ID

VAR-201507-0039


CVE

CVE-2015-5374


TITLE

Siemens SIPROTEC 4 Denial of service vulnerability

Trust: 1.0

sources: IVD: 78fdecc2-a9af-4a66-b218-01a620b751d5 // IVD: 820a6b4c-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-04733

DESCRIPTION

A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02. Specially crafted packets sent to port 50000/UDP could cause a denial-of-service of the affected device. A manual reboot may be required to recover the service of the device. Siemens SIPROTEC 4 and SIPROTEC Compact Device EN100 Module firmware has a service disruption (DoS) There are vulnerabilities that are put into a state. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlBy a third party UDP port 50000 Denial of service via the above crafted packets (DoS) There is a possibility of being put into a state. The SIPROTEC 4 and SIPROTEC devices offer a wide range of integrated protection, control, measurement and power substation automation functions; the EN100 module is used for IEC 61850 communication. The EN100 module for multiple Siemens SIPROTEC products are prone to a denial-of-service vulnerability. Remote attackers may exploit this issue to cause denial-of-service conditions, denying service to legitimate users. Both Siemens SIPROTEC 4 and SIPROTEC Compact are products of Siemens, Germany. Siemens SIPROTEC 4 is a series of multifunctional relays with a friendly man-machine interface. SIPROTEC Compact is a microcomputer protection device. EN100 is one of the multi-format encoder modules

Trust: 2.97

sources: NVD: CVE-2015-5374 // JVNDB: JVNDB-2015-003890 // CNVD: CNVD-2015-04733 // BID: 75948 // IVD: 78fdecc2-a9af-4a66-b218-01a620b751d5 // IVD: 820a6b4c-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-83335 // VULMON: CVE-2015-5374

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.4

sources: IVD: 78fdecc2-a9af-4a66-b218-01a620b751d5 // IVD: 820a6b4c-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-04733

AFFECTED PRODUCTS

vendor:siemensmodel:siprotecscope:eqversion:4.24

Trust: 1.6

vendor:siemensmodel:siprotec 4scope: - version: -

Trust: 0.8

vendor:siemensmodel:siprotec compactscope: - version: -

Trust: 0.8

vendor:siemensmodel:siprotecscope:ltversion:4.25

Trust: 0.8

vendor:siemensmodel:siprotecscope:ltversion:v4.24

Trust: 0.6

vendor:siprotecmodel: - scope:eqversion:4.24

Trust: 0.4

vendor:siemensmodel:siprotec compactscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:siprotec 7ut686scope:eqversion:0

Trust: 0.3

vendor:siemensmodel:siprotec 7sj686scope:eqversion:0

Trust: 0.3

vendor:siemensmodel:siprotec 7sj66scope:eqversion:0

Trust: 0.3

vendor:siemensmodel:siprotec 7sd686scope:eqversion:0

Trust: 0.3

vendor:siemensmodel:siprotecscope:eqversion:40

Trust: 0.3

vendor:siemensmodel:profinet ioscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:modbus tcpscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:iecscope:eqversion:1040

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.9

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.8

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.7

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.6

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.5

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.4

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.3

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.24

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.23

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.22

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.21

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.20

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.2

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.19

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.18

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.17

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.16

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.15

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.14

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.13

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.12

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.11

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.10

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.1

Trust: 0.3

vendor:siemensmodel:en100scope:eqversion:4.0

Trust: 0.3

vendor:siemensmodel:dnp3 tcpscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:profinet ioscope:neversion:1.4.1

Trust: 0.3

vendor:siemensmodel:en100scope:neversion:4.25

Trust: 0.3

sources: IVD: 78fdecc2-a9af-4a66-b218-01a620b751d5 // IVD: 820a6b4c-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-04733 // BID: 75948 // JVNDB: JVNDB-2015-003890 // CNNVD: CNNVD-201507-644 // NVD: CVE-2015-5374

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-5374
value: HIGH

Trust: 1.0

NVD: CVE-2015-5374
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-04733
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201507-644
value: HIGH

Trust: 0.6

IVD: 78fdecc2-a9af-4a66-b218-01a620b751d5
value: HIGH

Trust: 0.2

IVD: 820a6b4c-2351-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

VULHUB: VHN-83335
value: HIGH

Trust: 0.1

VULMON: CVE-2015-5374
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-5374
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2015-04733
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 78fdecc2-a9af-4a66-b218-01a620b751d5
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 820a6b4c-2351-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-83335
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: IVD: 78fdecc2-a9af-4a66-b218-01a620b751d5 // IVD: 820a6b4c-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-04733 // VULHUB: VHN-83335 // VULMON: CVE-2015-5374 // JVNDB: JVNDB-2015-003890 // CNNVD: CNNVD-201507-644 // NVD: CVE-2015-5374

PROBLEMTYPE DATA

problemtype:CWE-19

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-83335 // JVNDB: JVNDB-2015-003890 // NVD: CVE-2015-5374

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201507-644

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201507-644

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-003890

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-83335 // VULMON: CVE-2015-5374

PATCH

title:SSA-73254url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-732541.pdf

Trust: 0.8

title:SIPROTEC 4 denial of service vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/61054

Trust: 0.6

title:Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Fixes for module denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=160157

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2017/06/12/industroyer_malware/

Trust: 0.2

title:IDPSurl:https://github.com/g4xyk00/IDPS

Trust: 0.1

title:CVE-2015-5374-DoS-PoCurl:https://github.com/can/CVE-2015-5374-DoS-PoC

Trust: 0.1

title: - url:https://github.com/khulnasoft-labs/awesome-security

Trust: 0.1

title:welivesecurityurl:https://www.welivesecurity.com/2017/06/12/industroyer-biggest-threat-industrial-control-systems-since-stuxnet/

Trust: 0.1

sources: CNVD: CNVD-2015-04733 // VULMON: CVE-2015-5374 // JVNDB: JVNDB-2015-003890 // CNNVD: CNNVD-201507-644

EXTERNAL IDS

db:NVDid:CVE-2015-5374

Trust: 3.9

db:ICS CERTid:ICSA-17-187-03

Trust: 2.3

db:ICS CERTid:ICSA-15-202-01

Trust: 2.3

db:SIEMENSid:SSA-732541

Trust: 2.1

db:BIDid:75948

Trust: 2.1

db:EXPLOIT-DBid:44103

Trust: 1.2

db:SIEMENSid:SSA-323211

Trust: 1.2

db:CNNVDid:CNNVD-201507-644

Trust: 1.1

db:CNVDid:CNVD-2015-04733

Trust: 1.0

db:JVNDBid:JVNDB-2015-003890

Trust: 0.8

db:CXSECURITYid:WLB-2018020218

Trust: 0.6

db:IVDid:78FDECC2-A9AF-4A66-B218-01A620B751D5

Trust: 0.2

db:IVDid:820A6B4C-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:146427

Trust: 0.1

db:SEEBUGid:SSVID-89506

Trust: 0.1

db:VULHUBid:VHN-83335

Trust: 0.1

db:VULMONid:CVE-2015-5374

Trust: 0.1

sources: IVD: 78fdecc2-a9af-4a66-b218-01a620b751d5 // IVD: 820a6b4c-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-04733 // VULHUB: VHN-83335 // VULMON: CVE-2015-5374 // BID: 75948 // JVNDB: JVNDB-2015-003890 // CNNVD: CNNVD-201507-644 // NVD: CVE-2015-5374

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-15-202-01

Trust: 2.4

url:https://ics-cert.us-cert.gov/advisories/icsa-17-187-03

Trust: 2.3

url:http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-732541.pdf

Trust: 2.1

url:https://www.exploit-db.com/exploits/44103/

Trust: 1.3

url:http://www.securityfocus.com/bid/75948

Trust: 1.2

url:https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-323211.pdf

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5374

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5374

Trust: 0.8

url:https://cxsecurity.com/issue/wlb-2018020218

Trust: 0.6

url:http://w3.siemens.com/smartgrid/global/en/products-systems-solutions/protection/siprotec4/pages/overview.aspx

Trust: 0.3

url:http://w3.siemens.com/smartgrid/global/en/products-systems-solutions/protection/siprotec-compact/pages/overview.aspx

Trust: 0.3

url:http://www.siemens.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/19.html

Trust: 0.1

url:https://github.com/g4xyk00/idps

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=40100

Trust: 0.1

sources: CNVD: CNVD-2015-04733 // VULHUB: VHN-83335 // VULMON: CVE-2015-5374 // BID: 75948 // JVNDB: JVNDB-2015-003890 // CNNVD: CNNVD-201507-644 // NVD: CVE-2015-5374

CREDITS

M. Can Kurnaz

Trust: 0.6

sources: CNNVD: CNNVD-201507-644

SOURCES

db:IVDid:78fdecc2-a9af-4a66-b218-01a620b751d5
db:IVDid:820a6b4c-2351-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2015-04733
db:VULHUBid:VHN-83335
db:VULMONid:CVE-2015-5374
db:BIDid:75948
db:JVNDBid:JVNDB-2015-003890
db:CNNVDid:CNNVD-201507-644
db:NVDid:CVE-2015-5374

LAST UPDATE DATE

2024-08-14T14:06:05.602000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-04733date:2015-07-25T00:00:00
db:VULHUBid:VHN-83335date:2018-03-23T00:00:00
db:VULMONid:CVE-2015-5374date:2018-03-23T00:00:00
db:BIDid:75948date:2017-07-11T12:06:00
db:JVNDBid:JVNDB-2015-003890date:2017-09-11T00:00:00
db:CNNVDid:CNNVD-201507-644date:2021-08-18T00:00:00
db:NVDid:CVE-2015-5374date:2018-03-23T01:29:00.273

SOURCES RELEASE DATE

db:IVDid:78fdecc2-a9af-4a66-b218-01a620b751d5date:2015-07-23T00:00:00
db:IVDid:820a6b4c-2351-11e6-abef-000c29c66e3ddate:2015-07-23T00:00:00
db:CNVDid:CNVD-2015-04733date:2015-07-23T00:00:00
db:VULHUBid:VHN-83335date:2015-07-18T00:00:00
db:VULMONid:CVE-2015-5374date:2015-07-18T00:00:00
db:BIDid:75948date:2015-07-17T00:00:00
db:JVNDBid:JVNDB-2015-003890date:2015-07-23T00:00:00
db:CNNVDid:CNNVD-201507-644date:2015-07-20T00:00:00
db:NVDid:CVE-2015-5374date:2015-07-18T10:59:04.117