ID

VAR-201707-1137


CVE

CVE-2017-6868


TITLE

Siemens SIMATIC CP 44x-1 RNA In RNA Series module CP Vulnerability to perform administrator operations on

Trust: 0.8

sources: JVNDB: JVNDB-2017-005583

DESCRIPTION

An Improper Authentication issue was discovered in Siemens SIMATIC CP 44x-1 RNA, all versions prior to 1.4.1. An unauthenticated remote attacker may be able to perform administrative actions on the Communication Process (CP) of the RNA series module, if network access to Port 102/TCP is available and the configuration file for the CP is stored on the RNA's CPU. The SiemensSIMATICCP44x-1RNA is a communications processor that integrates security functions such as firewall, VPN, security protocol, data encryption, etc., providing network connectivity and secure communication for the s7-1500 controller. An unauthorized operating vulnerability exists in the pre-1.4.1 version of the Siemens SIMATICCP44x-1RNA module. Siemens SIMATIC CP 44x-1 Redundant is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks

Trust: 2.61

sources: NVD: CVE-2017-6868 // JVNDB: JVNDB-2017-005583 // CNVD: CNVD-2017-10562 // BID: 99234 // IVD: 672426ea-158d-49e1-aaf0-f6cc1a05260b

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: 672426ea-158d-49e1-aaf0-f6cc1a05260b // CNVD: CNVD-2017-10562

AFFECTED PRODUCTS

vendor:siemensmodel:simatic cp 44x-1 redundant network access modulesscope:lteversion:1.4.0

Trust: 1.0

vendor:siemensmodel:simatic cp 44x-1 rnascope:eqversion:1.4.1

Trust: 0.8

vendor:siemensmodel:simatic cp 44x-1 rnascope:ltversion:all versions

Trust: 0.8

vendor:siemensmodel:simatic cp rnascope:eqversion:44x-1<v1.4.1

Trust: 0.6

vendor:siemensmodel:simatic cp 44x-1 redundant network access modulesscope:eqversion:1.4.0

Trust: 0.6

vendor:siemensmodel:simatic cp rnascope:eqversion:44x-11.4

Trust: 0.3

vendor:siemensmodel:simatic cp rnascope:neversion:44x-11.4.1

Trust: 0.3

vendor:simatic cp 44x 1 redundant network access modulesmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 672426ea-158d-49e1-aaf0-f6cc1a05260b // CNVD: CNVD-2017-10562 // BID: 99234 // JVNDB: JVNDB-2017-005583 // CNNVD: CNNVD-201703-629 // NVD: CVE-2017-6868

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6868
value: HIGH

Trust: 1.0

NVD: CVE-2017-6868
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-10562
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201703-629
value: MEDIUM

Trust: 0.6

IVD: 672426ea-158d-49e1-aaf0-f6cc1a05260b
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2017-6868
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-10562
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 672426ea-158d-49e1-aaf0-f6cc1a05260b
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2017-6868
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 672426ea-158d-49e1-aaf0-f6cc1a05260b // CNVD: CNVD-2017-10562 // JVNDB: JVNDB-2017-005583 // CNNVD: CNNVD-201703-629 // NVD: CVE-2017-6868

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.8

sources: JVNDB: JVNDB-2017-005583 // NVD: CVE-2017-6868

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201703-629

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201703-629

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-005583

PATCH

title:SSA-126840url:https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-126840.pdf

Trust: 0.8

title:SiemensSIMATICCP44x-1RNA Module Unauthorized Patch for Operational Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/96042

Trust: 0.6

sources: CNVD: CNVD-2017-10562 // JVNDB: JVNDB-2017-005583

EXTERNAL IDS

db:NVDid:CVE-2017-6868

Trust: 3.5

db:ICS CERTid:ICSA-17-173-01

Trust: 2.7

db:SIEMENSid:SSA-126840

Trust: 1.6

db:BIDid:99234

Trust: 1.3

db:SECTRACKid:1038788

Trust: 1.0

db:CNVDid:CNVD-2017-10562

Trust: 0.8

db:CNNVDid:CNNVD-201703-629

Trust: 0.8

db:JVNDBid:JVNDB-2017-005583

Trust: 0.8

db:IVDid:672426EA-158D-49E1-AAF0-F6CC1A05260B

Trust: 0.2

sources: IVD: 672426ea-158d-49e1-aaf0-f6cc1a05260b // CNVD: CNVD-2017-10562 // BID: 99234 // JVNDB: JVNDB-2017-005583 // CNNVD: CNNVD-201703-629 // NVD: CVE-2017-6868

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-17-173-01

Trust: 2.7

url:https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-126840.pdf

Trust: 1.6

url:http://www.securitytracker.com/id/1038788

Trust: 1.0

url:http://www.securityfocus.com/bid/99234

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6868

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6868

Trust: 0.8

url:http://www.siemens.com/

Trust: 0.3

sources: CNVD: CNVD-2017-10562 // BID: 99234 // JVNDB: JVNDB-2017-005583 // CNNVD: CNNVD-201703-629 // NVD: CVE-2017-6868

CREDITS

The vendor reported the issue.

Trust: 0.3

sources: BID: 99234

SOURCES

db:IVDid:672426ea-158d-49e1-aaf0-f6cc1a05260b
db:CNVDid:CNVD-2017-10562
db:BIDid:99234
db:JVNDBid:JVNDB-2017-005583
db:CNNVDid:CNNVD-201703-629
db:NVDid:CVE-2017-6868

LAST UPDATE DATE

2025-04-20T23:34:19.697000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-10562date:2017-06-21T00:00:00
db:BIDid:99234date:2017-06-22T00:00:00
db:JVNDBid:JVNDB-2017-005583date:2017-08-01T00:00:00
db:CNNVDid:CNNVD-201703-629date:2017-07-10T00:00:00
db:NVDid:CVE-2017-6868date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:IVDid:672426ea-158d-49e1-aaf0-f6cc1a05260bdate:2017-06-21T00:00:00
db:CNVDid:CNVD-2017-10562date:2017-06-21T00:00:00
db:BIDid:99234date:2017-06-22T00:00:00
db:JVNDBid:JVNDB-2017-005583date:2017-08-01T00:00:00
db:CNNVDid:CNNVD-201703-629date:2017-03-16T00:00:00
db:NVDid:CVE-2017-6868date:2017-07-07T17:29:00.340