Denial of service in Siemens SIMATIC PCS 7, SIMATIC WinCC, and SIMATIC NET PC



Published: 2020-02-12
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-19282
CWE-ID CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
OpenPCS
Server applications / SCADA systems

SIMATIC BATCH
Server applications / SCADA systems

SIMATIC NET PC Software
Server applications / SCADA systems

SIMATIC PCS 7
Server applications / SCADA systems

SIMATIC Route Control
Server applications / SCADA systems

SIMATIC WinCC (TIA Portal)
Server applications / SCADA systems

Siemens SIMATIC WinCC
Server applications / SCADA systems

Vendor Siemens

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Buffer overflow

EUVDB-ID: #VU25259

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2019-19282

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing messages. A remote attacker can send a specially crafted messages, trigger memory corruption and cause a denial of service condition on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

OpenPCS: 8.1 - 9.0

SIMATIC BATCH: 8.1 - 9.0

SIMATIC NET PC Software: All versions

SIMATIC PCS 7: 8.1 - 9.0

SIMATIC Route Control: 8.1 - 9.0

SIMATIC WinCC (TIA Portal): 13.0 - 16.0

Siemens SIMATIC WinCC: 7.3 - 7.5

Fixed software versions

CPE2.3 External links

http://ics-cert.us-cert.gov/advisories/icsa-20-042-06


Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###