ID

VAR-201310-0348


CVE

CVE-2013-5741


TITLE

Nano-10 PLC Remote Denial of Service Vulnerability

Trust: 0.8

sources: IVD: 87eac04c-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13985

DESCRIPTION

Triangle Research International (aka Tri) Nano-10 PLC devices with firmware r81 and earlier do not properly handle large length values in MODBUS data, which allows remote attackers to cause a denial of service (transition to the interrupt state) via a crafted packet to TCP port 502. The Nano-10 PLC has an input verification vulnerability that allows an attacker to use the vulnerability to send a special message to the Nano-10 PLC for a denial of service attack, which can cause the device to run in an undefined interrupt state and need to be restarted to restore normal functionality. The Triangle Research Nano-10 PLC is a controller for automated manufacturing. This vulnerability can be triggered when the firmware is processing a special length (over 0x200) MODBUS TCP message on TCP port 502. Nano-10 PLC is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause the affected device to crash, denying service to legitimate users. Nano-10 PLC running firmware r81 and prior are vulnerable. This product is usually used in automatic production equipment such as packaging machines, batching machines, etc

Trust: 3.42

sources: NVD: CVE-2013-5741 // JVNDB: JVNDB-2013-004934 // CNVD: CNVD-2013-13985 // CNVD: CNVD-2013-13485 // BID: 63272 // IVD: 87eac04c-2352-11e6-abef-000c29c66e3d // IVD: 53d04baa-1f07-11e6-abef-000c29c66e3d // VULHUB: VHN-65743

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.6

sources: IVD: 87eac04c-2352-11e6-abef-000c29c66e3d // IVD: 53d04baa-1f07-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13985 // CNVD: CNVD-2013-13485

AFFECTED PRODUCTS

vendor:triplcmodel:nano-10 plcscope:eqversion:r80

Trust: 1.6

vendor:triplcmodel:nano-10 plcscope:lteversion:r81

Trust: 1.0

vendor:triplcmodel:nano-10 plcscope:eqversion: -

Trust: 1.0

vendor:trianglemodel:research international inc nano-10 plc r81scope:ltversion: -

Trust: 0.8

vendor:triangle researchmodel:nano-10 plcscope: - version: -

Trust: 0.8

vendor:triangle researchmodel:nano-10 plcscope:lteversion:r81

Trust: 0.8

vendor:trianglemodel:research international inc nano-10 plcscope: - version: -

Trust: 0.6

vendor:triplcmodel:nano-10 plcscope:eqversion:r81

Trust: 0.6

vendor:nano 10 plcmodel:r80scope: - version: -

Trust: 0.2

vendor:nano 10 plcmodel:r81scope: - version: -

Trust: 0.2

vendor:nano 10 plcmodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: 87eac04c-2352-11e6-abef-000c29c66e3d // IVD: 53d04baa-1f07-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13985 // CNVD: CNVD-2013-13485 // JVNDB: JVNDB-2013-004934 // CNNVD: CNNVD-201310-561 // NVD: CVE-2013-5741

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-5741
value: HIGH

Trust: 1.0

NVD: CVE-2013-5741
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-13985
value: HIGH

Trust: 0.6

CNVD: CNVD-2013-13485
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201310-561
value: HIGH

Trust: 0.6

IVD: 87eac04c-2352-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

IVD: 53d04baa-1f07-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-65743
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-5741
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-13985
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2013-13485
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 87eac04c-2352-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 53d04baa-1f07-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-65743
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 87eac04c-2352-11e6-abef-000c29c66e3d // IVD: 53d04baa-1f07-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13985 // CNVD: CNVD-2013-13485 // VULHUB: VHN-65743 // JVNDB: JVNDB-2013-004934 // CNNVD: CNNVD-201310-561 // NVD: CVE-2013-5741

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-65743 // JVNDB: JVNDB-2013-004934 // NVD: CVE-2013-5741

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201310-561

TYPE

Input validation

Trust: 0.8

sources: IVD: 87eac04c-2352-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201310-561

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-004934

PATCH

title:Nano-10url:http://www.tri-plc.com/nano10.htm

Trust: 0.8

sources: JVNDB: JVNDB-2013-004934

EXTERNAL IDS

db:NVDid:CVE-2013-5741

Trust: 3.6

db:OSVDBid:97728

Trust: 1.7

db:BIDid:63272

Trust: 1.6

db:CNNVDid:CNNVD-201310-561

Trust: 0.9

db:CNVDid:CNVD-2013-13985

Trust: 0.8

db:CNVDid:CNVD-2013-13485

Trust: 0.8

db:ICS CERTid:ICSA-13-329-01

Trust: 0.8

db:JVNDBid:JVNDB-2013-004934

Trust: 0.8

db:IVDid:87EAC04C-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:53D04BAA-1F07-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:VULHUBid:VHN-65743

Trust: 0.1

sources: IVD: 87eac04c-2352-11e6-abef-000c29c66e3d // IVD: 53d04baa-1f07-11e6-abef-000c29c66e3d // CNVD: CNVD-2013-13985 // CNVD: CNVD-2013-13485 // VULHUB: VHN-65743 // BID: 63272 // JVNDB: JVNDB-2013-004934 // CNNVD: CNNVD-201310-561 // NVD: CVE-2013-5741

REFERENCES

url:http://blogs.ixiacom.com/ixia-blog/hack-scada-zero-day-vulnerability-discovery-on-the-nano-10-plc/

Trust: 2.5

url:http://osvdb.org/ref/97/tri-nano10.txt

Trust: 2.3

url:http://www.osvdb.org/97728

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5741

Trust: 0.8

url:http://ics-cert.us-cert.gov/advisories/icsa-13-329-01

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5741

Trust: 0.8

url:http://blogs.ixiacom.com/ixia-blog/hack-scada-zero-day-vulnerability-discovery-on-the-nano-10-plc

Trust: 0.6

url:http://www.securityfocus.com/bid/63272

Trust: 0.6

sources: CNVD: CNVD-2013-13985 // CNVD: CNVD-2013-13485 // VULHUB: VHN-65743 // JVNDB: JVNDB-2013-004934 // CNNVD: CNNVD-201310-561 // NVD: CVE-2013-5741

CREDITS

Wei Gao of Ixia.

Trust: 0.9

sources: BID: 63272 // CNNVD: CNNVD-201310-561

SOURCES

db:IVDid:87eac04c-2352-11e6-abef-000c29c66e3d
db:IVDid:53d04baa-1f07-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2013-13985
db:CNVDid:CNVD-2013-13485
db:VULHUBid:VHN-65743
db:BIDid:63272
db:JVNDBid:JVNDB-2013-004934
db:CNNVDid:CNNVD-201310-561
db:NVDid:CVE-2013-5741

LAST UPDATE DATE

2025-04-11T22:59:04.783000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-13985date:2013-10-24T00:00:00
db:CNVDid:CNVD-2013-13485date:2013-10-09T00:00:00
db:VULHUBid:VHN-65743date:2013-10-29T00:00:00
db:BIDid:63272date:2013-11-27T00:14:00
db:JVNDBid:JVNDB-2013-004934date:2013-11-26T00:00:00
db:CNNVDid:CNNVD-201310-561date:2013-10-30T00:00:00
db:NVDid:CVE-2013-5741date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:87eac04c-2352-11e6-abef-000c29c66e3ddate:2013-10-24T00:00:00
db:IVDid:53d04baa-1f07-11e6-abef-000c29c66e3ddate:2013-10-09T00:00:00
db:CNVDid:CNVD-2013-13985date:2013-10-24T00:00:00
db:CNVDid:CNVD-2013-13485date:2013-10-09T00:00:00
db:VULHUBid:VHN-65743date:2013-10-29T00:00:00
db:BIDid:63272date:2013-10-22T00:00:00
db:JVNDBid:JVNDB-2013-004934date:2013-10-30T00:00:00
db:CNNVDid:CNNVD-201310-561date:2013-10-24T00:00:00
db:NVDid:CVE-2013-5741date:2013-10-29T03:42:33.603