ID

VAR-201304-0149


CVE

CVE-2013-0659


TITLE

Siemens CP 1604 and CP 1616 Vulnerability to execute arbitrary code in interface card

Trust: 0.8

sources: JVNDB: JVNDB-2013-002108

DESCRIPTION

The debugging feature on the Siemens CP 1604 and CP 1616 interface cards with firmware before 2.5.2 allows remote attackers to execute arbitrary code via a crafted packet to UDP port 17185. The Siemens CP 1616 and 1604 are Industrial Ethernet communication cards for connecting desktop workstations and PCI-104 systems to the PROFINET interface. Siemens CP 1616 and CP 1604 modules are prone to a security-bypass vulnerability. Attackers can exploit this issue to execute arbitrary code, obtain sensitive information, or cause denial-of-service conditions; this may aid in launching further attacks

Trust: 2.79

sources: NVD: CVE-2013-0659 // JVNDB: JVNDB-2013-002108 // CNVD: CNVD-2013-02264 // BID: 58696 // IVD: 04daf1bc-2353-11e6-abef-000c29c66e3d // VULHUB: VHN-60661 // VULMON: CVE-2013-0659

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 04daf1bc-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02264

AFFECTED PRODUCTS

vendor:siemensmodel:cp 1604scope:eqversion: -

Trust: 1.6

vendor:siemensmodel:cp 1616scope:eqversion: -

Trust: 1.6

vendor:siemensmodel:cp 1604scope:lteversion:2.5.1

Trust: 1.0

vendor:siemensmodel:cp 1616scope:lteversion:2.5.1

Trust: 1.0

vendor:siemensmodel:cp 1604scope: - version: -

Trust: 0.8

vendor:siemensmodel:cp 1604scope:ltversion:2.5.2

Trust: 0.8

vendor:siemensmodel:cp 1616scope: - version: -

Trust: 0.8

vendor:siemensmodel:cp 1616scope:ltversion:2.5.2

Trust: 0.8

vendor:siemensmodel:cp and cp c onboard card of simantic ipcsscope:eqversion:16161604<2.5.2

Trust: 0.6

vendor:siemensmodel:cp and cp c microbox packagescope:eqversion:16161604<2.5.2

Trust: 0.6

vendor:siemensmodel:cp 1616scope:eqversion:2.5.1

Trust: 0.6

vendor:siemensmodel:cp 1604scope:eqversion:2.5.1

Trust: 0.6

vendor:siemensmodel:cp 6gk1 161-6aa02scope:eqversion:1616

Trust: 0.3

vendor:siemensmodel:cp 6gk1 161-6aa01scope:eqversion:1616

Trust: 0.3

vendor:siemensmodel:cp 6gk1 161-6aa00scope:eqversion:1616

Trust: 0.3

vendor:siemensmodel:cp 6gk1 160-4au01scope:eqversion:1616

Trust: 0.3

vendor:siemensmodel:cp 6gk1 160-4au00scope:eqversion:1604

Trust: 0.3

vendor:siemensmodel:cp 6gk1 160-4aa01scope:eqversion:1604

Trust: 0.3

vendor:siemensmodel:cp 6gk1 160-4aa00scope:eqversion:1604

Trust: 0.3

vendor:cp 1604model: - scope:eqversion:*

Trust: 0.2

vendor:cp 1616model: - scope:eqversion:*

Trust: 0.2

vendor:cp 1604model: - scope:eqversion: -

Trust: 0.2

vendor:cp 1616model: - scope:eqversion: -

Trust: 0.2

sources: IVD: 04daf1bc-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02264 // BID: 58696 // JVNDB: JVNDB-2013-002108 // CNNVD: CNNVD-201303-541 // NVD: CVE-2013-0659

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-0659
value: HIGH

Trust: 1.0

NVD: CVE-2013-0659
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-02264
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201303-541
value: CRITICAL

Trust: 0.6

IVD: 04daf1bc-2353-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

VULHUB: VHN-60661
value: HIGH

Trust: 0.1

VULMON: CVE-2013-0659
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-0659
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2013-02264
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 04daf1bc-2353-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-60661
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 04daf1bc-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02264 // VULHUB: VHN-60661 // VULMON: CVE-2013-0659 // JVNDB: JVNDB-2013-002108 // CNNVD: CNNVD-201303-541 // NVD: CVE-2013-0659

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2013-0659

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201303-541

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201303-541

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002108

PATCH

title:Top Pageurl:http://www.siemens.com/entry/cc/en/

Trust: 0.8

title:SSA-628113: Open Debugging Port in CP 1616 and CP 1604url:http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-628113.pdf

Trust: 0.8

title:シーメンスソリューションパートナーurl:http://www.automation.siemens.com/automation/jp/ja/solutionpartner/pages/default.aspx

Trust: 0.8

title:シーメンス・ジャパン株式会社url:http://www.siemens.com/answers/jp/ja/

Trust: 0.8

title:Siemens CP 1616 and CP 1604 access patches for security bypass vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/33036

Trust: 0.6

title:DK16xx_V2p5p2url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45683

Trust: 0.6

title:CD_V2p5p2url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=45682

Trust: 0.6

sources: CNVD: CNVD-2013-02264 // JVNDB: JVNDB-2013-002108 // CNNVD: CNNVD-201303-541

EXTERNAL IDS

db:NVDid:CVE-2013-0659

Trust: 3.7

db:ICS CERTid:ICSA-13-084-01

Trust: 3.5

db:SIEMENSid:SSA-628113

Trust: 2.1

db:BIDid:58696

Trust: 1.6

db:CNNVDid:CNNVD-201303-541

Trust: 0.9

db:CNVDid:CNVD-2013-02264

Trust: 0.8

db:JVNDBid:JVNDB-2013-002108

Trust: 0.8

db:IVDid:04DAF1BC-2353-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-60661

Trust: 0.1

db:VULMONid:CVE-2013-0659

Trust: 0.1

sources: IVD: 04daf1bc-2353-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-02264 // VULHUB: VHN-60661 // VULMON: CVE-2013-0659 // BID: 58696 // JVNDB: JVNDB-2013-002108 // CNNVD: CNNVD-201303-541 // NVD: CVE-2013-0659

REFERENCES

url:http://ics-cert.us-cert.gov/pdf/icsa-13-084-01.pdf

Trust: 3.5

url:http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-628113.pdf

Trust: 2.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0659

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0659

Trust: 0.8

url:http://www.securityfocus.com/bid/58696

Trust: 0.6

url:http://www.siemens.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2013-02264 // VULHUB: VHN-60661 // VULMON: CVE-2013-0659 // BID: 58696 // JVNDB: JVNDB-2013-002108 // CNNVD: CNNVD-201303-541 // NVD: CVE-2013-0659

CREDITS

Christopher Scheuring and J??rgen Bilberger from Daimler TSS GmbH

Trust: 0.6

sources: CNNVD: CNNVD-201303-541

SOURCES

db:IVDid:04daf1bc-2353-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-02264
db:VULHUBid:VHN-60661
db:VULMONid:CVE-2013-0659
db:BIDid:58696
db:JVNDBid:JVNDB-2013-002108
db:CNNVDid:CNNVD-201303-541
db:NVDid:CVE-2013-0659

LAST UPDATE DATE

2025-04-11T23:07:17.340000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-02264date:2013-05-28T00:00:00
db:VULHUBid:VHN-60661date:2013-04-01T00:00:00
db:VULMONid:CVE-2013-0659date:2013-04-01T00:00:00
db:BIDid:58696date:2013-03-25T00:00:00
db:JVNDBid:JVNDB-2013-002108date:2013-04-02T00:00:00
db:CNNVDid:CNNVD-201303-541date:2013-04-02T00:00:00
db:NVDid:CVE-2013-0659date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:04daf1bc-2353-11e6-abef-000c29c66e3ddate:2013-04-01T00:00:00
db:CNVDid:CNVD-2013-02264date:2013-03-28T00:00:00
db:VULHUBid:VHN-60661date:2013-04-01T00:00:00
db:VULMONid:CVE-2013-0659date:2013-04-01T00:00:00
db:BIDid:58696date:2013-03-25T00:00:00
db:JVNDBid:JVNDB-2013-002108date:2013-04-02T00:00:00
db:CNNVDid:CNNVD-201303-541date:2013-03-27T00:00:00
db:NVDid:CVE-2013-0659date:2013-04-01T16:55:10.147