ID

VAR-201610-0039


CVE

CVE-2016-8564


TITLE

Siemens Automation License Manager In SQL Injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-005415

DESCRIPTION

SQL injection vulnerability in Siemens Automation License Manager (ALM) before 5.3 SP3 Update 1 allows remote attackers to execute arbitrary SQL commands via crafted traffic to TCP port 4410. Siemens Automation License Manager (ALM) is a software that centrally manages license keys for various Siemens software products. A remote attacker could use the vulnerability to access the 4410 / TCP port to read and write ALM configuration information, posing a sensitive information leak. An SQL-injection vulnerability 2. A directory-traversal vulnerability 3. A denial-of-service vulnerability An attacker may leverage these issues to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, and create, delete or move arbitrary files from the system, or cause denial-of-service condition

Trust: 2.52

sources: NVD: CVE-2016-8564 // JVNDB: JVNDB-2016-005415 // CNVD: CNVD-2016-08771 // BID: 93553 // VULHUB: VHN-97384

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-08771

AFFECTED PRODUCTS

vendor:siemensmodel:automation license managerscope:lteversion:5.3

Trust: 1.0

vendor:siemensmodel:automation license managerscope:eqversion:5.3

Trust: 0.9

vendor:siemensmodel:automation license managerscope:ltversion:5.3 sp3 update 1

Trust: 0.8

vendor:siemensmodel:automation license manager sp3 updatescope:ltversion:v5.31

Trust: 0.6

vendor:siemensmodel:automation license managerscope:eqversion:5.2

Trust: 0.3

vendor:siemensmodel:automation license manager sp1scope:eqversion:5.1

Trust: 0.3

vendor:siemensmodel:automation license managerscope:eqversion:5.1

Trust: 0.3

vendor:siemensmodel:automation license managerscope:eqversion:5.0

Trust: 0.3

vendor:siemensmodel:automation license managerscope:eqversion:4.0

Trust: 0.3

vendor:siemensmodel:automation license manager sp3 updatescope:neversion:5.31

Trust: 0.3

sources: CNVD: CNVD-2016-08771 // BID: 93553 // JVNDB: JVNDB-2016-005415 // CNNVD: CNNVD-201610-422 // NVD: CVE-2016-8564

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-8564
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-8564
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-08771
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201610-422
value: MEDIUM

Trust: 0.6

VULHUB: VHN-97384
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-8564
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-08771
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-97384
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-8564
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.5
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-08771 // VULHUB: VHN-97384 // JVNDB: JVNDB-2016-005415 // CNNVD: CNNVD-201610-422 // NVD: CVE-2016-8564

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.9

sources: VULHUB: VHN-97384 // JVNDB: JVNDB-2016-005415 // NVD: CVE-2016-8564

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-422

TYPE

SQL injection

Trust: 0.6

sources: CNNVD: CNNVD-201610-422

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005415

PATCH

title:SSA-284342url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-284342.pdf

Trust: 0.8

title:Patch for Siemens Automation License Manager has SQL injection vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/82280

Trust: 0.6

title:Siemens Automation License Manager SQL Repair measures for injecting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64798

Trust: 0.6

sources: CNVD: CNVD-2016-08771 // JVNDB: JVNDB-2016-005415 // CNNVD: CNNVD-201610-422

EXTERNAL IDS

db:NVDid:CVE-2016-8564

Trust: 3.4

db:SIEMENSid:SSA-284342

Trust: 2.3

db:ICS CERTid:ICSA-16-287-02

Trust: 2.2

db:BIDid:93553

Trust: 1.4

db:SECTRACKid:1037011

Trust: 1.1

db:JVNDBid:JVNDB-2016-005415

Trust: 0.8

db:CNNVDid:CNNVD-201610-422

Trust: 0.7

db:CNVDid:CNVD-2016-08771

Trust: 0.6

db:VULHUBid:VHN-97384

Trust: 0.1

sources: CNVD: CNVD-2016-08771 // VULHUB: VHN-97384 // BID: 93553 // JVNDB: JVNDB-2016-005415 // CNNVD: CNNVD-201610-422 // NVD: CVE-2016-8564

REFERENCES

url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-284342.pdf

Trust: 2.3

url:https://ics-cert.us-cert.gov/advisories/icsa-16-287-02

Trust: 2.2

url:http://www.securityfocus.com/bid/93553

Trust: 1.1

url:http://www.securitytracker.com/id/1037011

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8564

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8564

Trust: 0.8

url:https://support.industry.siemens.com/cs/document/114358/automation-license-manager-(alm)-authorsw-and-authors-handling-programs-and-authorizing-and-licensing-simatic-industry-software?dti=0&lc=en-ww

Trust: 0.3

sources: CNVD: CNVD-2016-08771 // VULHUB: VHN-97384 // BID: 93553 // JVNDB: JVNDB-2016-005415 // CNNVD: CNNVD-201610-422 // NVD: CVE-2016-8564

CREDITS

Sergey Temnikov and Vladimir Dashchenko from Critical Infrastructure Defence Team, Kaspersky Lab.

Trust: 0.3

sources: BID: 93553

SOURCES

db:CNVDid:CNVD-2016-08771
db:VULHUBid:VHN-97384
db:BIDid:93553
db:JVNDBid:JVNDB-2016-005415
db:CNNVDid:CNNVD-201610-422
db:NVDid:CVE-2016-8564

LAST UPDATE DATE

2025-04-13T23:36:20.356000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-08771date:2016-10-13T00:00:00
db:VULHUBid:VHN-97384date:2017-07-29T00:00:00
db:BIDid:93553date:2016-10-26T05:07:00
db:JVNDBid:JVNDB-2016-005415date:2016-10-20T00:00:00
db:CNNVDid:CNNVD-201610-422date:2016-10-14T00:00:00
db:NVDid:CVE-2016-8564date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-08771date:2016-10-13T00:00:00
db:VULHUBid:VHN-97384date:2016-10-13T00:00:00
db:BIDid:93553date:2016-10-13T00:00:00
db:JVNDBid:JVNDB-2016-005415date:2016-10-20T00:00:00
db:CNNVDid:CNNVD-201610-422date:2016-10-14T00:00:00
db:NVDid:CVE-2016-8564date:2016-10-13T10:59:04.253