Lucene search

K
cve[email protected]CVE-2019-18336
HistoryMar 10, 2020 - 8:15 p.m.

CVE-2019-18336

2020-03-1020:15:18
CWE-400
web.nvd.nist.gov
38
cve-2019-18336
simatic
s7-300
tdc
cpu555
sinumerik
vulnerability
profinet
port 102/tcp
network security
nvd

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.6%

A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V3.X.17), SIMATIC TDC CP51M1 (All versions < V1.1.8), SIMATIC TDC CPU555 (All versions < V1.1.1), SINUMERIK 840D sl (All versions < V4.8.6), SINUMERIK 840D sl (All versions < V4.94). Specially crafted packets sent to port 102/tcp (Profinet) could cause the affected device to go into defect mode. A restart is required in order to recover the system. Successful exploitation requires an attacker to have network access to port 102/tcp, with no authentication. No user interation is required. At the time of advisory publication no public exploitation of this security vulnerability was known.

Affected configurations

NVD
Node
siemenssimatic_s7-300_cpu_firmwareRange<3.3.17
AND
siemenssimatic_s7-300_cpuMatch-
Node
siemenssimatic_s7-300_cpu_312_ifm_firmwareRange<3.3.17
AND
siemenssimatic_s7-300_cpu_312_ifmMatch-
Node
siemenssimatic_s7-300_cpu_313_firmwareRange<3.3.17
AND
siemenssimatic_s7-300_cpu_313Match-
Node
siemenssimatic_s7-300_cpu_314_firmwareRange<3.3.17
AND
siemenssimatic_s7-300_cpu_314Match-
Node
siemenssimatic_s7-300_cpu_314_ifm_firmwareRange<3.3.17
AND
siemenssimatic_s7-300_cpu_314_ifmMatch-
Node
siemenssimatic_s7-300_cpu_315_firmwareRange<3.3.17
AND
siemenssimatic_s7-300_cpu_315Match-
Node
siemenssimatic_s7-300_cpu_315-2_dp_firmwareRange<3.3.17
AND
siemenssimatic_s7-300_cpu_315-2_dpMatch-
Node
siemenssimatic_s7-300_cpu_316-2_dp_firmwareRange<3.3.17
AND
siemenssimatic_s7-300_cpu_316-2_dpMatch-
Node
siemenssimatic_s7-300_cpu_318-2_firmwareRange<3.3.17
AND
siemenssimatic_s7-300_cpu_318-2Match-
Node
siemenssinumerik_840d_slRange<4.8.6
Node
siemenssinumerik_840d_slRange<4.94
Node
siemenssimatic_tdc_cp51m1_firmwareRange<1.1.8
AND
siemenssimatic_tdc_cp51m1Match-
Node
siemenssimatic_tdc_cpu555_firmwareRange<1.1.1
AND
siemenssimatic_tdc_cpu555Match-

CNA Affected

[
  {
    "product": "SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)",
    "vendor": "Siemens AG",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V3.X.17"
      }
    ]
  },
  {
    "product": "SIMATIC TDC CP51M1",
    "vendor": "Siemens AG",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V1.1.8"
      }
    ]
  },
  {
    "product": "SIMATIC TDC CPU555",
    "vendor": "Siemens AG",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V1.1.1"
      }
    ]
  },
  {
    "product": "SINUMERIK 840D sl",
    "vendor": "Siemens AG",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V4.8.6"
      }
    ]
  },
  {
    "product": "SINUMERIK 840D sl",
    "vendor": "Siemens AG",
    "versions": [
      {
        "status": "affected",
        "version": "All versions < V4.94"
      }
    ]
  }
]

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.6%

Related for CVE-2019-18336