ID

VAR-201604-0096


CVE

CVE-2016-3963


TITLE

Siemens SCALANCE S613 Denial of service vulnerability

Trust: 1.4

sources: IVD: 5a4006c6-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-02146 // CNNVD: CNNVD-201604-137

DESCRIPTION

Siemens SCALANCE S613 allows remote attackers to cause a denial of service (web-server outage) via traffic to TCP port 443. The SCALANCES firewall is a network security product. There is a denial of service vulnerability in Siemens SCALANCE S613. Successfully exploiting this issue allows an attacker to reboot the affected device, denying service to legitimate users. A security hole exists in Siemens SCALANCE S613

Trust: 2.7

sources: NVD: CVE-2016-3963 // JVNDB: JVNDB-2016-001991 // CNVD: CNVD-2016-02146 // BID: 85983 // IVD: 5a4006c6-2351-11e6-abef-000c29c66e3d // VULHUB: VHN-92782

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 5a4006c6-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-02146

AFFECTED PRODUCTS

vendor:siemensmodel:scalance s613scope: - version: -

Trust: 2.0

vendor:siemensmodel:scalance s613scope:eqversion:*

Trust: 1.0

vendor:scalance s613model: - scope:eqversion:*

Trust: 0.2

sources: IVD: 5a4006c6-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-02146 // JVNDB: JVNDB-2016-001991 // CNNVD: CNNVD-201604-137 // NVD: CVE-2016-3963

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-3963
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-3963
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-02146
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201604-137
value: MEDIUM

Trust: 0.6

IVD: 5a4006c6-2351-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

VULHUB: VHN-92782
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-3963
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-02146
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 5a4006c6-2351-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-92782
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-3963
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.8

sources: IVD: 5a4006c6-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-02146 // VULHUB: VHN-92782 // JVNDB: JVNDB-2016-001991 // CNNVD: CNNVD-201604-137 // NVD: CVE-2016-3963

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2016-001991 // NVD: CVE-2016-3963

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201604-137

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201604-137

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001991

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-92782

PATCH

title:SSA-751155url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-751155.pdf

Trust: 0.8

title:Siemens SCALANCE S613 Patch for Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/73911

Trust: 0.6

title:Siemens SCALANCE S613 Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60862

Trust: 0.6

sources: CNVD: CNVD-2016-02146 // JVNDB: JVNDB-2016-001991 // CNNVD: CNNVD-201604-137

EXTERNAL IDS

db:NVDid:CVE-2016-3963

Trust: 3.6

db:SIEMENSid:SSA-751155

Trust: 2.3

db:ICS CERTid:ICSA-16-103-02

Trust: 1.9

db:EXPLOIT-DBid:44721

Trust: 1.1

db:CNNVDid:CNNVD-201604-137

Trust: 0.9

db:CNVDid:CNVD-2016-02146

Trust: 0.8

db:JVNDBid:JVNDB-2016-001991

Trust: 0.8

db:BIDid:85983

Trust: 0.4

db:IVDid:5A4006C6-2351-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:147853

Trust: 0.1

db:VULHUBid:VHN-92782

Trust: 0.1

sources: IVD: 5a4006c6-2351-11e6-abef-000c29c66e3d // CNVD: CNVD-2016-02146 // VULHUB: VHN-92782 // BID: 85983 // JVNDB: JVNDB-2016-001991 // CNNVD: CNNVD-201604-137 // NVD: CVE-2016-3963

REFERENCES

url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-751155.pdf

Trust: 2.3

url:https://ics-cert.us-cert.gov/advisories/icsa-16-103-02

Trust: 1.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-3963

Trust: 1.4

url:https://www.exploit-db.com/exploits/44721/

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-3963

Trust: 0.8

url:http://www.automation.siemens.com/mcms/industrial-communication/en/ie/ie_switches_media-converters/pages/ie_switches_media-converters.aspx

Trust: 0.3

url:http://subscriber.communications.siemens.com/

Trust: 0.3

sources: CNVD: CNVD-2016-02146 // VULHUB: VHN-92782 // BID: 85983 // JVNDB: JVNDB-2016-001991 // CNNVD: CNNVD-201604-137 // NVD: CVE-2016-3963

CREDITS

The vendor reported the issue.

Trust: 0.3

sources: BID: 85983

SOURCES

db:IVDid:5a4006c6-2351-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2016-02146
db:VULHUBid:VHN-92782
db:BIDid:85983
db:JVNDBid:JVNDB-2016-001991
db:CNNVDid:CNNVD-201604-137
db:NVDid:CVE-2016-3963

LAST UPDATE DATE

2024-11-23T21:54:38.378000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-02146date:2016-04-12T00:00:00
db:VULHUBid:VHN-92782date:2018-05-26T00:00:00
db:BIDid:85983date:2016-07-05T22:06:00
db:JVNDBid:JVNDB-2016-001991date:2016-05-31T00:00:00
db:CNNVDid:CNNVD-201604-137date:2016-04-11T00:00:00
db:NVDid:CVE-2016-3963date:2024-11-21T02:51:02.973

SOURCES RELEASE DATE

db:IVDid:5a4006c6-2351-11e6-abef-000c29c66e3ddate:2016-04-12T00:00:00
db:CNVDid:CNVD-2016-02146date:2016-04-12T00:00:00
db:VULHUBid:VHN-92782date:2016-04-08T00:00:00
db:BIDid:85983date:2016-04-08T00:00:00
db:JVNDBid:JVNDB-2016-001991date:2016-04-12T00:00:00
db:CNNVDid:CNNVD-201604-137date:2016-04-11T00:00:00
db:NVDid:CVE-2016-3963date:2016-04-08T15:59:08.183