ID

VAR-201611-0404


TITLE

Siemens SIMATIC S7-300 CPU Denial of service vulnerability

Trust: 0.8

sources: IVD: f81dc529-def7-4278-8d54-824bca4d498f // CNVD: CNVD-2016-11520

DESCRIPTION

The Siemens SIMATIC S7-300 CPU is a modular universal controller for the manufacturing industry from Siemens, Germany. It is widely used in important industrial control fields such as tobacco, petrochemical and water. A denial of service vulnerability exists in the Siemens SIMATIC S7-300 CPU. The Siemens SIMATIC S7-300 CPU refuses service during the communication of the specific ProfinetIO Layer 2 network packet. The CPU enters the fault mode and needs to be manually restarted for recovery. The attacker exploits the vulnerability to directly obtain the target information through the secondary MAC broadcast to initiate a denial of service attack

Trust: 0.72

sources: CNVD: CNVD-2016-11520 // IVD: f81dc529-def7-4278-8d54-824bca4d498f

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: f81dc529-def7-4278-8d54-824bca4d498f // CNVD: CNVD-2016-11520

AFFECTED PRODUCTS

vendor:siemensmodel:simatic s7-300 cpuscope: - version: -

Trust: 0.6

vendor:siemensmodel:simatic s7-300 cpuscope:eqversion:*

Trust: 0.2

sources: IVD: f81dc529-def7-4278-8d54-824bca4d498f // CNVD: CNVD-2016-11520

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2016-11520
value: HIGH

Trust: 0.6

IVD: f81dc529-def7-4278-8d54-824bca4d498f
value: HIGH

Trust: 0.2

CNVD: CNVD-2016-11520
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: f81dc529-def7-4278-8d54-824bca4d498f
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: f81dc529-def7-4278-8d54-824bca4d498f // CNVD: CNVD-2016-11520

TYPE

Input validation

Trust: 0.2

sources: IVD: f81dc529-def7-4278-8d54-824bca4d498f

PATCH

title:To be determinedurl:https://www.cnvd.org.cn/patchinfo/show/84249

Trust: 0.6

sources: CNVD: CNVD-2016-11520

EXTERNAL IDS

db:CNVDid:CNVD-2016-11520

Trust: 0.8

db:IVDid:F81DC529-DEF7-4278-8D54-824BCA4D498F

Trust: 0.2

sources: IVD: f81dc529-def7-4278-8d54-824bca4d498f // CNVD: CNVD-2016-11520

SOURCES

db:IVDid:f81dc529-def7-4278-8d54-824bca4d498f
db:CNVDid:CNVD-2016-11520

LAST UPDATE DATE

2022-05-17T02:08:58.752000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-11520date:2019-08-22T00:00:00

SOURCES RELEASE DATE

db:IVDid:f81dc529-def7-4278-8d54-824bca4d498fdate:2016-11-25T00:00:00
db:CNVDid:CNVD-2016-11520date:2017-02-17T00:00:00