Improper input validation in Siemens products - CVE-2018-11452

 

Improper input validation in Siemens products - CVE-2018-11452

Published: July 16, 2018


Vulnerability identifier: #VU13879
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2018-11452
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Siemens
Affected software:
SIPROTEC 5
EN100 Ethernet module IEC 104 variant
EN100 Ethernet module DNP3 TCP variant
EN100 Ethernet module Modbus TCP variant
EN100 Ethernet module PROFINET IO variant
EN100 Ethernet module IEC 61850 variant

Detailed vulnerability description

The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to an error when handling malicious input. A remote attacker can activate the IEC 61850-MMS communication, supply specially crafted packets to port 102/tcp and cause the service to crash if oscillographs are running.

How to mitigate CVE-2018-11452

Install update from vendor's website.

Sources