var-201707-1137
Vulnerability from variot
An Improper Authentication issue was discovered in Siemens SIMATIC CP 44x-1 RNA, all versions prior to 1.4.1. An unauthenticated remote attacker may be able to perform administrative actions on the Communication Process (CP) of the RNA series module, if network access to Port 102/TCP is available and the configuration file for the CP is stored on the RNA's CPU. The SiemensSIMATICCP44x-1RNA is a communications processor that integrates security functions such as firewall, VPN, security protocol, data encryption, etc., providing network connectivity and secure communication for the s7-1500 controller. An unauthorized operating vulnerability exists in the pre-1.4.1 version of the Siemens SIMATICCP44x-1RNA module. Siemens SIMATIC CP 44x-1 Redundant is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201707-1137",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "simatic cp 44x-1 redundant network access modules",
"scope": "lte",
"trust": 1.0,
"vendor": "siemens",
"version": "1.4.0"
},
{
"model": "simatic cp 44x-1 rna",
"scope": "eq",
"trust": 0.8,
"vendor": "siemens",
"version": "1.4.1"
},
{
"model": "simatic cp 44x-1 rna",
"scope": "lt",
"trust": 0.8,
"vendor": "siemens",
"version": "all versions"
},
{
"model": "simatic cp rna",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "44x-1\u003cv1.4.1"
},
{
"model": "simatic cp 44x-1 redundant network access modules",
"scope": "eq",
"trust": 0.6,
"vendor": "siemens",
"version": "1.4.0"
},
{
"model": "simatic cp rna",
"scope": "eq",
"trust": 0.3,
"vendor": "siemens",
"version": "44x-11.4"
},
{
"model": "simatic cp rna",
"scope": "ne",
"trust": 0.3,
"vendor": "siemens",
"version": "44x-11.4.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "simatic cp 44x 1 redundant network access modules",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "672426ea-158d-49e1-aaf0-f6cc1a05260b"
},
{
"db": "CNVD",
"id": "CNVD-2017-10562"
},
{
"db": "BID",
"id": "99234"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005583"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-629"
},
{
"db": "NVD",
"id": "CVE-2017-6868"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:siemens:simatic_cp_44x-1_redundant_network_access_modules",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005583"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported the issue.",
"sources": [
{
"db": "BID",
"id": "99234"
}
],
"trust": 0.3
},
"cve": "CVE-2017-6868",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2017-6868",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2017-10562",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "672426ea-158d-49e1-aaf0-f6cc1a05260b",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"id": "CVE-2017-6868",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-6868",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2017-6868",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-10562",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201703-629",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "672426ea-158d-49e1-aaf0-f6cc1a05260b",
"trust": 0.2,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "672426ea-158d-49e1-aaf0-f6cc1a05260b"
},
{
"db": "CNVD",
"id": "CNVD-2017-10562"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005583"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-629"
},
{
"db": "NVD",
"id": "CVE-2017-6868"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An Improper Authentication issue was discovered in Siemens SIMATIC CP 44x-1 RNA, all versions prior to 1.4.1. An unauthenticated remote attacker may be able to perform administrative actions on the Communication Process (CP) of the RNA series module, if network access to Port 102/TCP is available and the configuration file for the CP is stored on the RNA\u0027s CPU. The SiemensSIMATICCP44x-1RNA is a communications processor that integrates security functions such as firewall, VPN, security protocol, data encryption, etc., providing network connectivity and secure communication for the s7-1500 controller. An unauthorized operating vulnerability exists in the pre-1.4.1 version of the Siemens SIMATICCP44x-1RNA module. Siemens SIMATIC CP 44x-1 Redundant is prone to an authentication-bypass vulnerability. \nAn attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-6868"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005583"
},
{
"db": "CNVD",
"id": "CNVD-2017-10562"
},
{
"db": "BID",
"id": "99234"
},
{
"db": "IVD",
"id": "672426ea-158d-49e1-aaf0-f6cc1a05260b"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-6868",
"trust": 3.5
},
{
"db": "ICS CERT",
"id": "ICSA-17-173-01",
"trust": 2.7
},
{
"db": "SIEMENS",
"id": "SSA-126840",
"trust": 1.6
},
{
"db": "BID",
"id": "99234",
"trust": 1.3
},
{
"db": "SECTRACK",
"id": "1038788",
"trust": 1.0
},
{
"db": "CNVD",
"id": "CNVD-2017-10562",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201703-629",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005583",
"trust": 0.8
},
{
"db": "IVD",
"id": "672426EA-158D-49E1-AAF0-F6CC1A05260B",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "672426ea-158d-49e1-aaf0-f6cc1a05260b"
},
{
"db": "CNVD",
"id": "CNVD-2017-10562"
},
{
"db": "BID",
"id": "99234"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005583"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-629"
},
{
"db": "NVD",
"id": "CVE-2017-6868"
}
]
},
"id": "VAR-201707-1137",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "672426ea-158d-49e1-aaf0-f6cc1a05260b"
},
{
"db": "CNVD",
"id": "CNVD-2017-10562"
}
],
"trust": 1.6333333
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "672426ea-158d-49e1-aaf0-f6cc1a05260b"
},
{
"db": "CNVD",
"id": "CNVD-2017-10562"
}
]
},
"last_update_date": "2024-11-23T22:52:24.200000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SSA-126840",
"trust": 0.8,
"url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-126840.pdf"
},
{
"title": "SiemensSIMATICCP44x-1RNA Module Unauthorized Patch for Operational Vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/96042"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-10562"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005583"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005583"
},
{
"db": "NVD",
"id": "CVE-2017-6868"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.7,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-173-01"
},
{
"trust": 1.6,
"url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-126840.pdf"
},
{
"trust": 1.0,
"url": "http://www.securitytracker.com/id/1038788"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/bid/99234"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6868"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6868"
},
{
"trust": 0.3,
"url": "http://www.siemens.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-10562"
},
{
"db": "BID",
"id": "99234"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005583"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-629"
},
{
"db": "NVD",
"id": "CVE-2017-6868"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "672426ea-158d-49e1-aaf0-f6cc1a05260b"
},
{
"db": "CNVD",
"id": "CNVD-2017-10562"
},
{
"db": "BID",
"id": "99234"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005583"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-629"
},
{
"db": "NVD",
"id": "CVE-2017-6868"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-21T00:00:00",
"db": "IVD",
"id": "672426ea-158d-49e1-aaf0-f6cc1a05260b"
},
{
"date": "2017-06-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-10562"
},
{
"date": "2017-06-22T00:00:00",
"db": "BID",
"id": "99234"
},
{
"date": "2017-08-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005583"
},
{
"date": "2017-03-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201703-629"
},
{
"date": "2017-07-07T17:29:00.340000",
"db": "NVD",
"id": "CVE-2017-6868"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-10562"
},
{
"date": "2017-06-22T00:00:00",
"db": "BID",
"id": "99234"
},
{
"date": "2017-08-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005583"
},
{
"date": "2017-07-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201703-629"
},
{
"date": "2024-11-21T03:30:41.823000",
"db": "NVD",
"id": "CVE-2017-6868"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201703-629"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens SIMATIC CP 44x-1 RNA In RNA Series module CP Vulnerability to perform administrator operations on",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005583"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201703-629"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.