var-201705-3973
Vulnerability from variot
A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC Automation Tool (All versions < V3.0), SIMATIC NET PC-Software (All versions < V14 SP1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1), SIMATIC STEP 7 V5.X (All versions < V5.6), SIMATIC WinAC RTX 2010 SP2 (All versions), SIMATIC WinAC RTX F 2010 SP2 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1), SIMATIC WinCC V7.2 and prior (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Update 15), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd1), SIMATIC WinCC flexible 2008 (All versions < flexible 2008 SP5), SINAUT ST7CC (All versions installed in conjunction with SIMATIC WinCC < V7.3 Update 15), SINEMA Server (All versions < V14), SINUMERIK 808D Programming Tool (All versions < V4.7 SP4 HF2), SMART PC Access (All versions < V2.3), STEP 7 - Micro/WIN SMART (All versions < V2.3), Security Configuration Tool (SCT) (All versions < V5.0). Specially crafted PROFINET DCP broadcast packets sent to the affected products on a local Ethernet segment (Layer 2) could cause a Denial-of-Service condition of some services. The services require manual restart to recover. SIMATIC WinCC (TIA Portal), SIMATIC STEP 7, SMART PC Access, SIMATIC Automation Tool, etc. are all industrial automation products from Siemens AG. A number of Siemens industrial products have a denial of service vulnerability. Attackers can exploit this issue to crash the affected device, denying service to legitimate users. Siemens SIMATIC WinCC, etc. Siemens SIMATIC WinCC is an automated data acquisition and monitoring (SCADA) system; SIMATIC PCS 7 is a distributed process control system using WinCC
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201705-3973", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "smart pc access", "scope": "eq", "trust": 2.5, "vendor": "siemens", "version": "2.0" }, { "model": "simatic wincc", "scope": null, "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "sinema server", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "simatic wincc", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "simatic step 7 micro\\/win smart", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "sinumerik 808d programming tool", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "simatic wincc flexible 2008", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "sinaut st7cc", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "simatic wincc \\", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "13.0" }, { "model": "simatic winac rtx 2010", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": null }, { "model": "simatic wincc \\", "scope": "eq", "trust": 1.6, "vendor": "siemens", "version": "14.0" }, { "model": "simatic automation tool", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sinaut st7cc", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "sinumerik 808d programming tool", "scope": null, "trust": 1.4, "vendor": "siemens", "version": null }, { "model": "simatic step 7 \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "13.0" }, { "model": "simatic automation tool", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic step 7 \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "14.0" }, { "model": "simatic winac rtx f 2010", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic net pc-software", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic step 7 \\", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "5.0" }, { "model": "pcs 7", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "primary setup tool", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "security configuration tool", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic wincc flexible", "scope": "eq", "trust": 0.9, "vendor": "siemens", "version": "2008" }, { "model": "simatic wincc", "scope": "eq", "trust": 0.9, "vendor": "siemens", "version": "0" }, { "model": "primary setup tool", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "security configuration tool", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic net pc software", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic pcs 7", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic step 7", "scope": "eq", "trust": 0.8, "vendor": "siemens", "version": "v5.x" }, { "model": "simatic step 7", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic winac rtx 2010", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic winac rtx f 2010", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic wincc flexible 2008", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "sinema server", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "smart pc access", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "step 7 - micro/win smart", "scope": null, "trust": 0.8, "vendor": "siemens", "version": null }, { "model": "simatic step", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "75.x" }, { "model": "simatic winac rtx sp2 all", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "2010" }, { "model": "simatic winac rtx f sp2 all", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "2010" }, { "model": "security configuration tool all", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "primary setup tool all", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "simatic pcs", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "7" }, { "model": "simatic wincc professional sp2", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v13" }, { "model": "simatic wincc professional sp1", "scope": "lt", "trust": 0.6, "vendor": "siemens", "version": "v14" }, { "model": "simatic step sp2", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "7\u003cv13" }, { "model": "simatic step sp1", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "7\u003cv14" }, { "model": "step micro win smart", "scope": "eq", "trust": 0.6, "vendor": "siemens", "version": "7-/" }, { "model": "simatic net pc-software", "scope": null, "trust": 0.6, "vendor": "siemens", "version": null }, { "model": "sinumerik 808d programming tool", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sinema server sp2", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "13" }, { "model": "sinema server sp1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "12.0" }, { "model": "sinema server", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "12.0-" }, { "model": "sinema server", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "sinaut st7cc", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic wincc flexible sp3 up7", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2008" }, { "model": "simatic wincc flexible sp2", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2008" }, { "model": "simatic wincc flexible sp1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2008" }, { "model": "simatic wincc basic", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "14" }, { "model": "simatic wincc sp1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "v13" }, { "model": "simatic wincc", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "v13" }, { "model": "simatic winac rtx f sp2", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2010" }, { "model": "simatic winac rtx sp2", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2010" }, { "model": "simatic step tia portal", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7v14" }, { "model": "simatic step tia portal sp1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7v13" }, { "model": "simatic step tia portal", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "7v13" }, { "model": "simatic step sp4 hf4", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "75.5" }, { "model": "simatic step sp4", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "75.5" }, { "model": "simatic step sp3 hf10", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "75.5" }, { "model": "simatic step sp3", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "75.5" }, { "model": "simatic step sp2 hf7", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "75.5" }, { "model": "simatic step sp2", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "75.5" }, { "model": "simatic step sp1 hf2", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "75.5" }, { "model": "simatic step sp1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "75.5" }, { "model": "simatic pcs sp4", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "77.1" }, { "model": "simatic pcs", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "77.1" }, { "model": "simatic pcs", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "77" }, { "model": "simatic net pc-software", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "14" }, { "model": "simatic net pc-software sp2", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "13" }, { "model": "simatic net pc-software hf1", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "13" }, { "model": "simatic net pc-software", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "13" }, { "model": "simatic net pc-software sp2 hf3", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "12" }, { "model": "simatic net pc-software", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "12" }, { "model": "simatic automation tool", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1.0.2" }, { "model": "simatic automation tool", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1.0" }, { "model": "security configuration tool", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "primary setup tool", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "micro/win", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic wincc sp1", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "14" }, { "model": "simatic wincc sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "13" }, { "model": "simatic step tia portal sp1", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "714" }, { "model": "simatic step tia portal sp2", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "713" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "pcs 7", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "primary setup tool", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "security configuration tool", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic automation tool", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic net pc", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic step 7 tia portal", "version": "5.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic step 7 tia portal", "version": "13.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic step 7 tia portal", "version": "14.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic step 7 micro win smart", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic winac rtx 2010", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic winac rtx f 2010", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic wincc", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic wincc tia portal", "version": "13.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic wincc tia portal", "version": "14.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "simatic wincc flexible 2008", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinaut st7cc", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinema server", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "sinumerik 808d programming tool", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "smart pc access", "version": "2.0" } ], "sources": [ { "db": "IVD", "id": "1b7b75ad-c1f6-4e73-be28-ff3e458e7677" }, { "db": "CNVD", "id": "CNVD-2017-06152" }, { "db": "BID", "id": "98366" }, { "db": "JVNDB", "id": "JVNDB-2017-004136" }, { "db": "NVD", "id": "CVE-2017-6865" }, { "db": "CNNVD", "id": "CNNVD-201703-632" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc_flexible_2008:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_net_pc-software:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:pcs_7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_step_7_\\(tia_portal\\):14.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):13.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:security_configuration_tool:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:primary_setup_tool:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_step_7_\\(tia_portal\\):5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_step_7_\\(tia_portal\\):13.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_winac_rtx_2010:-:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:sinaut_st7cc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:sinema_server:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:smart_pc_access:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_step_7_micro\\/win_smart:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:sinumerik_808d_programming_tool:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_winac_rtx_f_2010:-:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_automation_tool:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):14.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-6865" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Duan JinTong, Ma ShaoShuai, and Cheng Lei from NSFOCUS Security Team.", "sources": [ { "db": "BID", "id": "98366" } ], "trust": 0.3 }, "cve": "CVE-2017-6865", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-6865", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2017-06152", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "1b7b75ad-c1f6-4e73-be28-ff3e458e7677", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-115068", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-6865", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-6865", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2017-06152", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201703-632", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "1b7b75ad-c1f6-4e73-be28-ff3e458e7677", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-115068", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "1b7b75ad-c1f6-4e73-be28-ff3e458e7677" }, { "db": "CNVD", "id": "CNVD-2017-06152" }, { "db": "VULHUB", "id": "VHN-115068" }, { "db": "JVNDB", "id": "JVNDB-2017-004136" }, { "db": "NVD", "id": "CVE-2017-6865" }, { "db": "CNNVD", "id": "CNNVD-201703-632" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability has been identified in Primary Setup Tool (PST) (All versions \u003c V4.2 HF1), SIMATIC Automation Tool (All versions \u003c V3.0), SIMATIC NET PC-Software (All versions \u003c V14 SP1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions \u003c V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions \u003c V13 SP2), SIMATIC STEP 7 (TIA Portal) V14 (All versions \u003c V14 SP1), SIMATIC STEP 7 V5.X (All versions \u003c V5.6), SIMATIC WinAC RTX 2010 SP2 (All versions), SIMATIC WinAC RTX F 2010 SP2 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions \u003c V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions \u003c V14 SP1), SIMATIC WinCC V7.2 and prior (All versions), SIMATIC WinCC V7.3 (All versions \u003c V7.3 Update 15), SIMATIC WinCC V7.4 (All versions \u003c V7.4 SP1 Upd1), SIMATIC WinCC flexible 2008 (All versions \u003c flexible 2008 SP5), SINAUT ST7CC (All versions installed in conjunction with SIMATIC WinCC \u003c V7.3 Update 15), SINEMA Server (All versions \u003c V14), SINUMERIK 808D Programming Tool (All versions \u003c V4.7 SP4 HF2), SMART PC Access (All versions \u003c V2.3), STEP 7 - Micro/WIN SMART (All versions \u003c V2.3), Security Configuration Tool (SCT) (All versions \u003c V5.0). Specially crafted PROFINET DCP broadcast packets sent to the affected products on a local Ethernet segment (Layer 2) could cause a Denial-of-Service condition of some services. The services require manual restart to recover. SIMATIC WinCC (TIA Portal), SIMATIC STEP 7, SMART PC Access, SIMATIC Automation Tool, etc. are all industrial automation products from Siemens AG. A number of Siemens industrial products have a denial of service vulnerability. \nAttackers can exploit this issue to crash the affected device, denying service to legitimate users. Siemens SIMATIC WinCC, etc. Siemens SIMATIC WinCC is an automated data acquisition and monitoring (SCADA) system; SIMATIC PCS 7 is a distributed process control system using WinCC", "sources": [ { "db": "NVD", "id": "CVE-2017-6865" }, { "db": "JVNDB", "id": "JVNDB-2017-004136" }, { "db": "CNVD", "id": "CNVD-2017-06152" }, { "db": "BID", "id": "98366" }, { "db": "IVD", "id": "1b7b75ad-c1f6-4e73-be28-ff3e458e7677" }, { "db": "VULHUB", "id": "VHN-115068" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6865", "trust": 3.6 }, { "db": "BID", "id": "98366", "trust": 2.0 }, { "db": "SIEMENS", "id": "SSA-275839", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-17-129-01", "trust": 1.1 }, { "db": "CNNVD", "id": "CNNVD-201703-632", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2017-06152", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-004136", "trust": 0.8 }, { "db": "IVD", "id": "1B7B75AD-C1F6-4E73-BE28-FF3E458E7677", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-115068", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "1b7b75ad-c1f6-4e73-be28-ff3e458e7677" }, { "db": "CNVD", "id": "CNVD-2017-06152" }, { "db": "VULHUB", "id": "VHN-115068" }, { "db": "BID", "id": "98366" }, { "db": "JVNDB", "id": "JVNDB-2017-004136" }, { "db": "NVD", "id": "CVE-2017-6865" }, { "db": "CNNVD", "id": "CNNVD-201703-632" } ] }, "id": "VAR-201705-3973", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "1b7b75ad-c1f6-4e73-be28-ff3e458e7677" }, { "db": "CNVD", "id": "CNVD-2017-06152" }, { "db": "VULHUB", "id": "VHN-115068" } ], "trust": 1.5864798616 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "1b7b75ad-c1f6-4e73-be28-ff3e458e7677" }, { "db": "CNVD", "id": "CNVD-2017-06152" } ] }, "last_update_date": "2023-12-18T12:44:33.034000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SSA-275839", "trust": 0.8, "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-275839.pdf" }, { "title": "There are patches for denial of service vulnerabilities in many Siemens products", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/93344" }, { "title": "Multiple Siemens Fixes for product input validation vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=90621" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-06152" }, { "db": "JVNDB", "id": "JVNDB-2017-004136" }, { "db": "CNNVD", "id": "CNNVD-201703-632" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-115068" }, { "db": "JVNDB", "id": "JVNDB-2017-004136" }, { "db": "NVD", "id": "CVE-2017-6865" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://www.securityfocus.com/bid/98366" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-275839.pdf" }, { "trust": 1.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-129-01" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6865" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6865" }, { "trust": 0.6, "url": "http://www.siemens.com/cert/en/cert-security-advisories.htm" }, { "trust": 0.3, "url": "http://www.siemens.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-06152" }, { "db": "VULHUB", "id": "VHN-115068" }, { "db": "BID", "id": "98366" }, { "db": "JVNDB", "id": "JVNDB-2017-004136" }, { "db": "NVD", "id": "CVE-2017-6865" }, { "db": "CNNVD", "id": "CNNVD-201703-632" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "1b7b75ad-c1f6-4e73-be28-ff3e458e7677" }, { "db": "CNVD", "id": "CNVD-2017-06152" }, { "db": "VULHUB", "id": "VHN-115068" }, { "db": "BID", "id": "98366" }, { "db": "JVNDB", "id": "JVNDB-2017-004136" }, { "db": "NVD", "id": "CVE-2017-6865" }, { "db": "CNNVD", "id": "CNNVD-201703-632" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-05-09T00:00:00", "db": "IVD", "id": "1b7b75ad-c1f6-4e73-be28-ff3e458e7677" }, { "date": "2017-05-09T00:00:00", "db": "CNVD", "id": "CNVD-2017-06152" }, { "date": "2017-05-11T00:00:00", "db": "VULHUB", "id": "VHN-115068" }, { "date": "2017-05-09T00:00:00", "db": "BID", "id": "98366" }, { "date": "2017-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004136" }, { "date": "2017-05-11T10:29:00.227000", "db": "NVD", "id": "CVE-2017-6865" }, { "date": "2017-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-632" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-05-09T00:00:00", "db": "CNVD", "id": "CNVD-2017-06152" }, { "date": "2019-03-21T00:00:00", "db": "VULHUB", "id": "VHN-115068" }, { "date": "2017-05-23T16:23:00", "db": "BID", "id": "98366" }, { "date": "2017-09-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-004136" }, { "date": "2019-03-21T16:29:00.407000", "db": "NVD", "id": "CVE-2017-6865" }, { "date": "2019-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-632" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-632" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Siemens Service disruption in products (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-004136" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation", "sources": [ { "db": "IVD", "id": "1b7b75ad-c1f6-4e73-be28-ff3e458e7677" }, { "db": "CNNVD", "id": "CNNVD-201703-632" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.