Improper input validation in Siemens products - CVE-2018-11452
Published: July 16, 2018
Vulnerability identifier: #VU13879
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2018-11452
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Siemens
Affected software:
SIPROTEC 5
EN100 Ethernet module IEC 104 variant
EN100 Ethernet module DNP3 TCP variant
EN100 Ethernet module Modbus TCP variant
EN100 Ethernet module PROFINET IO variant
EN100 Ethernet module IEC 61850 variant
SIPROTEC 5
EN100 Ethernet module IEC 104 variant
EN100 Ethernet module DNP3 TCP variant
EN100 Ethernet module Modbus TCP variant
EN100 Ethernet module PROFINET IO variant
EN100 Ethernet module IEC 61850 variant
Detailed vulnerability description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to an error when handling malicious input. A remote attacker can activate the IEC 61850-MMS communication, supply specially crafted packets to port 102/tcp and cause the service to crash if oscillographs are running.
How to mitigate CVE-2018-11452
Install update from vendor's website.