Lucene search

K
nvd[email protected]NVD:CVE-2018-16557
HistoryDec 13, 2018 - 4:29 p.m.

CVE-2018-16557

2018-12-1316:29:00
CWE-347
web.nvd.nist.gov
3

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

42.5%

A vulnerability has been identified in SIMATIC S7-400 CPU 412-1 DP V7 (All versions), SIMATIC S7-400 CPU 412-2 DP V7 (All versions), SIMATIC S7-400 CPU 414-2 DP V7 (All versions), SIMATIC S7-400 CPU 414-3 DP V7 (All versions), SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-2 DP V7 (All versions), SIMATIC S7-400 CPU 416-3 DP V7 (All versions), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-2 DP V7 (All versions), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 417-4 DP V7 (All versions), SIMATIC S7-400 CPU 412-2 PN V7 (All versions < V7.0.3), SIMATIC S7-400 H V4.5 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.9), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions < V8.2.1), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 V7 (All versions), SIPLUS S7-400 CPU 417-4 V7 (All versions). Sending of specially crafted packets to port 102/tcp via Ethernet interface
via PROFIBUS or Multi Point Interfaces (MPI) could cause a denial of service
condition on affected devices. Flashing with a firmware image may be required
to recover the CPU.

Successful exploitation requires an attacker to have network access to port
102/tcp via Ethernet interface or to be able to send messages via PROFIBUS or
Multi Point Interfaces (MPI) to the device. No user interaction is required.
If no access protection is configured, no privileges are required to exploit
the security vulnerability. The vulnerability could allow causing a
denial of service condition of the core functionality of the CPU,
compromising the availability of the system.

Affected configurations

Nvd
Node
siemenssimatic_s7-400_firmwareRangev6.0
AND
siemenssimatic_s7-400Match-
Node
siemenssimatic_s7-400_pn\/dp_v7_firmware
AND
siemenssimatic_s7-400_pn\/dp_v7Match-
Node
siemenssimatic_s7-400h_firmwareRangev4.5
AND
siemenssimatic_s7-400hMatch-
Node
siemenssimatic_s7-410_firmwareRange<8.2.1
AND
siemenssimatic_s7-410Match-
Node
siemenssimatic_s7-400h_firmwareRange6.0.06.0.9
AND
siemenssimatic_s7-400hMatch-
VendorProductVersionCPE
siemenssimatic_s7-400_firmware*cpe:2.3:o:siemens:simatic_s7-400_firmware:*:*:*:*:*:*:*:*
siemenssimatic_s7-400-cpe:2.3:h:siemens:simatic_s7-400:-:*:*:*:*:*:*:*
siemenssimatic_s7-400_pn\/dp_v7_firmware*cpe:2.3:o:siemens:simatic_s7-400_pn\/dp_v7_firmware:*:*:*:*:*:*:*:*
siemenssimatic_s7-400_pn\/dp_v7-cpe:2.3:h:siemens:simatic_s7-400_pn\/dp_v7:-:*:*:*:*:*:*:*
siemenssimatic_s7-400h_firmware*cpe:2.3:o:siemens:simatic_s7-400h_firmware:*:*:*:*:*:*:*:*
siemenssimatic_s7-400h-cpe:2.3:h:siemens:simatic_s7-400h:-:*:*:*:*:*:*:*
siemenssimatic_s7-410_firmware*cpe:2.3:o:siemens:simatic_s7-410_firmware:*:*:*:*:*:*:*:*
siemenssimatic_s7-410-cpe:2.3:h:siemens:simatic_s7-410:-:*:*:*:*:*:*:*

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

42.5%

Related for NVD:CVE-2018-16557