Input validation error in Siemens products - CVE-2018-16563
Published: February 18, 2019
Vulnerability identifier: #VU17740
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-16563
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Siemens
Affected software:
SIPROTEC 5
EN100 Ethernet module IEC 104 variant
EN100 Ethernet module DNP3 TCP variant
EN100 Ethernet module Modbus TCP variant
EN100 Ethernet module PROFINET IO variant
EN100 Ethernet module IEC 61850 variant
SIPROTEC 5
EN100 Ethernet module IEC 104 variant
EN100 Ethernet module DNP3 TCP variant
EN100 Ethernet module Modbus TCP variant
EN100 Ethernet module PROFINET IO variant
EN100 Ethernet module IEC 61850 variant
Detailed vulnerability description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can supply specially crafted packets to Port 102/TCP and cause the service to crash.
How to mitigate CVE-2018-16563
Install updates from vendor's website.