Lucene search

K
nvd[email protected]NVD:CVE-2019-6575
HistoryApr 17, 2019 - 2:29 p.m.

CVE-2019-6575

2019-04-1714:29:03
CWE-248
CWE-755
web.nvd.nist.gov
6

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.002

Percentile

58.8%

A vulnerability has been identified in SIMATIC CP 443-1 OPC UA (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V2.7), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (incl. SIPLUS variants) (All versions < V15.1 Upd 4), SIMATIC HMI Comfort Panels 4" - 22" (incl. SIPLUS variants) (All versions < V15.1 Upd 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15.1 Upd 4), SIMATIC IPC DiagMonitor (All versions < V5.1.3), SIMATIC NET PC Software V13 (All versions), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC RF188C (All versions < V1.1.0), SIMATIC RF600R family (All versions < V3.2.1), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.5 < V2.6.1), SIMATIC S7-1500 Software Controller (All versions between V2.5 (including) and V2.7 (excluding)), SIMATIC WinCC OA (All versions < V3.15 P018), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Upd 4), SINEC NMS (All versions < V1.0 SP1), SINEMA Server (All versions < V14 SP2), SINUMERIK OPC UA Server (All versions < V2.1), TeleControl Server Basic (All versions < V3.1.1). Specially crafted network packets sent to affected devices on port 4840/tcp could allow an unauthenticated remote attacker to cause a denial of service condition of the OPC communication or crash the device. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the OPC communication.

Affected configurations

Nvd
Node
siemenssimatic_cp443-1_opc_ua_firmware
AND
siemenssimatic_cp443-1_opc_uaMatch-
Node
siemenssimatic_et_200_open_controller_cpu_1515sp_pc2_firmwareRange<2.7
AND
siemenssimatic_et_200_open_controller_cpu_1515sp_pc2Match-
Node
siemenssimatic_ipc_diagmonitor_firmware
AND
siemenssimatic_ipc_diagmonitorMatch-
Node
siemenssimatic_net_pc_software_firmware
AND
siemenssimatic_net_pc_softwareMatch-
Node
siemenssimatic_rf188c_firmware
AND
siemenssimatic_rf188cMatch-
Node
siemenssimatic_rf600r_firmware
AND
siemenssimatic_rf600rMatch-
Node
siemenssimatic_s7-1500_firmwareRange2.5
AND
siemenssimatic_s7-1500Match-
Node
siemensopc_unified_architecture
OR
siemenssimatic_s7-1500_software_controllerRange2.5
OR
siemenssimatic_wincc_oaRange<3.15-p018
OR
siemenssimatic_wincc_runtime_advanced
OR
siemenssimatic_wincc_runtime_comfort
OR
siemenssimatic_wincc_runtime_hsp_comfort
OR
siemenssimatic_wincc_runtime_mobile
OR
siemenssinec-nmsRange<1.0
OR
siemenssinec-nmsMatch1.0-
OR
siemenssinema_server
OR
siemenssinumerik_opc_ua_serverRange<2.1
OR
siemenstelecontrol_server_basicRange<3.1.1
Node
siemenssimatic_s7-1500f_firmwareRange2.5
AND
siemenssimatic_s7-1500fMatch-
Node
siemenssimatic_s7-1500s_firmwareRange2.5
AND
siemenssimatic_s7-1500sMatch-
Node
siemenssimatic_s7-1500t_firmwareRange2.5
AND
siemenssimatic_s7-1500tMatch-
Node
siemenssimatic_hmi_comfort_outdoor_panels_firmwareRange<15.1
OR
siemenssimatic_hmi_comfort_outdoor_panels_firmwareMatch15.1-
OR
siemenssimatic_hmi_comfort_outdoor_panels_firmwareMatch15.1upd_1
OR
siemenssimatic_hmi_comfort_outdoor_panels_firmwareMatch15.1upd_2
OR
siemenssimatic_hmi_comfort_outdoor_panels_firmwareMatch15.1upd_3
AND
siemenssimatic_hmi_comfort_outdoor_panelsMatch-
Node
siemenssimatic_hmi_ktp_mobile_panels_ktp400f_firmwareRange<15.1
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp400f_firmwareMatch15.1-
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp400f_firmwareMatch15.1upd_1
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp400f_firmwareMatch15.1upd_2
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp400f_firmwareMatch15.1upd_3
AND
siemenssimatic_hmi_ktp_mobile_panels_ktp400fMatch-
Node
siemenssimatic_hmi_ktp_mobile_panels_ktp900_firmwareRange<15.1
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp900_firmwareMatch15.1-
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp900_firmwareMatch15.1upd_1
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp900_firmwareMatch15.1upd_2
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp900_firmwareMatch15.1upd_3
AND
siemenssimatic_hmi_ktp_mobile_panels_ktp900Match-
Node
siemenssimatic_hmi_ktp_mobile_panels_ktp700f_firmwareRange<15.1
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp700f_firmwareMatch15.1-
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp700f_firmwareMatch15.1upd_1
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp700f_firmwareMatch15.1upd_2
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp700f_firmwareMatch15.1upd_3
AND
siemenssimatic_hmi_ktp_mobile_panels_ktp700fMatch-
Node
siemenssimatic_hmi_ktp_mobile_panels_ktp700_firmwareRange<15.1
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp700_firmwareMatch15.1-
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp700_firmwareMatch15.1upd_1
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp700_firmwareMatch15.1upd_2
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp700_firmwareMatch15.1upd_3
AND
siemenssimatic_hmi_ktp_mobile_panels_ktp700Match-
Node
siemenssimatic_hmi_ktp_mobile_panels_ktp900f_firmwareRange<15.1
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp900f_firmwareMatch15.1-
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp900f_firmwareMatch15.1upd_1
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp900f_firmwareMatch15.1upd_2
OR
siemenssimatic_hmi_ktp_mobile_panels_ktp900f_firmwareMatch15.1upd_3
AND
siemenssimatic_hmi_ktp_mobile_panels_ktp900fMatch-
VendorProductVersionCPE
siemenssimatic_cp443-1_opc_ua_firmware*cpe:2.3:o:siemens:simatic_cp443-1_opc_ua_firmware:*:*:*:*:*:*:*:*
siemenssimatic_cp443-1_opc_ua-cpe:2.3:h:siemens:simatic_cp443-1_opc_ua:-:*:*:*:*:*:*:*
siemenssimatic_et_200_open_controller_cpu_1515sp_pc2_firmware*cpe:2.3:o:siemens:simatic_et_200_open_controller_cpu_1515sp_pc2_firmware:*:*:*:*:*:*:*:*
siemenssimatic_et_200_open_controller_cpu_1515sp_pc2-cpe:2.3:h:siemens:simatic_et_200_open_controller_cpu_1515sp_pc2:-:*:*:*:*:*:*:*
siemenssimatic_ipc_diagmonitor_firmware*cpe:2.3:o:siemens:simatic_ipc_diagmonitor_firmware:*:*:*:*:*:*:*:*
siemenssimatic_ipc_diagmonitor-cpe:2.3:h:siemens:simatic_ipc_diagmonitor:-:*:*:*:*:*:*:*
siemenssimatic_net_pc_software_firmware*cpe:2.3:o:siemens:simatic_net_pc_software_firmware:*:*:*:*:*:*:*:*
siemenssimatic_net_pc_software-cpe:2.3:h:siemens:simatic_net_pc_software:-:*:*:*:*:*:*:*
siemenssimatic_rf188c_firmware*cpe:2.3:o:siemens:simatic_rf188c_firmware:*:*:*:*:*:*:*:*
siemenssimatic_rf188c-cpe:2.3:h:siemens:simatic_rf188c:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 681

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0.002

Percentile

58.8%

Related for NVD:CVE-2019-6575