ID

VAR-201610-0040


CVE

CVE-2016-8565


TITLE

Siemens Automation License Manager Vulnerabilities written to files

Trust: 0.8

sources: JVNDB: JVNDB-2016-005416

DESCRIPTION

Siemens Automation License Manager (ALM) before 5.3 SP3 allows remote attackers to write to files, rename files, create directories, or delete directories via crafted packets. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. An SQL-injection vulnerability 2. A directory-traversal vulnerability 3. A denial-of-service vulnerability An attacker may leverage these issues to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, and create, delete or move arbitrary files from the system, or cause denial-of-service condition

Trust: 2.61

sources: NVD: CVE-2016-8565 // JVNDB: JVNDB-2016-005416 // CNVD: CNVD-2016-08770 // BID: 93553 // VULHUB: VHN-97385 // VULMON: CVE-2016-8565

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-08770

AFFECTED PRODUCTS

vendor:siemensmodel:automation license managerscope:lteversion:5.3

Trust: 1.0

vendor:siemensmodel:automation license managerscope:eqversion:5.3

Trust: 0.9

vendor:siemensmodel:automation license managerscope:ltversion:5.3 sp3

Trust: 0.8

vendor:siemensmodel:automation license manager sp3scope:ltversion:5.3

Trust: 0.6

vendor:siemensmodel:automation license managerscope:eqversion:5.2

Trust: 0.3

vendor:siemensmodel:automation license manager sp1scope:eqversion:5.1

Trust: 0.3

vendor:siemensmodel:automation license managerscope:eqversion:5.1

Trust: 0.3

vendor:siemensmodel:automation license managerscope:eqversion:5.0

Trust: 0.3

vendor:siemensmodel:automation license managerscope:eqversion:4.0

Trust: 0.3

vendor:siemensmodel:automation license manager sp3 updatescope:neversion:5.31

Trust: 0.3

sources: CNVD: CNVD-2016-08770 // BID: 93553 // JVNDB: JVNDB-2016-005416 // CNNVD: CNNVD-201610-421 // NVD: CVE-2016-8565

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-8565
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-8565
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2016-08770
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201610-421
value: MEDIUM

Trust: 0.6

VULHUB: VHN-97385
value: MEDIUM

Trust: 0.1

VULMON: CVE-2016-8565
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-8565
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-08770
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-97385
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-8565
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-08770 // VULHUB: VHN-97385 // VULMON: CVE-2016-8565 // JVNDB: JVNDB-2016-005416 // CNNVD: CNNVD-201610-421 // NVD: CVE-2016-8565

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-97385 // JVNDB: JVNDB-2016-005416 // NVD: CVE-2016-8565

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-421

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201610-421

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-005416

PATCH

title:SSA-284342url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-284342.pdf

Trust: 0.8

title:Patch for File upload vulnerability in Siemens Automation License Managerurl:https://www.cnvd.org.cn/patchInfo/show/82291

Trust: 0.6

title:Siemens Automation License Manager Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64797

Trust: 0.6

sources: CNVD: CNVD-2016-08770 // JVNDB: JVNDB-2016-005416 // CNNVD: CNNVD-201610-421

EXTERNAL IDS

db:NVDid:CVE-2016-8565

Trust: 3.5

db:SIEMENSid:SSA-284342

Trust: 2.4

db:ICS CERTid:ICSA-16-287-02

Trust: 2.3

db:BIDid:93553

Trust: 1.5

db:SECTRACKid:1037011

Trust: 1.2

db:JVNDBid:JVNDB-2016-005416

Trust: 0.8

db:CNNVDid:CNNVD-201610-421

Trust: 0.7

db:CNVDid:CNVD-2016-08770

Trust: 0.6

db:VULHUBid:VHN-97385

Trust: 0.1

db:VULMONid:CVE-2016-8565

Trust: 0.1

sources: CNVD: CNVD-2016-08770 // VULHUB: VHN-97385 // VULMON: CVE-2016-8565 // BID: 93553 // JVNDB: JVNDB-2016-005416 // CNNVD: CNNVD-201610-421 // NVD: CVE-2016-8565

REFERENCES

url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-284342.pdf

Trust: 2.4

url:https://ics-cert.us-cert.gov/advisories/icsa-16-287-02

Trust: 2.4

url:http://www.securityfocus.com/bid/93553

Trust: 1.3

url:http://www.securitytracker.com/id/1037011

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8565

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8565

Trust: 0.8

url:https://support.industry.siemens.com/cs/document/114358/automation-license-manager-(alm)-authorsw-and-authors-handling-programs-and-authorizing-and-licensing-simatic-industry-software?dti=0&lc=en-ww

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/284.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2016-08770 // VULHUB: VHN-97385 // VULMON: CVE-2016-8565 // BID: 93553 // JVNDB: JVNDB-2016-005416 // CNNVD: CNNVD-201610-421 // NVD: CVE-2016-8565

CREDITS

Sergey Temnikov and Vladimir Dashchenko from Critical Infrastructure Defence Team, Kaspersky Lab.

Trust: 0.3

sources: BID: 93553

SOURCES

db:CNVDid:CNVD-2016-08770
db:VULHUBid:VHN-97385
db:VULMONid:CVE-2016-8565
db:BIDid:93553
db:JVNDBid:JVNDB-2016-005416
db:CNNVDid:CNNVD-201610-421
db:NVDid:CVE-2016-8565

LAST UPDATE DATE

2025-04-13T23:36:24.005000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-08770date:2016-10-13T00:00:00
db:VULHUBid:VHN-97385date:2017-07-29T00:00:00
db:VULMONid:CVE-2016-8565date:2017-07-29T00:00:00
db:BIDid:93553date:2016-10-26T05:07:00
db:JVNDBid:JVNDB-2016-005416date:2016-10-20T00:00:00
db:CNNVDid:CNNVD-201610-421date:2016-10-14T00:00:00
db:NVDid:CVE-2016-8565date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-08770date:2016-10-13T00:00:00
db:VULHUBid:VHN-97385date:2016-10-13T00:00:00
db:VULMONid:CVE-2016-8565date:2016-10-13T00:00:00
db:BIDid:93553date:2016-10-13T00:00:00
db:JVNDBid:JVNDB-2016-005416date:2016-10-20T00:00:00
db:CNNVDid:CNNVD-201610-421date:2016-10-14T00:00:00
db:NVDid:CVE-2016-8565date:2016-10-13T10:59:05.613