ID

VAR-201703-0642


CVE

CVE-2017-2685


TITLE

Siemens SINUMERIK Integrate Operate Client In TLS Vulnerability to read session data

Trust: 0.8

sources: JVNDB: JVNDB-2017-002282

DESCRIPTION

Siemens SINUMERIK Integrate Operate Clients between 2.0.3.00.016 (including) and 2.0.6 (excluding) and between 3.0.4.00.032 (including) and 3.0.6 (excluding) contain a vulnerability that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack. Siemens SINUMERIK Integrate Operate Clients is a standard human interface system client for SINUMERIK digital control from Siemens AG. There is a middleman security bypass vulnerability in Siemens SINUMERIK Integrate Operate Clients. Multiple Siemens Products are prone to a security-bypass vulnerability. Successfully exploiting this issue may allow attackers to bypass certain security restrictions and perform unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks

Trust: 2.7

sources: NVD: CVE-2017-2685 // JVNDB: JVNDB-2017-002282 // CNVD: CNVD-2017-02400 // BID: 96519 // IVD: 9505679d-5baf-4fd4-a0f0-a9be3ad1094b // VULHUB: VHN-110888

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 9505679d-5baf-4fd4-a0f0-a9be3ad1094b // CNVD: CNVD-2017-02400

AFFECTED PRODUCTS

vendor:siemensmodel:sinumerik integrate operate clientscope:eqversion:3.0.4.00.032

Trust: 2.5

vendor:siemensmodel:sinumerik integrate operate clientscope:eqversion:2.0.3.00.016

Trust: 2.5

vendor:siemensmodel:sinumerik operatescope:eqversion:4.7

Trust: 2.2

vendor:siemensmodel:sinumerik operatescope:eqversion:4.5

Trust: 2.2

vendor:siemensmodel:sinumerik integrate access mymachine\/ethernetscope:eqversion: -

Trust: 1.6

vendor:siemensmodel:sinumerik integrate access mymachine/ethernetscope:eqversion:0

Trust: 0.9

vendor:siemensmodel:sinumerik integrate access mymachine/ethernetscope: - version: -

Trust: 0.8

vendor:siemensmodel:sinumerik integrate operate clientscope: - version: -

Trust: 0.8

vendor:siemensmodel:sinumerik operatescope: - version: -

Trust: 0.8

vendor:siemensmodel:sinumerik operate sp2 hotfixscope:eqversion:4.71

Trust: 0.6

vendor:siemensmodel:sinumerik operate sp6scope:eqversion:4.5

Trust: 0.6

vendor:siemensmodel:sinumerik operate sp2 hotfixscope:eqversion:v4.71

Trust: 0.3

vendor:siemensmodel:sinumerik operatescope:eqversion:v4.7

Trust: 0.3

vendor:siemensmodel:sinumerik operate sp6scope:eqversion:v4.5

Trust: 0.3

vendor:siemensmodel:sinumerik operatescope:eqversion:v4.5

Trust: 0.3

vendor:siemensmodel:sinumerik operate sp4scope:neversion:v4.7

Trust: 0.3

vendor:siemensmodel:sinumerik operate sp6 hotfixscope:neversion:v4.58

Trust: 0.3

vendor:siemensmodel:sinumerik integrate operate clientscope:neversion:3.0.6

Trust: 0.3

vendor:siemensmodel:sinumerik integrate operate clientscope:neversion:2.0.6

Trust: 0.3

vendor:siemensmodel:sinumerik integrate access mymachine/ethernetscope:neversion:v4.1.0.5

Trust: 0.3

vendor:sinumerik integrate access mymachine ethernetmodel: - scope:eqversion: -

Trust: 0.2

vendor:sinumerik integrate operate clientmodel: - scope:eqversion:2.0.3.00.016

Trust: 0.2

vendor:sinumerik integrate operate clientmodel: - scope:eqversion:3.0.4.00.032

Trust: 0.2

vendor:sinumerik operatemodel: - scope:eqversion:4.5

Trust: 0.2

vendor:sinumerik operatemodel: - scope:eqversion:4.7

Trust: 0.2

sources: IVD: 9505679d-5baf-4fd4-a0f0-a9be3ad1094b // CNVD: CNVD-2017-02400 // BID: 96519 // JVNDB: JVNDB-2017-002282 // CNNVD: CNNVD-201703-029 // NVD: CVE-2017-2685

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2685
value: HIGH

Trust: 1.0

NVD: CVE-2017-2685
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-02400
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201703-029
value: HIGH

Trust: 0.6

IVD: 9505679d-5baf-4fd4-a0f0-a9be3ad1094b
value: HIGH

Trust: 0.2

VULHUB: VHN-110888
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-2685
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-02400
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 9505679d-5baf-4fd4-a0f0-a9be3ad1094b
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-110888
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-2685
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: IVD: 9505679d-5baf-4fd4-a0f0-a9be3ad1094b // CNVD: CNVD-2017-02400 // VULHUB: VHN-110888 // JVNDB: JVNDB-2017-002282 // CNNVD: CNNVD-201703-029 // NVD: CVE-2017-2685

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

problemtype:CWE-693

Trust: 1.0

sources: VULHUB: VHN-110888 // JVNDB: JVNDB-2017-002282 // NVD: CVE-2017-2685

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201703-029

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201703-029

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-002282

PATCH

title:SSA-934525url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-934525.pdf

Trust: 0.8

title:Siemens SINUMERIK Integrate Operate Clients patch for security breachesurl:https://www.cnvd.org.cn/patchInfo/show/89987

Trust: 0.6

title:Siemens SINUMERIK Integrate Operate Clients Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68022

Trust: 0.6

sources: CNVD: CNVD-2017-02400 // JVNDB: JVNDB-2017-002282 // CNNVD: CNNVD-201703-029

EXTERNAL IDS

db:NVDid:CVE-2017-2685

Trust: 3.6

db:BIDid:96519

Trust: 2.6

db:SIEMENSid:SSA-934525

Trust: 2.6

db:CNNVDid:CNNVD-201703-029

Trust: 0.9

db:CNVDid:CNVD-2017-02400

Trust: 0.8

db:JVNDBid:JVNDB-2017-002282

Trust: 0.8

db:ICS CERTid:ICSA-17-061-03

Trust: 0.3

db:IVDid:9505679D-5BAF-4FD4-A0F0-A9BE3AD1094B

Trust: 0.2

db:VULHUBid:VHN-110888

Trust: 0.1

sources: IVD: 9505679d-5baf-4fd4-a0f0-a9be3ad1094b // CNVD: CNVD-2017-02400 // VULHUB: VHN-110888 // BID: 96519 // JVNDB: JVNDB-2017-002282 // CNNVD: CNNVD-201703-029 // NVD: CVE-2017-2685

REFERENCES

url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-934525.pdf

Trust: 2.6

url:http://www.securityfocus.com/bid/96519

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2685

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2685

Trust: 0.8

url:https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfcolorgraypdfcolorgray-pdfcolor-cpp/

Trust: 0.8

url:https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-2685

Trust: 0.6

url:http://www.siemens.com/

Trust: 0.3

url:https://ics-cert.us-cert.gov/advisories/icsa-17-061-03

Trust: 0.3

sources: CNVD: CNVD-2017-02400 // VULHUB: VHN-110888 // BID: 96519 // JVNDB: JVNDB-2017-002282 // CNNVD: CNNVD-201703-029 // NVD: CVE-2017-2685

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 96519

SOURCES

db:IVDid:9505679d-5baf-4fd4-a0f0-a9be3ad1094b
db:CNVDid:CNVD-2017-02400
db:VULHUBid:VHN-110888
db:BIDid:96519
db:JVNDBid:JVNDB-2017-002282
db:CNNVDid:CNNVD-201703-029
db:NVDid:CVE-2017-2685

LAST UPDATE DATE

2024-11-23T22:30:50.015000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-02400date:2017-03-05T00:00:00
db:VULHUBid:VHN-110888date:2019-10-09T00:00:00
db:BIDid:96519date:2017-03-07T01:09:00
db:JVNDBid:JVNDB-2017-002282date:2017-04-07T00:00:00
db:CNNVDid:CNNVD-201703-029date:2019-10-17T00:00:00
db:NVDid:CVE-2017-2685date:2024-11-21T03:23:58.560

SOURCES RELEASE DATE

db:IVDid:9505679d-5baf-4fd4-a0f0-a9be3ad1094bdate:2017-03-05T00:00:00
db:CNVDid:CNVD-2017-02400date:2017-03-05T00:00:00
db:VULHUBid:VHN-110888date:2017-03-01T00:00:00
db:BIDid:96519date:2017-03-01T00:00:00
db:JVNDBid:JVNDB-2017-002282date:2017-04-07T00:00:00
db:CNNVDid:CNNVD-201703-029date:2017-03-02T00:00:00
db:NVDid:CVE-2017-2685date:2017-03-01T17:59:00.143