en/view/109739416)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109739416"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.0 SP1 Update 17 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.0 SP1 Update 6 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V8.0 SP1 Update 8 (https://support.industry.siemens.com/cs/ww/en/view/109738680)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738680"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.1 SP1: WinCC: Update to WinCC V7.3 Update 10 (https://support.industry.siemens.com/cs/ww/en/view/109738470)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738470"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.1 SP1 Update 11 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.1 Update 2 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS 7 V8.1 Update 3 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "SIMATIC PCS 7 V8.2: WinCC: Update to WinCC V7.4 Update 1 (https://support.industry.siemens.com/cs/ww/de/view/109738653)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/de/view/109738653"
},
{
"category": "mitigation",
"details": "BATCH: Update to BATCH V8.2 Update 1 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "Route Control: Update to Route Control V8.2 Update 1 (https://support.industry.siemens.com/cs/ww/en/view/109738678)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109738678"
},
{
"category": "mitigation",
"details": "OpenPCS 7: Update to OpenPCS7 V8.2 Update 1",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Contact Customer Support: (https://support.industry.siemens.com/cs/de/en/)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/de/en/"
},
{
"category": "mitigation",
"details": "SIMATIC WinCC Runtime Professional V13: Update to WinCC Runtime Professional V13 SP1 Update 9: (https://support.industry.siemens.com/cs/ww/en/view/109311724)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109311724"
},
{
"category": "mitigation",
"details": "Until updates can be applied, Siemens recommends the following steps to mitigate the risk: Always run WinCC, WinCC Runtime Professional, and PCS 7 stations within a trusted network.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Ensure that WinCC, WinCC Runtime Professional, and PCS 7 stations communicate via encrypted channels only (e.g., activate feature \u201cEncrypted Communications\u201d in WinCC V7.3 and PCS 7 V8.1 SP1, or establish a VPN tunnel).",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Restrict access to the WinCC, WinCC Runtime Professional and PCS 7 stations to trusted entities.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "Apply up-to-date application whitelisting software and virus scanners.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
},
{
"category": "mitigation",
"details": "For more information on these vulnerabilities and more detailed mitigation instructions, please see Siemens Security Advisory SSA-378531 at the following location: (http://www.siemens.com/cert/en/cert-security-advisories.htm)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "http://www.siemens.com/cert/en/cert-security-advisories.htm"
},
{
"category": "mitigation",
"details": "As a general security measure Siemens strongly recommends protecting network access to the WinCC and PCS 7 stations with appropriate mechanisms. Siemens advises configuring the environment according to Siemens operational guidelines in order to run the devices in a protected IT environment. (https://www.siemens.com/cert/operational-guidelines-industrial-security)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
],
"url": "https://www.siemens.com/cert/operational-guidelines-industrial-security"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010"
]
}
]
}
]
}
cnvd-2016-05346
Vulnerability from cnvd
厂商已发布安全公告修复该漏洞,请及时关注更新: https://support.industry.siemens.com/cs/ww/en/view/109741519 https://support.industry.siemens.com/cs/ww/en/view/109741127 https://support.industry.siemens.com/cs/ww/en/view/109739416 https://support.industry.siemens.com/cs/ww/en/view/109738470 https://support.industry.siemens.com/cs/ww/en/view/109738653 https://support.industry.siemens.com/cs/ww/en/view/109738678 https://support.industry.siemens.com/cs/ww/en/view/109738674 https://support.industry.siemens.com/cs/ww/en/view/109311724 https://support.industry.siemens.com/cs/ww/en/view/109738681 https://support.industry.siemens.com/cs/ww/en/view/109738680 https://www.siemens.com/cert/operational-guidelines-industrial-security https://www.siemens.com/industrialsecurity https://www.siemens.com/cert/advisories
| Name | ['SIEMENS SIMATIC PCS 7 <=7.1 SP4', 'SIEMENS SIMATIC PCS 7 8.0', 'SIEMENS SIMATIC PCS 7 8.1\x7f', 'SIEMENS SIMATIC PCS 7 8.2', 'SIEMENS SIMATIC WinCC Runtime Professional < V13 SP 1 Update 9', 'SIEMENS SIMATIC WinCC <=7.0 SP 2', 'SIEMENS SIMATIC WinCC 7.0 SP 3', 'SIEMENS SIMATIC WinCC 7.2', 'SIEMENS SIMATIC WinCC 7.3 x,< 7.3 Update 10', 'SIEMENS SIMATIC WinCC 7.4 x,< 7.4 Update 1'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "92112"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2016-5743"
}
},
"description": "SIMATIC WinCC(Windows Control Center)\u89c6\u7a97\u63a7\u5236\u4e2d\u5fc3\uff0c\u662f\u897f\u95e8\u5b50\u7684\u8fc7\u7a0b\u76d1\u89c6\u7cfb\u7edf\uff0c\u4e3a\u5de5\u4e1a\u9886\u57df\u63d0\u4f9b\u5b8c\u5907\u7684\u76d1\u63a7\u4e0e\u6570\u636e\u91c7\u96c6\uff08SCADA\uff09\u529f\u80fd\uff1bPCS 7\u7cfb\u7edf\u662f\u65e0\u7f1d\u96c6\u6210\u7684\u81ea\u52a8\u5316\u89e3\u51b3\u65b9\u6848\uff0c\u53ef\u4ee5\u5e94\u7528\u4e8e\u6240\u6709\u5de5\u4e1a\u9886\u57df\u3002\r\n\r\nSIMATIC WinCC/PCS 7/WinCCRuntime Professional\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u53d1\u9001\u7279\u5236\u7684\u6570\u636e\u5305\u5230SIMATIC WinCC or WinCC Runtime Professional\u53ef\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Sergey Temnikov\uff0cVladimir Dashchenko",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u5b89\u5168\u516c\u544a\u4fee\u590d\u8be5\u6f0f\u6d1e\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109741519\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109741127\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109739416\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109738470\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109738653\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109738678\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109738674\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109311724\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109738681\r\nhttps://support.industry.siemens.com/cs/ww/en/view/109738680\r\nhttps://www.siemens.com/cert/operational-guidelines-industrial-security\r\nhttps://www.siemens.com/industrialsecurity\r\nhttps://www.siemens.com/cert/advisories",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-05346",
"openTime": "2016-07-25",
"patchDescription": "SIMATIC WinCC(Windows Control Center)\u89c6\u7a97\u63a7\u5236\u4e2d\u5fc3\uff0c\u662f\u897f\u95e8\u5b50\u7684\u8fc7\u7a0b\u76d1\u89c6\u7cfb\u7edf\uff0c\u4e3a\u5de5\u4e1a\u9886\u57df\u63d0\u4f9b\u5b8c\u5907\u7684\u76d1\u63a7\u4e0e\u6570\u636e\u91c7\u96c6\uff08SCADA\uff09\u529f\u80fd\uff1bPCS 7\u7cfb\u7edf\u662f\u65e0\u7f1d\u96c6\u6210\u7684\u81ea\u52a8\u5316\u89e3\u51b3\u65b9\u6848\uff0c\u53ef\u4ee5\u5e94\u7528\u4e8e\u6240\u6709\u5de5\u4e1a\u9886\u57df\u3002\r\n\r\nSIMATIC WinCC/PCS 7/WinCCRuntime Professional\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u53d1\u9001\u7279\u5236\u7684\u6570\u636e\u5305\u5230SIMATIC WinCC or WinCC Runtime Professional\u53ef\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "SIMATIC WinCC/PCS 7/WinCCRuntime Professional\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"SIEMENS SIMATIC PCS 7 \u003c=7.1 SP4",
"SIEMENS SIMATIC PCS 7 8.0",
"SIEMENS SIMATIC PCS 7 8.1\u007f",
"SIEMENS SIMATIC PCS 7 8.2",
"SIEMENS SIMATIC WinCC Runtime Professional \u003c V13 SP 1 Update 9",
"SIEMENS SIMATIC WinCC \u003c=7.0 SP 2",
"SIEMENS SIMATIC WinCC 7.0 SP 3",
"SIEMENS SIMATIC WinCC 7.2",
"SIEMENS SIMATIC WinCC 7.3 x\uff0c\u003c 7.3 Update 10",
"SIEMENS SIMATIC WinCC 7.4 x\uff0c\u003c 7.4 Update 1"
]
},
"referenceLink": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf",
"serverity": "\u9ad8",
"submitTime": "2016-07-25",
"title": "Siemens SIMATIC WinCC/PCS 7/WinCCRuntime Professional\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
var-201607-0465
Vulnerability from variot
Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets. The SIMATIC WinCC (Windows Control Center) window control center is Siemens' process monitoring system, providing complete monitoring and data acquisition (SCADA) functions for the industrial sector; the PCS 7 system is a seamlessly integrated automation solution for all industrial applications. field. A remote code execution vulnerability exists in SIMATIC WinCC/PCS 7/WinCC Runtime Professional. Multiple Siemens Products are prone to a remote code-execution vulnerability. An attacker can exploit this issue to inject and execute arbitrary code in the context of the affected application. Siemens SIMATIC WinCC, etc. are all industrial automation products of Siemens (Siemens) in Germany
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201607-0465",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "simatic wincc",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "7.3"
},
{
"model": "simatic openpcs 7",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "8.1"
},
{
"model": "simatic batch",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "7.1"
},
{
"model": "simatic wincc",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "7.4"
},
{
"model": "simatic openpcs 7",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "8.2"
},
{
"model": "simatic pcs",
"scope": "eq",
"trust": 0.9,
"vendor": "siemens",
"version": "78.0"
},
{
"model": "simatic pcs",
"scope": "eq",
"trust": 0.9,
"vendor": "siemens",
"version": "78.1"
},
{
"model": "simatic pcs",
"scope": "eq",
"trust": 0.9,
"vendor": "siemens",
"version": "78.2"
},
{
"model": "simatic wincc sp",
"scope": "eq",
"trust": 0.9,
"vendor": "siemens",
"version": "7.03"
},
{
"model": "simatic wincc",
"scope": "eq",
"trust": 0.9,
"vendor": "siemens",
"version": "7.2"
},
{
"model": "simatic wincc",
"scope": "eq",
"trust": 0.9,
"vendor": "siemens",
"version": "7.4"
},
{
"model": "simatic wincc",
"scope": "eq",
"trust": 0.9,
"vendor": "siemens",
"version": "7.3"
},
{
"model": "simatic wincc",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "7.4 update 1"
},
{
"model": "simatic wincc",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "7.4"
},
{
"model": "simatic pcs sp4",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "7\u003c=7.1"
},
{
"model": "simatic wincc runtime professional sp update",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v1319"
},
{
"model": "simatic wincc sp",
"scope": "lte",
"trust": 0.6,
"vendor": "siemens",
"version": "\u003c=7.02"
},
{
"model": "simatic wincc update",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "7.3x\u003c7.310"
},
{
"model": "simatic wincc update",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "7.4x\u003c7.41"
},
{
"model": "simatic openpcs 7",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "8.1"
},
{
"model": "simatic batch",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "7.1"
},
{
"model": "simatic openpcs 7",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "8.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "simatic wincc",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.4,
"vendor": "simatic openpcs 7",
"version": "*"
},
{
"model": "simatic wincc runtime professional sp1 upd2",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "13"
},
{
"model": "simatic wincc runtime professional",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "13"
},
{
"model": "simatic wincc update",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "7.32"
},
{
"model": "simatic wincc update",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "7.31"
},
{
"model": "simatic wincc update",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "7.29"
},
{
"model": "simatic wincc update",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "7.28"
},
{
"model": "simatic wincc update",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "7.21"
},
{
"model": "simatic wincc upd4",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "7.2"
},
{
"model": "simatic wincc upd11",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "7.2"
},
{
"model": "simatic wincc sp",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "7.02"
},
{
"model": "simatic pcs sp4",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "77.1"
},
{
"model": "simatic wincc runtime professional sp update",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "1319"
},
{
"model": "simatic wincc update",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "7.41"
},
{
"model": "simatic wincc update",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "7.310"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "simatic batch",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "649ab73e-2968-450b-b5d3-31e462571302"
},
{
"db": "CNVD",
"id": "CNVD-2016-05346"
},
{
"db": "BID",
"id": "92112"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004095"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-904"
},
{
"db": "NVD",
"id": "CVE-2016-5743"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:siemens:simatic_batch",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:siemens:simatic_openpcs_7",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:siemens:simatic_wincc_%28tia_portal%29",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:siemens:simatic_wincc_runtime_professional",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004095"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Sergey Temnikov and Vladimir Dashchenko, Critical Infrastructure Defence\nTeam, Kaspersky Lab.",
"sources": [
{
"db": "BID",
"id": "92112"
}
],
"trust": 0.3
},
"cve": "CVE-2016-5743",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-5743",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-05346",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "649ab73e-2968-450b-b5d3-31e462571302",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-94562",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-5743",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-5743",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-5743",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2016-05346",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201607-904",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "IVD",
"id": "649ab73e-2968-450b-b5d3-31e462571302",
"trust": 0.2,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-94562",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "649ab73e-2968-450b-b5d3-31e462571302"
},
{
"db": "CNVD",
"id": "CNVD-2016-05346"
},
{
"db": "VULHUB",
"id": "VHN-94562"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004095"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-904"
},
{
"db": "NVD",
"id": "CVE-2016-5743"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets. The SIMATIC WinCC (Windows Control Center) window control center is Siemens\u0027 process monitoring system, providing complete monitoring and data acquisition (SCADA) functions for the industrial sector; the PCS 7 system is a seamlessly integrated automation solution for all industrial applications. field. A remote code execution vulnerability exists in SIMATIC WinCC/PCS 7/WinCC Runtime Professional. Multiple Siemens Products are prone to a remote code-execution vulnerability. \nAn attacker can exploit this issue to inject and execute arbitrary code in the context of the affected application. Siemens SIMATIC WinCC, etc. are all industrial automation products of Siemens (Siemens) in Germany",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-5743"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004095"
},
{
"db": "CNVD",
"id": "CNVD-2016-05346"
},
{
"db": "BID",
"id": "92112"
},
{
"db": "IVD",
"id": "649ab73e-2968-450b-b5d3-31e462571302"
},
{
"db": "VULHUB",
"id": "VHN-94562"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-5743",
"trust": 3.6
},
{
"db": "SIEMENS",
"id": "SSA-378531",
"trust": 2.6
},
{
"db": "ICS CERT",
"id": "ICSA-16-208-01",
"trust": 2.2
},
{
"db": "BID",
"id": "92112",
"trust": 2.0
},
{
"db": "SECTRACK",
"id": "1036441",
"trust": 1.1
},
{
"db": "CNNVD",
"id": "CNNVD-201607-904",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2016-05346",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004095",
"trust": 0.8
},
{
"db": "IVD",
"id": "649AB73E-2968-450B-B5D3-31E462571302",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-94562",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "649ab73e-2968-450b-b5d3-31e462571302"
},
{
"db": "CNVD",
"id": "CNVD-2016-05346"
},
{
"db": "VULHUB",
"id": "VHN-94562"
},
{
"db": "BID",
"id": "92112"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004095"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-904"
},
{
"db": "NVD",
"id": "CVE-2016-5743"
}
]
},
"id": "VAR-201607-0465",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "649ab73e-2968-450b-b5d3-31e462571302"
},
{
"db": "CNVD",
"id": "CNVD-2016-05346"
},
{
"db": "VULHUB",
"id": "VHN-94562"
}
],
"trust": 1.5901556066666667
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "649ab73e-2968-450b-b5d3-31e462571302"
},
{
"db": "CNVD",
"id": "CNVD-2016-05346"
}
]
},
"last_update_date": "2024-11-23T21:54:30.330000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-378531",
"trust": 0.8,
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"title": "Patch for remote code execution vulnerability in SIMATIC WinCC/PCS 7/WinCCRuntime Professional",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/79586"
},
{
"title": "Multiple Siemens Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63264"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05346"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004095"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-904"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-94562"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004095"
},
{
"db": "NVD",
"id": "CVE-2016-5743"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"trust": 2.2,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-208-01"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/92112"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1036441"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5743"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5743"
},
{
"trust": 0.3,
"url": "http://www.siemens.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05346"
},
{
"db": "VULHUB",
"id": "VHN-94562"
},
{
"db": "BID",
"id": "92112"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004095"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-904"
},
{
"db": "NVD",
"id": "CVE-2016-5743"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "649ab73e-2968-450b-b5d3-31e462571302"
},
{
"db": "CNVD",
"id": "CNVD-2016-05346"
},
{
"db": "VULHUB",
"id": "VHN-94562"
},
{
"db": "BID",
"id": "92112"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004095"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-904"
},
{
"db": "NVD",
"id": "CVE-2016-5743"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-07-25T00:00:00",
"db": "IVD",
"id": "649ab73e-2968-450b-b5d3-31e462571302"
},
{
"date": "2016-07-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05346"
},
{
"date": "2016-07-22T00:00:00",
"db": "VULHUB",
"id": "VHN-94562"
},
{
"date": "2016-07-22T00:00:00",
"db": "BID",
"id": "92112"
},
{
"date": "2016-08-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004095"
},
{
"date": "2016-07-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-904"
},
{
"date": "2016-07-22T15:59:00.147000",
"db": "NVD",
"id": "CVE-2016-5743"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-07-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05346"
},
{
"date": "2016-11-28T00:00:00",
"db": "VULHUB",
"id": "VHN-94562"
},
{
"date": "2016-07-22T00:00:00",
"db": "BID",
"id": "92112"
},
{
"date": "2016-08-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004095"
},
{
"date": "2016-07-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-904"
},
{
"date": "2024-11-21T02:54:56.297000",
"db": "NVD",
"id": "CVE-2016-5743"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201607-904"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Siemens SIMATIC Vulnerabilities in products that allow arbitrary code execution",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004095"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation",
"sources": [
{
"db": "IVD",
"id": "649ab73e-2968-450b-b5d3-31e462571302"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-904"
}
],
"trust": 0.8
}
}
CERTFR-2016-AVI-250
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans SCADA les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | Siemens WinCC V7.4 sans la mise à jour de sécurité U1 | ||
| Siemens | N/A | Siemens SINEMA Remote Connect Server versions antérieures à 1.2 | ||
| Siemens | N/A | Siemens PCS 7 V8.1 SP1 avec WinCC V7.3 sans la mise à jour de sécurité U10, SIMATIC BATCH V8.1 SP1 sans la mise à jour de sécurité U9, OpenPCS 7 V8.1 sans la mise à jour de sécurité U3 | ||
| Siemens | N/A | Siemens SIMATIC NET PC-Software versions antérieures à V13 SP2 | ||
| Siemens | N/A | Siemens WinCC V7.3 sans la mise à jour de sécurité U10 | ||
| Siemens | N/A | Siemens PCS 7 V8.2 avec WinCC V7.4 sans la mise à jour de sécurité U1, OpenPCS 7 V8.2 sans la mise à jour de sécurité U3 | ||
| Siemens | N/A | Siemens WinCC Runtime Professional V13 versions antérieures à WinCC Runtime Professional V13 SP1 U9 |
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Siemens WinCC V7.4 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens PCS 7 V8.1 SP1 avec WinCC V7.3 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U10, SIMATIC BATCH V8.1 SP1 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U9, OpenPCS 7 V8.1 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens SIMATIC NET PC-Software versions ant\u00e9rieures \u00e0 V13 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens WinCC V7.3 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U10",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens PCS 7 V8.2 avec WinCC V7.4 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U1, OpenPCS 7 V8.2 sans la mise \u00e0 jour de s\u00e9curit\u00e9 U3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Siemens WinCC Runtime Professional V13 versions ant\u00e9rieures \u00e0 WinCC Runtime Professional V13 SP1 U9",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-5743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5743"
},
{
"name": "CVE-2016-6204",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6204"
},
{
"name": "CVE-2016-5874",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5874"
},
{
"name": "CVE-2016-5744",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5744"
}
],
"initial_release_date": "2016-07-25T00:00:00",
"last_revision_date": "2016-07-25T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-453276 Siemens du 22 juillet 2016",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-453276.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-119132 Siemens du 22 juillet 2016",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-119132.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-378531 Siemens du 22 juillet 2016",
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-378531.pdf"
}
],
"reference": "CERTFR-2016-AVI-250",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eSCADA les produits Siemens\u003c/span\u003e. Certaines d\u0027entre\nelles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans SCADA les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-453276 Siemens du 22 juillet 2016",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-378531 Siemens du 22 juillet 2016",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SCADA SSA-119132 Siemens du 22 juillet 2016",
"url": null
}
]
}
fkie_cve-2016-5743
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.securityfocus.com/bid/92112 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securitytracker.com/id/1036441 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf | Mitigation, Vendor Advisory | |
| cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/92112 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036441 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01 |
| Vendor | Product | Version | |
|---|---|---|---|
| siemens | simatic_batch | * | |
| siemens | simatic_wincc | * | |
| siemens | simatic_wincc | * | |
| siemens | simatic_pcs_7 | * | |
| siemens | simatic_openpcs_7 | * | |
| siemens | simatic_pcs_7 | * | |
| siemens | simatic_openpcs_7 | * | |
| siemens | simatic_pcs_7 | * | |
| siemens | simatic_wincc_runtime_professional | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:simatic_batch:*:*:*:*:*:*:*:*",
"matchCriteriaId": "640FFC01-A0B7-466F-AE23-4BAEAADA4D7C",
"versionEndIncluding": "7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "441E574D-1A66-4D8B-A0C5-4CC03E1D89D1",
"versionEndIncluding": "7.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA2E9785-246F-496B-9139-02E2F4003352",
"versionEndIncluding": "7.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:simatic_pcs_7:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "9B434F8E-7E14-4D76-AC55-A15EF8EC10FB",
"versionEndIncluding": "8.1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:simatic_openpcs_7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E38B1737-F40A-4278-8687-6928AE03B0C0",
"versionEndIncluding": "8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:simatic_pcs_7:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "9B434F8E-7E14-4D76-AC55-A15EF8EC10FB",
"versionEndIncluding": "8.1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:simatic_openpcs_7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A18AA81-7FC3-4977-AFC9-77920845C8B8",
"versionEndIncluding": "8.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B62697B-2F75-44EA-A1F8-14BF9D1F99CC",
"versionEndIncluding": "8.2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "7F133189-C3AB-4FFD-9B5C-F181CFE50671",
"versionEndIncluding": "13",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets."
},
{
"lang": "es",
"value": "Siemens SIMATIC WinCC en versiones anteriores a 7.3 Update 10 y 7.4 en versiones anteriores a Update 1, SIMATIC BATCH en versiones anteriores a 8.1 SP1 Update 9 seg\u00fan se distribuye en SIMATIC PCS 7 hasta la versi\u00f3n 8.1 SP1, SIMATIC OpenPCS 7 en versiones anteriores a 8.1 Update 3 seg\u00fan se distribuye en SIMATIC PCS 7 hasta la versi\u00f3n 8.1 SP1, SIMATIC OpenPCS 7 en versiones anteriores a 8.2 Update 1 seg\u00fan se distribuye en SIMATIC PCS 7 8.2 y SIMATIC WinCC Runtime Professional en versiones anteriores a 13 SP1 Update 9 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes manipulados."
}
],
"id": "CVE-2016-5743",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-07-22T15:59:00.147",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/92112"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1036441"
},
{
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"source": "cve@mitre.org",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/92112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1036441"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-378531.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-208-01"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.