Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-16561 (GCVE-0-2018-16561)
Vulnerability from cvelistv5
- Improper Input Validation
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Siemens | SIMATIC S7-300 CPUs |
Version: All versions < V3.X.16 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T10:24:32.860Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SIMATIC S7-300 CPUs",
"vendor": "Siemens",
"versions": [
{
"status": "affected",
"version": "All versions \u003c V3.X.16"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions \u003c V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Input Validation",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-04-17T13:38:34",
"orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"shortName": "siemens"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2018-16561",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SIMATIC S7-300 CPUs",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V3.X.16"
}
]
}
}
]
},
"vendor_name": "Siemens"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions \u003c V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"assignerShortName": "siemens",
"cveId": "CVE-2018-16561",
"datePublished": "2019-04-17T13:38:34",
"dateReserved": "2018-09-06T00:00:00",
"dateUpdated": "2024-08-05T10:24:32.860Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2018-16561\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2019-04-17T14:29:03.370\",\"lastModified\":\"2024-11-21T03:52:59.010\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions \u003c V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en las CPUs SIMATIC S7-300 (todas las versiones anteriores a la V3.X.16). Las CPU afectadas comprueban incorrectamente los paquetes de comunicaci\u00f3n S7 que podr\u00edan causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) de la CPU. La CPU permanecer\u00e1 en modo DEFECT hasta el reinicio manual. La explotaci\u00f3n con \u00e9xito requiere que un atacante pueda enviar un paquete de comunicaci\u00f3n S7 especialmente creado a una interfaz de comunicaci\u00f3n de la CPU. Esto incluye Ethernet, PROFIBUS y Multi Point Interfaces (MPI). No se requieren interacci\u00f3n ni privilegios del usuario para explotar la vulnerabilidad de seguridad. La vulnerabilidad podr\u00eda causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) de la funcionalidad principal de la CPU, comprometiendo la disponibilidad del sistema. En el momento de la publicaci\u00f3n de asesoramiento, no se conoc\u00eda la explotaci\u00f3n p\u00fablica de esta vulnerabilidad de seguridad. Siemens confirma la vulnerabilidad de seguridad y proporciona mitigaciones para resolver el problema de seguridad.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-300_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C096137-C1E3-4D19-87A9-BEB7A081DD1E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EFD4E99-5C66-443F-8B6F-FA01C895DE78\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-300f_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE4251D0-0A74-4A47-9510-A92843D927F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-300f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7A17613-A0E1-4CC9-AC56-6AA2C8418275\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-300fs_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7FD4F0A-D270-4B72-BEAC-5362B0CCFC23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-300fs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9CC39A6-BA9F-487C-9504-5658A2AE0188\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_s7-300t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C311B40-8D03-451B-B5D3-0BB278930743\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_s7-300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC45A7F6-19C9-4485-8A4C-8C14819B095E\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf\",\"source\":\"productcert@siemens.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
var-201904-0659
Vulnerability from variot
A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions < V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue. SIMATIC S7-300 CPU Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Siemens SIMATIC S7-300 CPU is a modular universal controller for the manufacturing industry from Siemens. A denial of service vulnerability exists in the Siemens SIMATIC S7-300 CPU. Remote attackers may exploit this issue to cause denial-of-service conditions, denying service to legitimate users. The vulnerability stems from the failure of the network system or product to properly validate the input data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201904-0659",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "simatic s7-300",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "simatic s7-300fs",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "simatic s7-300t",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "simatic s7-300f",
"scope": "eq",
"trust": 1.0,
"vendor": "siemens",
"version": null
},
{
"model": "simatic s7-300",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "3.x.16"
},
{
"model": "simatic s7-300f",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "3.x.16"
},
{
"model": "simatic s7-300fs",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "3.x.16"
},
{
"model": "simatic s7-300t",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "3.x.16"
},
{
"model": "simatic s7-300 cpu",
"scope": "lt",
"trust": 0.6,
"vendor": "siemens",
"version": "v3.x.16"
},
{
"model": "simatic s7-300 cpu",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "0"
},
{
"model": "simatic s7-300 cpu",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "v3.x.16"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "simatic s7 300",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "simatic s7 300f",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "simatic s7 300fs",
"version": null
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "simatic s7 300t",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "7d8409c2-463f-11e9-bb16-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-00986"
},
{
"db": "BID",
"id": "107000"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-015286"
},
{
"db": "NVD",
"id": "CVE-2018-16561"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:siemens:simatic_s7-300_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:simatic_s7-300f_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:simatic_s7-300fs_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:siemens:simatic_s7-300t_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-015286"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "China Industrial Control Systems Cyber Emergency Response Team (CIC) ,China Industrial Control Systems Cyber Emergency Response Team,China Industrial Control Systems Cyber Emergency Response Team (CIC) reported this vulnerability to Siemens.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-309"
}
],
"trust": 0.6
},
"cve": "CVE-2018-16561",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2018-16561",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-00986",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "7d8409c2-463f-11e9-bb16-000c29342cb1",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-126933",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2018-16561",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-16561",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2018-16561",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2019-00986",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201901-309",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "7d8409c2-463f-11e9-bb16-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-126933",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d8409c2-463f-11e9-bb16-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-00986"
},
{
"db": "VULHUB",
"id": "VHN-126933"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-015286"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-309"
},
{
"db": "NVD",
"id": "CVE-2018-16561"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions \u003c V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue. SIMATIC S7-300 CPU Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Siemens SIMATIC S7-300 CPU is a modular universal controller for the manufacturing industry from Siemens. A denial of service vulnerability exists in the Siemens SIMATIC S7-300 CPU. \nRemote attackers may exploit this issue to cause denial-of-service conditions, denying service to legitimate users. The vulnerability stems from the failure of the network system or product to properly validate the input data",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-16561"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-015286"
},
{
"db": "CNVD",
"id": "CNVD-2019-00986"
},
{
"db": "BID",
"id": "107000"
},
{
"db": "IVD",
"id": "7d8409c2-463f-11e9-bb16-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-126933"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-16561",
"trust": 3.6
},
{
"db": "SIEMENS",
"id": "SSA-306710",
"trust": 2.6
},
{
"db": "ICS CERT",
"id": "ICSA-19-043-04",
"trust": 1.7
},
{
"db": "BID",
"id": "107000",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201901-309",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-00986",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-015286",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2019.0446",
"trust": 0.6
},
{
"db": "IVD",
"id": "7D8409C2-463F-11E9-BB16-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-126933",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7d8409c2-463f-11e9-bb16-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-00986"
},
{
"db": "VULHUB",
"id": "VHN-126933"
},
{
"db": "BID",
"id": "107000"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-015286"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-309"
},
{
"db": "NVD",
"id": "CVE-2018-16561"
}
]
},
"id": "VAR-201904-0659",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d8409c2-463f-11e9-bb16-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-00986"
},
{
"db": "VULHUB",
"id": "VHN-126933"
}
],
"trust": 1.5436781499999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "7d8409c2-463f-11e9-bb16-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-00986"
}
]
},
"last_update_date": "2024-11-23T22:45:00.468000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-306710",
"trust": 0.8,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
},
{
"title": "Patch for Siemens SIMATIC S7-300 CPU Denial of Service Vulnerability (CNVD-2019-00986)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/149567"
},
{
"title": "SIMATIC S7-300 CPUs Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88500"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-00986"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-015286"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-309"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-399",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-126933"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-015286"
},
{
"db": "NVD",
"id": "CVE-2018-16561"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-16561"
},
{
"trust": 0.9,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-043-04"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-16561"
},
{
"trust": 0.8,
"url": "https://www.us-cert.gov/ics/advisories/icsa-19-043-04"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/107000"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/75494"
},
{
"trust": 0.3,
"url": "http://www.siemens.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-00986"
},
{
"db": "VULHUB",
"id": "VHN-126933"
},
{
"db": "BID",
"id": "107000"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-015286"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-309"
},
{
"db": "NVD",
"id": "CVE-2018-16561"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7d8409c2-463f-11e9-bb16-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-00986"
},
{
"db": "VULHUB",
"id": "VHN-126933"
},
{
"db": "BID",
"id": "107000"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-015286"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-309"
},
{
"db": "NVD",
"id": "CVE-2018-16561"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-01-10T00:00:00",
"db": "IVD",
"id": "7d8409c2-463f-11e9-bb16-000c29342cb1"
},
{
"date": "2019-01-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-00986"
},
{
"date": "2019-04-17T00:00:00",
"db": "VULHUB",
"id": "VHN-126933"
},
{
"date": "2019-02-12T00:00:00",
"db": "BID",
"id": "107000"
},
{
"date": "2019-05-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-015286"
},
{
"date": "2019-01-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-309"
},
{
"date": "2019-04-17T14:29:03.370000",
"db": "NVD",
"id": "CVE-2018-16561"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-01-10T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-00986"
},
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-126933"
},
{
"date": "2019-02-12T00:00:00",
"db": "BID",
"id": "107000"
},
{
"date": "2019-07-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-015286"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201901-309"
},
{
"date": "2024-11-21T03:52:59.010000",
"db": "NVD",
"id": "CVE-2018-16561"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201901-309"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SIMATIC S7-300 CPU Resource management vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-015286"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Resource management error",
"sources": [
{
"db": "IVD",
"id": "7d8409c2-463f-11e9-bb16-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201901-309"
}
],
"trust": 0.8
}
}
CERTFR-2019-AVI-004
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SICAM A8000 CP-802X toutes versions antérieures à 14 | ||
| Siemens | N/A | SIMATIC S7-300 CPUs toutes versions antérieures à 3.X.16 | ||
| Siemens | N/A | SICAM A8000 CP-8000 toutes versions antérieures à 14 | ||
| Siemens | N/A | SICAM A8000 CP-8050 toutes versions antérieures à 2.00 | ||
| Siemens | N/A | Microgiciel variante IEC 61850 pour module EN100 Ethernet toutes versions antérieures à 4.33 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU toutes versions antérieures à 1.8.5 | ||
| Siemens | N/A | CP 1604 toutes versions antérieures à 2.8 | ||
| Siemens | N/A | CP 1616 toutes versions antérieures à 2.8 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU toutes versions postérieures à 2.0 et antérieures à 2.5 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SICAM A8000 CP-802X toutes versions ant\u00e9rieures \u00e0 14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPUs toutes versions ant\u00e9rieures \u00e0 3.X.16",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SICAM A8000 CP-8000 toutes versions ant\u00e9rieures \u00e0 14",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SICAM A8000 CP-8050 toutes versions ant\u00e9rieures \u00e0 2.00",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Microgiciel variante IEC 61850 pour module EN100 Ethernet toutes versions ant\u00e9rieures \u00e0 4.33",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU toutes versions ant\u00e9rieures \u00e0 1.8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 1604 toutes versions ant\u00e9rieures \u00e0 2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 1616 toutes versions ant\u00e9rieures \u00e0 2.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU toutes versions post\u00e9rieures \u00e0 2.0 et ant\u00e9rieures \u00e0 2.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-13810",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13810"
},
{
"name": "CVE-2018-13809",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13809"
},
{
"name": "CVE-2018-16558",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16558"
},
{
"name": "CVE-2018-13798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13798"
},
{
"name": "CVE-2018-11452",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11452"
},
{
"name": "CVE-2018-16561",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16561"
},
{
"name": "CVE-2018-11451",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11451"
},
{
"name": "CVE-2018-16559",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16559"
},
{
"name": "CVE-2018-13808",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13808"
}
],
"initial_release_date": "2019-01-08T00:00:00",
"last_revision_date": "2019-01-08T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-004",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).\n",
"title": "SCADA Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-559174 du 8 janvier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-559174.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-180635 du 8 janvier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180635.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-325546 du 8 janvier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-325546.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-579309 du 8 janvier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-579309.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-306710 du 8 janvier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
}
]
}
CERTFR-2020-AVI-077
Vulnerability from certfr_avis
Cet avis concerne une mise à jour en date du 10 février 2020 de 58 avis Siemens (cf. section documentation). Les avis Siemens listent désormais les variantes SIPLUS parmi les systèmes affectés.
De multiples vulnérabilités ont été découvertes dans les produits Siemens de variante SIPLUS. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
[Important] Certains avis étant anciens et étant donné le nombre de vulnérabilités traitées par les bulletins, le CERT-FR recommande de déterminer la version applicable pour chaque configuration et d'appliquer les mesures de protection établies par l'éditeur dans la section "workarounds and migitations" des bulletins de sécurité (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | CP 343-1 Advanced variante SIPLUS versions antérieures à 3.0.44 | ||
| Siemens | N/A | SITOP UPS1600 PROFINET variante SIPLUS versions antérieures à 2.2.0 | ||
| Siemens | N/A | SIMATIC IPC427D et IPC427E variante SIPLUS BIOS versions antérieures à V17.0x.14 et V21.01.18 | ||
| Siemens | N/A | CP 343-1 tous types et variante SIPLUS toutes versions antérieures à 3.1.1 | ||
| Siemens | N/A | CP 1543-1 variante SIPLUS versions antérieures à 2.1 | ||
| Siemens | N/A | SCALANCE X414 variante SIPLUS versions antérieures à 3.10.2 | ||
| Siemens | N/A | TIM 1531 IRC variante SIPLUS versions antérieures à 2.0 | ||
| Siemens | N/A | SIMATIC S7-1200 CPU variante SIPLUS versions antérieures à 4.1.3 4.3 | ||
| Siemens | N/A | TIM 4R-IE variante SIPLUS versions antérieures à 2.6.0 | ||
| Siemens | N/A | CP 1243-1 tous types et variante SIPLUS versions antérieures à 3.1 | ||
| Siemens | N/A | SIMATIC S7-400 tous types en variante SIPLUS toutes versions | ||
| Siemens | N/A | SCALANCE X-200IRT variante SIPLUS versions antérieures à 5.4.0 | ||
| Siemens | N/A | SCALANCE X-300 variante SIPLUS versions antérieures à 4.1.2 | ||
| Siemens | N/A | SIMATIC S7-1500 CPU variante SIPLUS versions antérieures à 2.5 2.6 | ||
| Siemens | N/A | LOGO!8 BM variante SIPLUS toutes versions | ||
| Siemens | N/A | SINAMICS G120(C/P/D) avec PN variante SIPLUS versions antérieures à 4.7 SP9 HF1 | ||
| Siemens | N/A | SIMOCODE pro V PN variante SIPLUS versions antérieures à 2.1.1 | ||
| Siemens | N/A | SIMATIC S7-410 CPU variante SIPLUS variante SIPLUS versions antérieures à 8.2.1 | ||
| Siemens | N/A | SINAMICS S120 variante SIPLUS versions antérieures à 4.7 HF29, 4.8 HF5 et 5.1 SP1 | ||
| Siemens | N/A | SIMATIC ET200pro et ET200S variante SIPLUS toutes versions | ||
| Siemens | N/A | SCALANCE X-200 variante SIPLUS versions antérieures à 5.2.2 | ||
| Siemens | N/A | IE/PB-Link variante SIPLUS versions antérieures à 3.0 | ||
| Siemens | N/A | SIMATIC ET200M variante SIPLUS toutes versions | ||
| Siemens | N/A | SIMATIC S7-300 CPU sans support PROFINET variante SIPLUS versions antérieures à 3.X.16 | ||
| Siemens | N/A | SIMATIC ET200MP variante SIPLUS versions antérieures à 4.2 | ||
| Siemens | N/A | SIMOCODE pro V EIP variante SIPLUS versions antérieures à 1.0.2 | ||
| Siemens | N/A | SIMATIC ET200SP Open Controller variante SIPLUS versions antérieures à 2.6 et 4.2 | ||
| Siemens | N/A | SIMATIC PN/PN Coupler variante SIPLUS versions antérieures à 4.2.0 | ||
| Siemens | N/A | TIM 4R-IE DNP3 variante SIPLUS versions antérieures à 3.1.0 | ||
| Siemens | N/A | CP 1542SP-1 et 1543SP-1 variante SIPLUS versions antérieures à 1.0.15 | ||
| Siemens | N/A | IM 3V-IE / TIM 3V-IE Advanced variante SIPLUS versions antérieures à 2.6.0 | ||
| Siemens | N/A | SIMOTION variante SIPLUS versions antérieures à 5.1 HF1 | ||
| Siemens | N/A | TIM 3V-IE DNP3 variante SIPLUS versions antérieures à 3.1.0 | ||
| Siemens | N/A | CP 443-1 tous types et variante SIPLUS toutes versions antérieures à 3.2.9 3.2.17 | ||
| Siemens | N/A | SIMATIC HMI Basic Panels 2nd Generation, Comfort 15-22, Comfort 4-12, Comfort Pro Panels variante SIPLUS versions antérieures à V14 SP1 Upd 6 et V15.1 Upd 1 | ||
| Siemens | N/A | SIMATIC S7-300 CPU avec support PROFINET variante SIPLUS versions antérieures à 3.X.16 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CP 343-1 Advanced variante SIPLUS versions ant\u00e9rieures \u00e0 3.0.44",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SITOP UPS1600 PROFINET variante SIPLUS versions ant\u00e9rieures \u00e0 2.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC IPC427D et IPC427E variante SIPLUS BIOS versions ant\u00e9rieures \u00e0 V17.0x.14 et V21.01.18",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 343-1 tous types et variante SIPLUS toutes versions ant\u00e9rieures \u00e0 3.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 1543-1 variante SIPLUS versions ant\u00e9rieures \u00e0 2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X414 variante SIPLUS versions ant\u00e9rieures \u00e0 3.10.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 1531 IRC variante SIPLUS versions ant\u00e9rieures \u00e0 2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1200 CPU variante SIPLUS versions ant\u00e9rieures \u00e0 4.1.3 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 4R-IE variante SIPLUS versions ant\u00e9rieures \u00e0 2.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 1243-1 tous types et variante SIPLUS versions ant\u00e9rieures \u00e0 3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-400 tous types en variante SIPLUS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200IRT variante SIPLUS versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-300 variante SIPLUS versions ant\u00e9rieures \u00e0 4.1.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 CPU variante SIPLUS versions ant\u00e9rieures \u00e0 2.5 2.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "LOGO!8 BM variante SIPLUS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS G120(C/P/D) avec PN variante SIPLUS versions ant\u00e9rieures \u00e0 4.7 SP9 HF1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOCODE pro V PN variante SIPLUS versions ant\u00e9rieures \u00e0 2.1.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-410 CPU variante SIPLUS variante SIPLUS versions ant\u00e9rieures \u00e0 8.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS S120 variante SIPLUS versions ant\u00e9rieures \u00e0 4.7 HF29, 4.8 HF5 et 5.1 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200pro et ET200S variante SIPLUS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SCALANCE X-200 variante SIPLUS versions ant\u00e9rieures \u00e0 5.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "IE/PB-Link variante SIPLUS versions ant\u00e9rieures \u00e0 3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200M variante SIPLUS toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU sans support PROFINET variante SIPLUS versions ant\u00e9rieures \u00e0 3.X.16",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200MP variante SIPLUS versions ant\u00e9rieures \u00e0 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOCODE pro V EIP variante SIPLUS versions ant\u00e9rieures \u00e0 1.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC ET200SP Open Controller variante SIPLUS versions ant\u00e9rieures \u00e0 2.6 et 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PN/PN Coupler variante SIPLUS versions ant\u00e9rieures \u00e0 4.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 4R-IE DNP3 variante SIPLUS versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 1542SP-1 et 1543SP-1 variante SIPLUS versions ant\u00e9rieures \u00e0 1.0.15",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "IM 3V-IE / TIM 3V-IE Advanced variante SIPLUS versions ant\u00e9rieures \u00e0 2.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION variante SIPLUS versions ant\u00e9rieures \u00e0 5.1 HF1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "TIM 3V-IE DNP3 variante SIPLUS versions ant\u00e9rieures \u00e0 3.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP 443-1 tous types et variante SIPLUS toutes versions ant\u00e9rieures \u00e0 3.2.9 3.2.17",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC HMI Basic Panels 2nd Generation, Comfort 15-22, Comfort 4-12, Comfort Pro Panels variante SIPLUS versions ant\u00e9rieures \u00e0 V14 SP1 Upd 6 et V15.1 Upd 1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-300 CPU avec support PROFINET variante SIPLUS versions ant\u00e9rieures \u00e0 3.X.16",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": "",
"content": "## Solution\n\n**\\[Important\\]** Certains avis \u00e9tant anciens et \u00e9tant donn\u00e9 le nombre\nde vuln\u00e9rabilit\u00e9s trait\u00e9es par les bulletins, le CERT-FR recommande de\nd\u00e9terminer la version applicable pour chaque configuration et\nd\u0027appliquer les mesures de protection \u00e9tablies par l\u0027\u00e9diteur dans la\nsection \"workarounds and migitations\" des bulletins de s\u00e9curit\u00e9 (cf.\nsection Documentation).\n\n\u00a0\n",
"cves": [
{
"name": "CVE-2016-8561",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8561"
},
{
"name": "CVE-2014-2909",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2909"
},
{
"name": "CVE-2014-2248",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2248"
},
{
"name": "CVE-2014-2254",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2254"
},
{
"name": "CVE-2018-16558",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16558"
},
{
"name": "CVE-2014-2246",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2246"
},
{
"name": "CVE-2016-2200",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2200"
},
{
"name": "CVE-2014-2251",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2251"
},
{
"name": "CVE-2014-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2255"
},
{
"name": "CVE-2013-0700",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0700"
},
{
"name": "CVE-2014-8479",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8479"
},
{
"name": "CVE-2017-2680",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2680"
},
{
"name": "CVE-2014-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2908"
},
{
"name": "CVE-2014-2258",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2258"
},
{
"name": "CVE-2014-2257",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2257"
},
{
"name": "CVE-2018-16556",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16556"
},
{
"name": "CVE-2014-8478",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8478"
},
{
"name": "CVE-2017-12741",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12741"
},
{
"name": "CVE-2015-8214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8214"
},
{
"name": "CVE-2018-13807",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13807"
},
{
"name": "CVE-2014-2259",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2259"
},
{
"name": "CVE-2013-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2780"
},
{
"name": "CVE-2018-16561",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16561"
},
{
"name": "CVE-2014-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2253"
},
{
"name": "CVE-2018-4850",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4850"
},
{
"name": "CVE-2015-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1048"
},
{
"name": "CVE-2018-16559",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16559"
},
{
"name": "CVE-2016-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2201"
},
{
"name": "CVE-2014-2247",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2247"
},
{
"name": "CVE-2014-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2249"
},
{
"name": "CVE-2014-2250",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2250"
},
{
"name": "CVE-2018-16557",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16557"
},
{
"name": "CVE-2016-2846",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2846"
},
{
"name": "CVE-2015-5698",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5698"
},
{
"name": "CVE-2014-2256",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2256"
},
{
"name": "CVE-2016-8562",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8562"
},
{
"name": "CVE-2016-3949",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3949"
},
{
"name": "CVE-2015-2177",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2177"
},
{
"name": "CVE-2014-2252",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2252"
}
],
"initial_release_date": "2020-02-11T00:00:00",
"last_revision_date": "2020-02-12T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-818183 du 08 juin 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-818183.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-268644 du 09 septembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf"
},
{
"title": "Avis CERTFR-2018-AVI-429",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-429/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-892715 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-994726 du 05 mars 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf"
},
{
"title": "Avis CERTFR-2015-AVI-090",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2015-AVI-090/"
},
{
"title": "Avis CERTFR-2018-AVI-235",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-235/"
},
{
"title": "Avis CERTFR-2014-AVI-137",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2014-AVI-137/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-447396 du 11 septembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-447396.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-804486 du 14 mai 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-987029 du 05 mars 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-987029.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-240718 du 13 septembre 2012",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-240718.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-168644 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-168644.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-180635 du 08 janvier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180635.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-293562 du 08 mai 2017",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-293562.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-310688 du 14 ao\u00fbt 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-310688.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-546832 du 03 mai 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-546832.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-100232 du 13 ao\u00fbt 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-100232.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914382 du 15 mai 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-914382.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-744850 du 11 juin 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-774850.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-134003 du 27 ao\u00fbt 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-134003.pdf"
},
{
"title": "Avis CERTFR-2016-AVI-384",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2016-AVI-384/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-321046 du 19 janvier 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-321046.pdf"
},
{
"title": "Avis CERTFR-2018-AVI-543",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2018-AVI-543/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-306710 du 08 janvier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-944083 du 13 novembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-944083.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-724606 du 20 d\u00e9cembre 2012",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-724606.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-253230 du 08 f\u00e9vrier 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-346262 du 23 novembre 2017",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-346262.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-179516 du 07 ao\u00fbt 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf"
},
{
"title": "Avis CERTFR-2015-AVI-364",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2015-AVI-364/"
},
{
"title": "Avis CERTFR-2017-AVI-140",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2017-AVI-140/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-584286 du 13 novembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-584286.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-874235 du 26 juin 2017",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-234763 du 17 juillet 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-742938 du 04 d\u00e9cembre 2013",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-742938.pdf"
},
{
"title": "Avis CERTFR-2017-AVI-428",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2017-AVI-428/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-377318 du 12 f\u00e9vrier 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-892012 du 24 avril 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892012.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-087240 du 30 ao\u00fbt 2017",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-087240.pdf"
},
{
"title": "Avis CERTFR-2019-AVI-004",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2019-AVI-004/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-850708 du 11 septembre 2013",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-850708.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-110922 du 27 mars 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-507847 du 09 octobre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-507847.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-113131 du 13 novembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-113131.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-176087 du 01 octobre 2013",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-176087.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-763427 du 27 novembre 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-763427.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-623229 du 08 avril 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-623229.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-592007 du 20 mars 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-592007.pdf"
},
{
"title": "Avis CERTFR-2016-AVI-196",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2016-AVI-196/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-233109 du 13 novembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-233109.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-954136 du 02 f\u00e9vrier 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-954136.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-672373 du 18 novembre 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-672373.pdf"
},
{
"title": "Avis CERTFR-2014-AVI-126",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2014-AVI-126/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-487246 du 08 avril 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-487246.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-542701 du 14 mai 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-542701.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-347726 du 09 octobre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-347726.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-254686 du 09 octobre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-279823 du 08 octobre 2012",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-279823.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-982399 du 11 d\u00e9cembre 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-982399.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-456423 du 12 mars 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-456423.pdf"
},
{
"title": "Avis CERTFR-2016-AVI-062",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2016-AVI-062/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-635659 du 15 avril 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-130874 du 05 avril 2012",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-130874.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-141614 du 09 avril 2019",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-141614.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-597212 du 21 janvier 2015",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-597212.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-654382 du 20 mars 2014",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-654382.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-833048 du 14 mars 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-833048.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-625789 du 10 juin 2011",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-625789.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-731239 du 09 d\u00e9cembre 2016",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-731239.pdf"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-470231 du 22 f\u00e9vrier 2018",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-470231.pdf"
}
],
"reference": "CERTFR-2020-AVI-077",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-02-11T00:00:00.000000"
},
{
"description": "int\u00e9gration des 58 avis",
"revision_date": "2020-02-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "\u003cstrong\u003eCet avis concerne une mise \u00e0 jour en date du 10 f\u00e9vrier 2020 de 58\navis Siemens (cf. section documentation). Les avis Siemens listent\nd\u00e9sormais les variantes SIPLUS parmi les syst\u00e8mes affect\u00e9s.\u003c/strong\u003e\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens de variante SIPLUS. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens de variante SIPLUS",
"vendor_advisories": []
}
ICSA-19-043-04
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting this vulnerability to CISA."
},
{
"organization": "China Industrial Control Systems Cyber Emergency Response Team (CIC)",
"summary": "for coordinating disclosure"
},
{
"names": [
"Artem Zinenko"
],
"organization": "Kaspersky",
"summary": "for pointing out that SIPLUS should also be mentioned"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.",
"title": "General Recommendations"
},
{
"category": "general",
"text": "Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from a Siemens ProductCERT\u0027s advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-306710: Denial-of-Service Vulnerability in SIMATIC S7-300 CPU Family - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-306710.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-043-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-043-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-043-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-043-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SIMATIC S7-300 CPU",
"tracking": {
"current_release_date": "2020-02-10T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-19-043-04",
"initial_release_date": "2019-01-08T00:00:00.000000Z",
"revision_history": [
{
"date": "2019-01-08T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2020-02-10T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "SIPLUS devices now explicitly mentioned in the list of affected products"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.X.16",
"product": {
"name": "Siemens SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants): All versions \u003c V3.X.16",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-16561",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends operating the devices only within trusted networks",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.X.16 or any later version https://support.industry.siemens.com/cs/ww/en/ps/13752/dl",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2018-16561"
}
]
}
icsa-19-043-04
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting this vulnerability to CISA."
},
{
"organization": "China Industrial Control Systems Cyber Emergency Response Team (CIC)",
"summary": "for coordinating disclosure"
},
{
"names": [
"Artem Zinenko"
],
"organization": "Kaspersky",
"summary": "for pointing out that SIPLUS should also be mentioned"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.",
"title": "General Recommendations"
},
{
"category": "general",
"text": "Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from a Siemens ProductCERT\u0027s advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-306710: Denial-of-Service Vulnerability in SIMATIC S7-300 CPU Family - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-306710.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-043-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-043-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-19-043-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-043-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SIMATIC S7-300 CPU",
"tracking": {
"current_release_date": "2020-02-10T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-19-043-04",
"initial_release_date": "2019-01-08T00:00:00.000000Z",
"revision_history": [
{
"date": "2019-01-08T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2020-02-10T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "SIPLUS devices now explicitly mentioned in the list of affected products"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.X.16",
"product": {
"name": "Siemens SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants): All versions \u003c V3.X.16",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-16561",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Siemens recommends operating the devices only within trusted networks",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to V3.X.16 or any later version https://support.industry.siemens.com/cs/ww/en/ps/13752/dl",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2018-16561"
}
]
}
gsd-2018-16561
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2018-16561",
"description": "A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions \u003c V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.",
"id": "GSD-2018-16561"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-16561"
],
"details": "A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions \u003c V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.",
"id": "GSD-2018-16561",
"modified": "2023-12-13T01:22:26.585859Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2018-16561",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SIMATIC S7-300 CPUs",
"version": {
"version_data": [
{
"version_value": "All versions \u003c V3.X.16"
}
]
}
}
]
},
"vendor_name": "Siemens"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions \u003c V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Input Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf",
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_s7-300_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_s7-300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_s7-300f_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_s7-300f:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_s7-300fs_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_s7-300fs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:simatic_s7-300t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:simatic_s7-300t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "productcert@siemens.com",
"ID": "CVE-2018-16561"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions \u003c V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2019-10-03T00:03Z",
"publishedDate": "2019-04-17T14:29Z"
}
}
}
ghsa-w9hm-m2x5-5x42
Vulnerability from github
A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions < V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.
{
"affected": [],
"aliases": [
"CVE-2018-16561"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-04-17T14:29:00Z",
"severity": "HIGH"
},
"details": "A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions \u003c V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.",
"id": "GHSA-w9hm-m2x5-5x42",
"modified": "2022-05-13T01:50:22Z",
"published": "2022-05-13T01:50:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16561"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
fkie_cve-2018-16561
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| siemens | simatic_s7-300_firmware | - | |
| siemens | simatic_s7-300 | - | |
| siemens | simatic_s7-300f_firmware | - | |
| siemens | simatic_s7-300f | - | |
| siemens | simatic_s7-300fs_firmware | - | |
| siemens | simatic_s7-300fs | - | |
| siemens | simatic_s7-300t_firmware | - | |
| siemens | simatic_s7-300t | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_s7-300_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C096137-C1E3-4D19-87A9-BEB7A081DD1E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_s7-300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EFD4E99-5C66-443F-8B6F-FA01C895DE78",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_s7-300f_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4251D0-0A74-4A47-9510-A92843D927F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_s7-300f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7A17613-A0E1-4CC9-AC56-6AA2C8418275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_s7-300fs_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FD4F0A-D270-4B72-BEAC-5362B0CCFC23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_s7-300fs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9CC39A6-BA9F-487C-9504-5658A2AE0188",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_s7-300t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C311B40-8D03-451B-B5D3-0BB278930743",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_s7-300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC45A7F6-19C9-4485-8A4C-8C14819B095E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions \u003c V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en las CPUs SIMATIC S7-300 (todas las versiones anteriores a la V3.X.16). Las CPU afectadas comprueban incorrectamente los paquetes de comunicaci\u00f3n S7 que podr\u00edan causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) de la CPU. La CPU permanecer\u00e1 en modo DEFECT hasta el reinicio manual. La explotaci\u00f3n con \u00e9xito requiere que un atacante pueda enviar un paquete de comunicaci\u00f3n S7 especialmente creado a una interfaz de comunicaci\u00f3n de la CPU. Esto incluye Ethernet, PROFIBUS y Multi Point Interfaces (MPI). No se requieren interacci\u00f3n ni privilegios del usuario para explotar la vulnerabilidad de seguridad. La vulnerabilidad podr\u00eda causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) de la funcionalidad principal de la CPU, comprometiendo la disponibilidad del sistema. En el momento de la publicaci\u00f3n de asesoramiento, no se conoc\u00eda la explotaci\u00f3n p\u00fablica de esta vulnerabilidad de seguridad. Siemens confirma la vulnerabilidad de seguridad y proporciona mitigaciones para resolver el problema de seguridad."
}
],
"id": "CVE-2018-16561",
"lastModified": "2024-11-21T03:52:59.010",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-04-17T14:29:03.370",
"references": [
{
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf"
}
],
"sourceIdentifier": "productcert@siemens.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
cnvd-2019-00986
Vulnerability from cnvd
用户可参考如下供应商提供的安全公告获得补丁信息: https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf
| Name | SIEMENS SIMATIC S7-300 CPU <V3.X.16 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-16561"
}
},
"description": "Siemens SIMATIC S7-300 CPU\u662f\u897f\u95e8\u5b50\uff08Siemens\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u7528\u4e8e\u5236\u9020\u884c\u4e1a\u7684\u6a21\u5757\u5316\u901a\u7528\u63a7\u5236\u5668\u3002 \n\nSiemens SIMATIC S7-300 CPU\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u53d7\u5f71\u54cd\u7684CPU\u672a\u80fd\u6b63\u786e\u5730\u9a8c\u8bc1S7\u901a\u4fe1\u5305\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4CPU\u7684\u62d2\u7edd\u670d\u52a1\u72b6\u6001\u3002",
"discovererName": "ETIRI",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-00986",
"openTime": "2019-01-10",
"patchDescription": "Siemens SIMATIC S7-300 CPU\u662f\u897f\u95e8\u5b50\uff08Siemens\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u7528\u4e8e\u5236\u9020\u884c\u4e1a\u7684\u6a21\u5757\u5316\u901a\u7528\u63a7\u5236\u5668\u3002 \r\n\r\nSiemens SIMATIC S7-300 CPU\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u662f\u7531\u4e8e\u53d7\u5f71\u54cd\u7684CPU\u672a\u80fd\u6b63\u786e\u5730\u9a8c\u8bc1S7\u901a\u4fe1\u5305\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4CPU\u7684\u62d2\u7edd\u670d\u52a1\u72b6\u6001\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Siemens SIMATIC S7-300 CPU\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2019-00986\uff09\u7684\u8865\u4e01",
"products": {
"product": "SIEMENS SIMATIC S7-300 CPU \u003cV3.X.16"
},
"referenceLink": "https://cert-portal.siemens.com/productcert/pdf/ssa-306710.pdf",
"serverity": "\u9ad8",
"submitTime": "2019-01-10",
"title": "Siemens SIMATIC S7-300 CPU\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2019-00986\uff09"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.