Lucene search

K
nessusThis script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_SIEMENS_CVE-2018-3639.NASL
HistoryFeb 07, 2022 - 12:00 a.m.

Siemens SIMATIC Spectre-NG Variants 3a and 4 (CVE-2018-3639)

2022-02-0700:00:00
This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
47

7 High

AI Score

Confidence

High

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(500248);
  script_version("1.5");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/04/22");

  script_cve_id("CVE-2018-3639");
  script_xref(name:"CERT", value:"TA18-141A");
  script_xref(name:"USN", value:"USN-3655-2");
  script_xref(name:"USN", value:"USN-3654-2");
  script_xref(name:"USN", value:"USN-3654-1");
  script_xref(name:"USN", value:"USN-3653-2");
  script_xref(name:"USN", value:"USN-3653-1");
  script_xref(name:"USN", value:"USN-3652-1");
  script_xref(name:"USN", value:"USN-3651-1");
  script_xref(name:"RHSA", value:"RHSA-2018:1660");
  script_xref(name:"RHSA", value:"RHSA-2018:1655");
  script_xref(name:"RHSA", value:"RHSA-2018:1647");
  script_xref(name:"RHSA", value:"RHSA-2018:1630");
  script_xref(name:"RHSA", value:"RHSA-2018:1690");
  script_xref(name:"RHSA", value:"RHSA-2018:1689");
  script_xref(name:"RHSA", value:"RHSA-2018:1688");
  script_xref(name:"RHSA", value:"RHSA-2018:1686");
  script_xref(name:"RHSA", value:"RHSA-2018:1676");
  script_xref(name:"RHSA", value:"RHSA-2018:1675");
  script_xref(name:"RHSA", value:"RHSA-2018:1674");
  script_xref(name:"RHSA", value:"RHSA-2018:1669");
  script_xref(name:"RHSA", value:"RHSA-2018:1668");
  script_xref(name:"RHSA", value:"RHSA-2018:1667");
  script_xref(name:"RHSA", value:"RHSA-2018:1666");
  script_xref(name:"RHSA", value:"RHSA-2018:1665");
  script_xref(name:"RHSA", value:"RHSA-2018:1664");
  script_xref(name:"RHSA", value:"RHSA-2018:1663");
  script_xref(name:"RHSA", value:"RHSA-2018:1662");
  script_xref(name:"RHSA", value:"RHSA-2018:1661");
  script_xref(name:"RHSA", value:"RHSA-2018:1659");
  script_xref(name:"RHSA", value:"RHSA-2018:1658");
  script_xref(name:"RHSA", value:"RHSA-2018:1657");
  script_xref(name:"RHSA", value:"RHSA-2018:1656");
  script_xref(name:"RHSA", value:"RHSA-2018:1654");
  script_xref(name:"RHSA", value:"RHSA-2018:1653");
  script_xref(name:"RHSA", value:"RHSA-2018:1652");
  script_xref(name:"RHSA", value:"RHSA-2018:1651");
  script_xref(name:"RHSA", value:"RHSA-2018:1650");
  script_xref(name:"RHSA", value:"RHSA-2018:1649");
  script_xref(name:"RHSA", value:"RHSA-2018:1648");
  script_xref(name:"RHSA", value:"RHSA-2018:1646");
  script_xref(name:"RHSA", value:"RHSA-2018:1645");
  script_xref(name:"RHSA", value:"RHSA-2018:1644");
  script_xref(name:"RHSA", value:"RHSA-2018:1643");
  script_xref(name:"RHSA", value:"RHSA-2018:1642");
  script_xref(name:"RHSA", value:"RHSA-2018:1636");
  script_xref(name:"RHSA", value:"RHSA-2018:1635");
  script_xref(name:"RHSA", value:"RHSA-2018:1633");
  script_xref(name:"RHSA", value:"RHSA-2018:1632");
  script_xref(name:"RHSA", value:"RHSA-2018:1629");
  script_xref(name:"EDB-ID", value:"44695");
  script_xref(name:"RHSA", value:"RHSA-2018:1711");
  script_xref(name:"RHSA", value:"RHSA-2018:1710");
  script_xref(name:"RHSA", value:"RHSA-2018:1696");
  script_xref(name:"DSA", value:"DSA-4210");
  script_xref(name:"USN", value:"USN-3655-1");
  script_xref(name:"RHSA", value:"RHSA-2018:1738");
  script_xref(name:"RHSA", value:"RHSA-2018:1737");
  script_xref(name:"RHSA", value:"RHSA-2018:1641");
  script_xref(name:"RHSA", value:"RHSA-2018:1640");
  script_xref(name:"RHSA", value:"RHSA-2018:1639");
  script_xref(name:"RHSA", value:"RHSA-2018:1638");
  script_xref(name:"RHSA", value:"RHSA-2018:1637");
  script_xref(name:"USN", value:"USN-3680-1");
  script_xref(name:"USN", value:"USN-3679-1");
  script_xref(name:"RHSA", value:"RHSA-2018:1826");
  script_xref(name:"RHSA", value:"RHSA-2018:1854");
  script_xref(name:"RHSA", value:"RHSA-2018:2006");
  script_xref(name:"RHSA", value:"RHSA-2018:2003");
  script_xref(name:"RHSA", value:"RHSA-2018:2001");
  script_xref(name:"RHSA", value:"RHSA-2018:1997");
  script_xref(name:"RHSA", value:"RHSA-2018:1967");
  script_xref(name:"RHSA", value:"RHSA-2018:1965");
  script_xref(name:"RHSA", value:"RHSA-2018:2060");
  script_xref(name:"RHSA", value:"RHSA-2018:2164");
  script_xref(name:"RHSA", value:"RHSA-2018:2162");
  script_xref(name:"RHSA", value:"RHSA-2018:2161");
  script_xref(name:"RHSA", value:"RHSA-2018:2172");
  script_xref(name:"RHSA", value:"RHSA-2018:2171");
  script_xref(name:"RHSA", value:"RHSA-2018:2216");
  script_xref(name:"RHSA", value:"RHSA-2018:2228");
  script_xref(name:"RHSA", value:"RHSA-2018:2250");
  script_xref(name:"RHSA", value:"RHSA-2018:2246");
  script_xref(name:"RHSA", value:"RHSA-2018:2258");
  script_xref(name:"RHSA", value:"RHSA-2018:2289");
  script_xref(name:"RHSA", value:"RHSA-2018:2328");
  script_xref(name:"RHSA", value:"RHSA-2018:2309");
  script_xref(name:"RHSA", value:"RHSA-2018:2364");
  script_xref(name:"RHSA", value:"RHSA-2018:2363");
  script_xref(name:"RHSA", value:"RHSA-2018:2396");
  script_xref(name:"RHSA", value:"RHSA-2018:2394");
  script_xref(name:"RHSA", value:"RHSA-2018:2387");
  script_xref(name:"DSA", value:"DSA-4273");
  script_xref(name:"USN", value:"USN-3756-1");
  script_xref(name:"USN", value:"USN-3777-3");
  script_xref(name:"RHSA", value:"RHSA-2018:3425");
  script_xref(name:"RHSA", value:"RHSA-2018:3424");
  script_xref(name:"RHSA", value:"RHSA-2018:3423");
  script_xref(name:"RHSA", value:"RHSA-2018:3407");
  script_xref(name:"RHSA", value:"RHSA-2018:3402");
  script_xref(name:"RHSA", value:"RHSA-2018:3401");
  script_xref(name:"RHSA", value:"RHSA-2018:3400");
  script_xref(name:"RHSA", value:"RHSA-2018:3399");
  script_xref(name:"RHSA", value:"RHSA-2018:3398");
  script_xref(name:"RHSA", value:"RHSA-2018:3397");
  script_xref(name:"RHSA", value:"RHSA-2018:3396");
  script_xref(name:"RHSA", value:"RHSA-2018:2948");
  script_xref(name:"RHSA", value:"RHSA-2019:0148");
  script_xref(name:"RHSA", value:"RHSA-2019:1046");
  script_xref(name:"SuSE", value:"openSUSE-SU-2019:1439");
  script_xref(name:"SuSE", value:"openSUSE-SU-2019:1438");
  script_xref(name:"SuSE", value:"openSUSE-SU-2020:1325");

  script_name(english:"Siemens SIMATIC Spectre-NG Variants 3a and 4 (CVE-2018-3639)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the
addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with
local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.  

This plugin only works
with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"https://www.us-cert.gov/ncas/alerts/TA18-141A");
  # https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c2acd2ee");
  script_set_attribute(attribute:"see_also", value:"https://www.synology.com/support/security/Synology_SA_18_23");
  script_set_attribute(attribute:"see_also", value:"https://www.kb.cert.org/vuls/id/180049");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3655-2/");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3654-2/");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3654-1/");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3653-2/");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3653-1/");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3652-1/");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3651-1/");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fc974ba6");
  script_set_attribute(attribute:"see_also", value:"https://support.citrix.com/article/CTX235225");
  script_set_attribute(attribute:"see_also", value:"https://security.netapp.com/advisory/ntap-20180521-0001/");
  # https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?36d8913e");
  # https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c89c164f");
  script_set_attribute(attribute:"see_also", value:"https://bugs.chromium.org/p/project-zero/issues/detail?id=1528");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1660");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1655");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1647");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1630");
  script_set_attribute(attribute:"see_also", value:"http://xenbits.xen.org/xsa/advisory-263.html");
  script_set_attribute(attribute:"see_also", value:"http://www.securitytracker.com/id/1040949");
  script_set_attribute(attribute:"see_also", value:"http://support.lenovo.com/us/en/solutions/LEN-22133");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1690");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1689");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1688");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1686");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1676");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1675");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1674");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1669");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1668");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1667");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1666");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1665");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1664");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1663");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1662");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1661");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1659");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1658");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1657");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1656");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1654");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1653");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1652");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1651");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1650");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1649");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1648");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1646");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1645");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1644");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1643");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1642");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1636");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1635");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1633");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1632");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1629");
  script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/bid/104232");
  script_set_attribute(attribute:"see_also", value:"https://www.exploit-db.com/exploits/44695/");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1711");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1710");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1696");
  script_set_attribute(attribute:"see_also", value:"https://www.debian.org/security/2018/dsa-4210");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3655-1/");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1738");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1737");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1641");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1640");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1639");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1638");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1637");
  # http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ab57ba47");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3680-1/");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3679-1/");
  # https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?abd55666");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1826");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1854");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2006");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2003");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2001");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1997");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1967");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:1965");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2060");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2164");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2162");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2161");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2172");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2171");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2216");
  script_set_attribute(attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2228");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2250");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2246");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2258");
  script_set_attribute(attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2289");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2328");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2309");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2364");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2363");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2396");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2394");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2387");
  script_set_attribute(attribute:"see_also", value:"https://www.debian.org/security/2018/dsa-4273");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3756-1/");
  script_set_attribute(attribute:"see_also", value:"https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf");
  script_set_attribute(attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html");
  script_set_attribute(attribute:"see_also", value:"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004");
  script_set_attribute(attribute:"see_also", value:"https://usn.ubuntu.com/3777-3/");
  # https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?23319717");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:3425");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:3424");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:3423");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:3407");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:3402");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:3401");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:3400");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:3399");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:3398");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:3397");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:3396");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2948");
  script_set_attribute(attribute:"see_also", value:"http://www.securitytracker.com/id/1042004");
  # https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?148b2157");
  # https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?799b2d05");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2019:0148");
  script_set_attribute(attribute:"see_also", value:"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf");
  script_set_attribute(attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html");
  script_set_attribute(attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html");
  script_set_attribute(attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html");
  script_set_attribute(attribute:"see_also", value:"https://nvidia.custhelp.com/app/answers/detail/a_id/4787");
  # https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c34fd747");
  script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2019:1046");
  # http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9073d091");
  # http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ccb7a56c");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2019/Jun/36");
  script_set_attribute(attribute:"see_also", value:"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf");
  script_set_attribute(attribute:"see_also", value:"http://www.openwall.com/lists/oss-security/2020/06/10/1");
  script_set_attribute(attribute:"see_also", value:"http://www.openwall.com/lists/oss-security/2020/06/10/2");
  script_set_attribute(attribute:"see_also", value:"http://www.openwall.com/lists/oss-security/2020/06/10/5");
  script_set_attribute(attribute:"see_also", value:"https://www.oracle.com/security-alerts/cpujul2020.html");
  # http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d5299d44");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-3639");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(203);

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/05/22");
  script_set_attribute(attribute:"patch_publication_date", value:"2018/05/22");
  script_set_attribute(attribute:"plugin_publication_date", value:"2022/02/07");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:simatic_et_200_sp_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:simatic_s7-1500_firmware");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Siemens");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Siemens');

var asset = tenable_ot::assets::get(vendor:'Siemens');

var vuln_cpes = {
    "cpe:/o:siemens:simatic_et_200_sp_firmware" :
        {"versionEndExcluding" : "2.6", "family" : "ET200"},
    "cpe:/o:siemens:simatic_s7-1500_firmware" :
        {"versionEndExcluding" : "2.6", "family" : "S71500"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_NOTE);
VendorProductVersionCPE
siemenssimatic_s7-1500_firmwarecpe:/o:siemens:simatic_s7-1500_firmware
siemenssimatic_et_200_sp_firmwarecpe:/o:siemens:simatic_et_200_sp_firmware

References