Lucene search

K
nvd[email protected]NVD:CVE-2018-4843
HistoryMar 20, 2018 - 2:29 p.m.

CVE-2018-4843

2018-03-2014:29:00
CWE-20
web.nvd.nist.gov
4

CVSS2

6.1

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

CVSS3

6.5

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

25.6%

A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIMATIC ET 200pro IM154-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8F PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8FX PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V1.7.0), SIMATIC S7-1500 Software Controller (All versions < V1.7.0), SIMATIC S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIMATIC S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317TF-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319F-3 PN/DP (All versions < V3.2.16), SIMATIC S7-400 CPU 412-2 PN V7 (All versions < V7.0.3), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.9), SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.7), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions < V8.1), SIMATIC WinAC RTX 2010 (All versions < V2010 SP3), SIMATIC WinAC RTX F 2010 (All versions < V2010 SP3), SINUMERIK 828D (All versions < V4.7 SP6 HF1), SIPLUS ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIPLUS ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIPLUS S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), Softnet PROFINET IO for PC-based Windows systems (All versions). Responding to a PROFINET DCP request with a specially crafted PROFINET DCP packet could cause a denial of service condition of the requesting system.

The security vulnerability could be exploited by an attacker located on the same Ethernet segment (OSI Layer 2) as the targeted device. A manual restart is required to recover the system.

Affected configurations

Nvd
Node
siemenssimatic_cp_343-1_firmwareMatch-advanced
AND
siemenssimatic_cp_343-1Match-advanced
Node
siemenssimatic_cp_343-1_firmwareMatch-standard
AND
siemenssimatic_cp_343-1Match-standard
Node
siemenssimatic_cp_443-1_firmwareMatch-advanced
AND
siemenssimatic_cp_443-1Match-advanced
Node
siemenssimatic_cp_443-1_firmwareMatch-standard
AND
siemenssimatic_cp_443-1Match-standard
Node
siemenssimatic_s7-1500_firmwareRange<1.7.0
AND
siemenssimatic_s7-1500Match-
Node
siemenssimatic_s7-300_firmwareMatch-
AND
siemenssimatic_s7-300Match-
Node
siemenssimatic_s7-400_h_v6_firmwareMatch-
AND
siemenssimatic_s7-400_h_v6Match-
Node
siemenssimatic_s7-400_pn\/dp_v6_firmwareRange<6.0.7
AND
siemenssimatic_s7-400_pn\/dp_v6Match-
Node
siemenssimatic_s7-400_pn\/dp_v7_firmwareMatch-
AND
siemenssimatic_s7-400_pn\/dp_v7Match-
Node
siemenssimatic_s7-410_firmwareRange<8.1
AND
siemenssimatic_s7-410Match-
Node
siemenssimatic_winac_rtx_2010_firmwareMatch-
AND
siemenssimatic_winac_rtx_2010Match-
Node
siemenssinumerik_828d_firmwareMatch-
AND
siemenssinumerik_828dMatch-
Node
siemenssoftnet_pn-io_linux_firmwareMatch-windows
AND
siemenssoftnet_pn-io_linuxMatch-
VendorProductVersionCPE
siemenssimatic_cp_343-1_firmware-cpe:2.3:o:siemens:simatic_cp_343-1_firmware:-:*:*:*:advanced:*:*:*
siemenssimatic_cp_343-1-cpe:2.3:h:siemens:simatic_cp_343-1:-:*:*:*:advanced:*:*:*
siemenssimatic_cp_343-1_firmware-cpe:2.3:o:siemens:simatic_cp_343-1_firmware:-:*:*:*:standard:*:*:*
siemenssimatic_cp_343-1-cpe:2.3:h:siemens:simatic_cp_343-1:-:*:*:*:standard:*:*:*
siemenssimatic_cp_443-1_firmware-cpe:2.3:o:siemens:simatic_cp_443-1_firmware:-:*:*:*:advanced:*:*:*
siemenssimatic_cp_443-1-cpe:2.3:h:siemens:simatic_cp_443-1:-:*:*:*:advanced:*:*:*
siemenssimatic_cp_443-1_firmware-cpe:2.3:o:siemens:simatic_cp_443-1_firmware:-:*:*:*:standard:*:*:*
siemenssimatic_cp_443-1-cpe:2.3:h:siemens:simatic_cp_443-1:-:*:*:*:standard:*:*:*
siemenssimatic_s7-1500_firmware*cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*
siemenssimatic_s7-1500-cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 261

CVSS2

6.1

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

CVSS3

6.5

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

25.6%

Related for NVD:CVE-2018-4843