{ "id": "CVE-2016-9158", "sourceIdentifier": "productcert@siemens.com", "published": "2016-12-17T03:59:00.187", "lastModified": "2020-03-10T20:15:11.883", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC S7-300 CPU family (All versions), SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 V6 and earlier CPU family (All versions), SIMATIC S7-400 V7 CPU family (All versions). Specially crafted packets sent to port 80/tcp could cause the affected devices to go into defect mode. A cold restart is required to recover the system." }, { "lang": "es", "value": "Se ha identificado una vulnerabilidad en la familia de CPU SIMATIC S7-300 (todas las versiones), la familia de CPU SIMATIC S7-300 (incluidas las CPU ET200 relacionadas y las variantes SIPLUS) (todas las versiones), SIMATIC S7-400 PN / DP V6 y familias de CPU inferiores (incl. variantes SIPLUS) (todas las versiones), familia de CPU SIMATIC S7-400 PN / DP V7 (incl. variantes SIPLUS) (todas las versiones), SIMATIC S7-400 V6 y familia de CPU anterior (todas las versiones), SIMATIC S7-400 Familia de CPU V7 (todas las versiones). Los paquetes especialmente dise\u00f1ados enviados al puerto 80 / tcp podr\u00edan hacer que los dispositivos afectados entren en modo defectuoso. Se requiere un reinicio en fr\u00edo para recuperar el sistema." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] }, { "source": "productcert@siemens.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:siemens:simatic_s7-300_cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76189399-9032-4695-A976-8415E26B0DB8" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-300_cpu_312:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FB328F8-3E03-440B-AB5C-ADA1D4F07F0E" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-300_cpu_314:-:*:*:*:*:*:*:*", "matchCriteriaId": "78399465-EED5-4EBD-A2E1-6FE0BD01EDB4" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-300_cpu_315-2_dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FD8E6D-0527-4215-B6F0-5824011433FB" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-300_cpu_315-2_pn\\/dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A773F92D-E5C0-4B51-8214-19BFE6BC7638" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-300_cpu_317-_2_dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3C5065F-C0B9-4427-A9D2-072AFF3FCA69" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-300_cpu_317-2_pn\\/dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A340DA65-BA46-4F72-8951-93135F9F6602" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-300_cpu_319-3_pn\\/dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7167E5B0-D278-4F63-B5CD-39DBDF336089" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:siemens:simatic_s7-400_cpu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6EBD5F0-16A6-466B-80E5-B95DDBDE2FA3" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_412-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "6498C679-46A3-4F87-9278-F64D2194E1F5" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_412-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "85F8C306-45F5-429B-B932-0278A9B909B7" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_412-2_pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0E162F8-B37A-4FFA-A523-FA6227372D37" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_414-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CD1CA5C-F729-4311-9E78-156BB6DE31A7" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_414-3:-:*:*:*:*:*:*:*", "matchCriteriaId": "20E69856-A628-4B9D-9184-7FB9A924193E" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_414-3_pn\\/dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1EC8F19-313A-4C74-A68A-AAC320B123CE" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_416-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "195259DF-8ABE-47A9-9A13-6BDAA25AA898" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_416-3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3412299F-5778-4290-A80C-29BC6F46F701" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_416-3_pn\\/dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC41E925-88AF-4D33-AC49-CE5FEAAF2105" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_416f-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "61363AEF-CBDB-4405-A605-4997798D38D8" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_416f-3_pn\\/dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFC71AB-3ACF-4E7E-B83E-31E02DEBDA48" }, { "vulnerable": false, "criteria": "cpe:2.3:h:siemens:simatic_s7-400_cpu_417-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "711A91B2-EB16-418B-AA63-56DFD40075D7" } ] } ] } ], "references": [ { "url": "http://www.securityfocus.com/bid/94820", "source": "productcert@siemens.com" }, { "url": "http://www.securitytracker.com/id/1037434", "source": "productcert@siemens.com" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-731239.pdf", "source": "productcert@siemens.com" }, { "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-348-05", "source": "productcert@siemens.com" }, { "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-731239.pdf", "source": "productcert@siemens.com" } ] }