ID

VAR-201702-0292


CVE

CVE-2016-7987


TITLE

Siemens SICAM For SM-2558 Expansion module ETA4 Service operation interruption in firmware (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-007983

DESCRIPTION

An issue was discovered in Siemens ETA4 firmware (all versions prior to Revision 08) of the SM-2558 extension module for: SICAM AK, SICAM TM 1703, SICAM BC 1703, and SICAM AK 3. Specially crafted packets sent to Port 2404/TCP could cause the affected device to go into defect mode. A cold start might be required to recover the system, a Denial-of-Service Vulnerability. Siemens SICAM For SM-2558 Expansion module ETA4 Firmware disrupts service operation (DoS) There are vulnerabilities that are put into a state.Port crafted packets 2404/TCP Is sent to defect Mode and denial of service (DoS) There is a possibility of being put into a state. The Siemenssm-2558 and sm-2556 communication modules are Fast Ethernet communication interface units for LAN/WAN. A denial of service vulnerability exists in the Siemens SICAMRTU device. Remote attackers may exploit this issue to cause denial-of-service conditions, denying service to legitimate users. Siemens SICAM AK, etc. are all products of German Siemens (Siemens). Siemens SICAM AK is a power monitoring system. SICAM TM 1703 is an automation module for use in SICAM RTU remote terminal units

Trust: 2.7

sources: NVD: CVE-2016-7987 // JVNDB: JVNDB-2016-007983 // CNVD: CNVD-2016-09879 // BID: 93832 // IVD: ab93f7cb-310f-4c99-9452-4159d4cc6dc5 // VULHUB: VHN-96807

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: ab93f7cb-310f-4c99-9452-4159d4cc6dc5 // CNVD: CNVD-2016-09879

AFFECTED PRODUCTS

vendor:siemensmodel:eta2scope:lteversion:11.0

Trust: 1.0

vendor:siemensmodel:eta4scope:lteversion:07

Trust: 1.0

vendor:siemensmodel:eta2scope: - version: -

Trust: 0.8

vendor:siemensmodel:eta4scope: - version: -

Trust: 0.8

vendor:siemensmodel:sicam akscope: - version: -

Trust: 0.8

vendor:siemensmodel:sicam ak 3scope: - version: -

Trust: 0.8

vendor:siemensmodel:sicam bcscope: - version: -

Trust: 0.8

vendor:siemensmodel:sicam bc 1703scope: - version: -

Trust: 0.8

vendor:siemensmodel:sicam tmscope: - version: -

Trust: 0.8

vendor:siemensmodel:sicam tm 1703scope: - version: -

Trust: 0.8

vendor:siemensmodel:eta4 (all versions revision of the sm-2558 extension module for sicam akscope:ltversion:08)

Trust: 0.6

vendor:siemensmodel:eta4 (all versions revision of the sm-2558 extension module for sicam tmscope:ltversion:08)1703

Trust: 0.6

vendor:siemensmodel:eta4 (all versions revision of the sm-2558 extension module for sicam bcscope:ltversion:08)1703

Trust: 0.6

vendor:siemensmodel:eta4 (all versions revision of the sm-2558 extension module for sicam akscope:ltversion:08)3

Trust: 0.6

vendor:siemensmodel:eta2 of the sm-2556 extension module for sicam akscope:eqversion:11.01

Trust: 0.6

vendor:siemensmodel:eta2 of the sm-2556 extension module for sicam bcscope:eqversion:11.01

Trust: 0.6

vendor:siemensmodel:eta2 of the sm-2556 extension module for sicam tmscope:eqversion:11.01

Trust: 0.6

vendor:siemensmodel:eta2scope:eqversion:11.0

Trust: 0.6

vendor:siemensmodel:eta4scope:eqversion:07

Trust: 0.6

vendor:siemensmodel:sicam tm sm-2558 eta4 revisionscope:eqversion:170307

Trust: 0.3

vendor:siemensmodel:sicam bc sm-2558 eta4 revisionscope:eqversion:170307

Trust: 0.3

vendor:siemensmodel:sicam ak sm-2558 eta4 revisionscope:eqversion:307

Trust: 0.3

vendor:siemensmodel:sicam tm sm-2556 eta2 revisionscope:eqversion:11.01

Trust: 0.3

vendor:siemensmodel:sicam tm sm-2556 eta2 revisionscope:eqversion:11.00

Trust: 0.3

vendor:siemensmodel:sicam bc sm-2556 eta2 revisionscope:eqversion:11.01

Trust: 0.3

vendor:siemensmodel:sicam bc sm-2556 eta2 revisionscope:eqversion:11.00

Trust: 0.3

vendor:siemensmodel:sicam ak sm-2556 eta2 revisionscope:eqversion:11.01

Trust: 0.3

vendor:siemensmodel:sicam ak sm-2556 eta2 revisionscope:eqversion:11.00

Trust: 0.3

vendor:siemensmodel:sicam ak sm-2558 eta4 revisionscope:eqversion:07

Trust: 0.3

vendor:siemensmodel:sicam tm sm-2558 eta4 revisionscope:neversion:170308

Trust: 0.3

vendor:siemensmodel:sicam bc sm-2558 eta4 revisionscope:neversion:170308

Trust: 0.3

vendor:siemensmodel:sicam ak sm-2558 eta4 revisionscope:neversion:308

Trust: 0.3

vendor:siemensmodel:sicam ak sm-2558 eta4 revisionscope:neversion:08

Trust: 0.3

vendor:eta4model: - scope:eqversion:*

Trust: 0.2

vendor:eta2model: - scope:eqversion:*

Trust: 0.2

sources: IVD: ab93f7cb-310f-4c99-9452-4159d4cc6dc5 // CNVD: CNVD-2016-09879 // BID: 93832 // JVNDB: JVNDB-2016-007983 // CNNVD: CNNVD-201610-699 // NVD: CVE-2016-7987

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-7987
value: HIGH

Trust: 1.0

NVD: CVE-2016-7987
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-09879
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201610-699
value: HIGH

Trust: 0.6

IVD: ab93f7cb-310f-4c99-9452-4159d4cc6dc5
value: HIGH

Trust: 0.2

VULHUB: VHN-96807
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-7987
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-09879
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: ab93f7cb-310f-4c99-9452-4159d4cc6dc5
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-96807
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-7987
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: ab93f7cb-310f-4c99-9452-4159d4cc6dc5 // CNVD: CNVD-2016-09879 // VULHUB: VHN-96807 // JVNDB: JVNDB-2016-007983 // CNNVD: CNNVD-201610-699 // NVD: CVE-2016-7987

PROBLEMTYPE DATA

problemtype:CWE-19

Trust: 1.9

sources: VULHUB: VHN-96807 // JVNDB: JVNDB-2016-007983 // NVD: CVE-2016-7987

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201610-699

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201610-699

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007983

PATCH

title:Top Pageurl:https://www.siemens.com/global/en/home.html

Trust: 0.8

title:SiemensSICAMRTU device has a patch for denial of service vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/82906

Trust: 0.6

title:Multiple Siemens Product repair measures for security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65062

Trust: 0.6

sources: CNVD: CNVD-2016-09879 // JVNDB: JVNDB-2016-007983 // CNNVD: CNNVD-201610-699

EXTERNAL IDS

db:NVDid:CVE-2016-7987

Trust: 3.6

db:ICS CERTid:ICSA-16-299-01

Trust: 2.5

db:BIDid:93832

Trust: 2.0

db:CNNVDid:CNNVD-201610-699

Trust: 0.9

db:SIEMENSid:SSA-296574

Trust: 0.9

db:CNVDid:CNVD-2016-09879

Trust: 0.8

db:JVNDBid:JVNDB-2016-007983

Trust: 0.8

db:IVDid:AB93F7CB-310F-4C99-9452-4159D4CC6DC5

Trust: 0.2

db:VULHUBid:VHN-96807

Trust: 0.1

sources: IVD: ab93f7cb-310f-4c99-9452-4159d4cc6dc5 // CNVD: CNVD-2016-09879 // VULHUB: VHN-96807 // BID: 93832 // JVNDB: JVNDB-2016-007983 // CNNVD: CNNVD-201610-699 // NVD: CVE-2016-7987

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-16-299-01

Trust: 2.5

url:http://www.securityfocus.com/bid/93832

Trust: 1.7

url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-296574.pdf

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7987

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-7987

Trust: 0.8

url:http://www.siemens.com/

Trust: 0.3

sources: CNVD: CNVD-2016-09879 // VULHUB: VHN-96807 // BID: 93832 // JVNDB: JVNDB-2016-007983 // CNNVD: CNNVD-201610-699 // NVD: CVE-2016-7987

CREDITS

Stephan Beirer, Markus Mahrla, Toralf Gimpel, and Sebastian Krause, from GAINetConsult GmbH, and Adam Crain, Automatak LLC, Bundesamt f??r Sicherheit in der Informationstechnik (BSI) , Industrial Control Systems Cyber Emergency Response Team (I

Trust: 0.6

sources: CNNVD: CNNVD-201610-699

SOURCES

db:IVDid:ab93f7cb-310f-4c99-9452-4159d4cc6dc5
db:CNVDid:CNVD-2016-09879
db:VULHUBid:VHN-96807
db:BIDid:93832
db:JVNDBid:JVNDB-2016-007983
db:CNNVDid:CNNVD-201610-699
db:NVDid:CVE-2016-7987

LAST UPDATE DATE

2025-04-20T23:33:01.537000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-09879date:2016-10-25T00:00:00
db:VULHUBid:VHN-96807date:2017-03-14T00:00:00
db:BIDid:93832date:2016-10-26T01:16:00
db:JVNDBid:JVNDB-2016-007983date:2017-04-04T00:00:00
db:CNNVDid:CNNVD-201610-699date:2016-10-25T00:00:00
db:NVDid:CVE-2016-7987date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:ab93f7cb-310f-4c99-9452-4159d4cc6dc5date:2016-10-25T00:00:00
db:CNVDid:CNVD-2016-09879date:2016-10-24T00:00:00
db:VULHUBid:VHN-96807date:2017-02-13T00:00:00
db:BIDid:93832date:2016-10-21T00:00:00
db:JVNDBid:JVNDB-2016-007983date:2017-04-04T00:00:00
db:CNNVDid:CNNVD-201610-699date:2016-10-25T00:00:00
db:NVDid:CVE-2016-7987date:2017-02-13T21:59:00.563