#VU15891 Improper input validation in Siemens Server applications


Published: 2018-11-13 | Updated: 2018-11-14

Vulnerability identifier: #VU15891

Vulnerability risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-16556

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SIMATIC S7-410
Hardware solutions / Firmware
SIMATIC S7-400
Hardware solutions / Firmware
SIMATIC S7-400 PN/DP V7
Server applications / SCADA systems
SIMATIC S7-400 H
Server applications / SCADA systems

Vendor: Siemens

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to an error when processing malicious input. A remote attacker can send specially crafted packets to Port 102/TCP via Ethernet interface, via PROFIBUS, or via multi-point interfaces (MPI) and cause the affected devices to go into defect mode.

Mitigation
Install update from vendor's website.

Vulnerable software versions

SIMATIC S7-410: All versions

SIMATIC S7-400 PN/DP V7: All versions

SIMATIC S7-400 H: All versions

SIMATIC S7-400: All versions


External links
http://ics-cert.us-cert.gov/advisories/ICSA-18-317-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability