Resource exhaustion in 7KM PAC Switched Ethernet - CVE-2017-9945
Published: September 1, 2017 / Updated: September 1, 2017
Vulnerability identifier: #VU8067
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2017-9945
CWE-ID: CWE-400
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vendor: Siemens
Affected software:
7KM PAC Switched Ethernet
7KM PAC Switched Ethernet
Detailed vulnerability description
The vulnerability allows an adajacent attacker to cause DoS condition on the target system.
The weakness exists in the Siemens 7KM PAC Switched Ethernet PROFINET expansion module due to input validation flaw. An adjacent attacker can send a specially crafted PROFINET DCP packet as a local Ethernet (Layer 2) broadcast, cause memory exhaustion and cause the application to restart.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists in the Siemens 7KM PAC Switched Ethernet PROFINET expansion module due to input validation flaw. An adjacent attacker can send a specially crafted PROFINET DCP packet as a local Ethernet (Layer 2) broadcast, cause memory exhaustion and cause the application to restart.
Successful exploitation of the vulnerability results in denial of service.
How to mitigate CVE-2017-9945
Update to version 2.1.3.