ID

VAR-201803-2159


CVE

CVE-2018-4843


TITLE

plural Siemens Vulnerability related to input validation in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-003479

DESCRIPTION

A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIMATIC ET 200pro IM154-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8F PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8FX PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V1.7.0), SIMATIC S7-1500 Software Controller (All versions < V1.7.0), SIMATIC S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIMATIC S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317TF-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319F-3 PN/DP (All versions < V3.2.16), SIMATIC S7-400 CPU 412-2 PN V7 (All versions < V7.0.3), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.9), SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.7), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions < V8.1), SIMATIC WinAC RTX 2010 (All versions < V2010 SP3), SIMATIC WinAC RTX F 2010 (All versions < V2010 SP3), SINUMERIK 828D (All versions < V4.7 SP6 HF1), SIPLUS ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIPLUS ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIPLUS S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), Softnet PROFINET IO for PC-based Windows systems (All versions). Responding to a PROFINET DCP request with a specially crafted PROFINET DCP packet could cause a denial of service condition of the requesting system. The security vulnerability could be exploited by an attacker located on the same Ethernet segment (OSI Layer 2) as the targeted device. A manual restart is required to recover the system. plural Siemens The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Siemens SIMATIC CP 343-1 Advanced is an Ethernet communication module for supporting PROFINET, a new generation of automation bus standard based on Industrial Ethernet technology. SIMATIC S7-1500 is a programmable logic controller. A denial of service vulnerability exists in several Siemens products. Siemens SIMATIC/SINUMERIK/PROFINET IO are prone to a denial-of-service vulnerability. Successful exploitation requires no user interaction or privileges and impacts the availability of core functionality of the affected device. At the time of advisory publication no public exploitation of this security vulnerability is known. Siemens provides mitigations to resolve the security issue. PROFIBUS interfaces are not affected. F; SINUMERIK 828D; SINUMERIK 840D sl; Softnet PROFINET IO for PC-based Windows systems

Trust: 2.7

sources: NVD: CVE-2018-4843 // JVNDB: JVNDB-2018-003479 // CNVD: CNVD-2018-06025 // BID: 103465 // IVD: e2e91df0-39ab-11e9-bef8-000c29342cb1 // VULHUB: VHN-134874

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2e91df0-39ab-11e9-bef8-000c29342cb1 // CNVD: CNVD-2018-06025

AFFECTED PRODUCTS

vendor:siemensmodel:simatic s7-410scope:ltversion:8.1

Trust: 1.6

vendor:siemensmodel:simatic s7-400 pn\/dp v7scope:eqversion: -

Trust: 1.6

vendor:siemensmodel:simatic winac rtx 2010scope:eqversion: -

Trust: 1.6

vendor:siemensmodel:simatic cp 343-1scope:eqversion: -

Trust: 1.6

vendor:siemensmodel:sinumerik 828dscope:eqversion: -

Trust: 1.6

vendor:siemensmodel:simatic cp 443-1scope:eqversion: -

Trust: 1.6

vendor:siemensmodel:softnet pn-io linuxscope:eqversion: -

Trust: 1.6

vendor:siemensmodel:simatic s7-300scope:eqversion: -

Trust: 1.6

vendor:siemensmodel:simatic s7-400 h v6scope:eqversion: -

Trust: 1.6

vendor:siemensmodel:sinumerik 828dscope: - version: -

Trust: 1.4

vendor:siemensmodel:simatic s7-400 pn\/dp v6scope:ltversion:6.0.7

Trust: 1.0

vendor:siemensmodel:simatic s7-1500scope:ltversion:1.7.0

Trust: 1.0

vendor:siemensmodel:simatic cp 343-1scope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic cp 443-1scope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic s7-1500scope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic s7-300scope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic s7-400 pn/dp v6scope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic s7-400 pn/dp v7scope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic s7-400h v6scope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic s7-410scope: - version: -

Trust: 0.8

vendor:siemensmodel:simatic winac rtx 2010scope: - version: -

Trust: 0.8

vendor:siemensmodel:softnet profinet ioscope:eqversion:for pc-based windows systems firmware

Trust: 0.8

vendor:siemensmodel:simatic cp advancedscope:eqversion:343-1

Trust: 0.6

vendor:siemensmodel:simatic cp standardscope:eqversion:343-1

Trust: 0.6

vendor:siemensmodel:simatic cp standardscope:eqversion:443-1

Trust: 0.6

vendor:siemensmodel:simatic s7-1500 software controller incl. fscope:ltversion:1.7.0

Trust: 0.6

vendor:siemensmodel:simatic s7-1500 incl. fscope:ltversion:1.7.0

Trust: 0.6

vendor:siemensmodel:simatic s7-300 incl. f and tscope: - version: -

Trust: 0.6

vendor:siemensmodel:simatic s7-400 hscope:eqversion:v6

Trust: 0.6

vendor:siemensmodel:simatic s7-400 pn/dp incl. fscope:eqversion:v6<6.0.7

Trust: 0.6

vendor:siemensmodel:simatic s7-400 pn/dp incl. fscope:eqversion:v7

Trust: 0.6

vendor:siemensmodel:simatic winac rtx incl. fscope:eqversion:2010

Trust: 0.6

vendor:siemensmodel:sinumerik 840d slscope: - version: -

Trust: 0.6

vendor:siemensmodel:softnet profinet io for pc-based windows systemsscope: - version: -

Trust: 0.6

vendor:simatic cp 343 1model: - scope:eqversion: -

Trust: 0.4

vendor:simatic cp 443 1model: - scope:eqversion: -

Trust: 0.4

vendor:siemensmodel:softnet profinet ioscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:sinumerik 840d slscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:sinumerik 840dscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:sinumerik 828dscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:simatic winac rtxscope:eqversion:20100

Trust: 0.3

vendor:siemensmodel:simatic s7-410scope:eqversion:8

Trust: 0.3

vendor:siemensmodel:simatic s7-400 pn/dpscope:eqversion:7

Trust: 0.3

vendor:siemensmodel:simatic s7-400 pn/dpscope:eqversion:6

Trust: 0.3

vendor:siemensmodel:simatic s7-400 hscope:eqversion:v60

Trust: 0.3

vendor:siemensmodel:simatic s7-300scope:eqversion:0

Trust: 0.3

vendor:siemensmodel:simatic s7-1500 software controllerscope:eqversion:0

Trust: 0.3

vendor:siemensmodel:simatic s7-1500scope:eqversion:0

Trust: 0.3

vendor:siemensmodel:simatic cp standardscope:eqversion:443-10

Trust: 0.3

vendor:siemensmodel:simatic cp advancedscope:eqversion:443-10

Trust: 0.3

vendor:siemensmodel:simatic cp standardscope:eqversion:343-10

Trust: 0.3

vendor:siemensmodel:simatic cp advancedscope:eqversion:343-10

Trust: 0.3

vendor:siemensmodel:simatic s7-410scope:neversion:8.1

Trust: 0.3

vendor:siemensmodel:simatic s7-400 pn/dpscope:neversion:6.0.7

Trust: 0.3

vendor:siemensmodel:simatic s7-1500 software controllerscope:neversion:1.7

Trust: 0.3

vendor:siemensmodel:simatic s7-1500scope:neversion:1.7

Trust: 0.3

vendor:simatic s7 410model: - scope:eqversion:*

Trust: 0.2

vendor:simatic winac rtx 2010model: - scope:eqversion: -

Trust: 0.2

vendor:sinumerik 828dmodel: - scope:eqversion: -

Trust: 0.2

vendor:softnet pn io linuxmodel: - scope:eqversion: -

Trust: 0.2

vendor:simatic s7 1500model: - scope:eqversion:*

Trust: 0.2

vendor:simatic s7 300model: - scope:eqversion: -

Trust: 0.2

vendor:simatic s7 400 h v6model: - scope:eqversion: -

Trust: 0.2

vendor:simatic s7 400 pn dp v6model: - scope:eqversion:*

Trust: 0.2

vendor:simatic s7 400 pn dp v7model: - scope:eqversion: -

Trust: 0.2

sources: IVD: e2e91df0-39ab-11e9-bef8-000c29342cb1 // CNVD: CNVD-2018-06025 // BID: 103465 // JVNDB: JVNDB-2018-003479 // CNNVD: CNNVD-201803-723 // NVD: CVE-2018-4843

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-4843
value: MEDIUM

Trust: 1.0

productcert@siemens.com: CVE-2018-4843
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-4843
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2018-06025
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201803-723
value: MEDIUM

Trust: 0.6

IVD: e2e91df0-39ab-11e9-bef8-000c29342cb1
value: MEDIUM

Trust: 0.2

VULHUB: VHN-134874
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-4843
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-06025
severity: MEDIUM
baseScore: 4.6
vectorString: AV:A/AC:H/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.2
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2e91df0-39ab-11e9-bef8-000c29342cb1
severity: MEDIUM
baseScore: 4.6
vectorString: AV:A/AC:H/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.2
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-134874
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-4843
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

productcert@siemens.com: CVE-2018-4843
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: IVD: e2e91df0-39ab-11e9-bef8-000c29342cb1 // CNVD: CNVD-2018-06025 // VULHUB: VHN-134874 // JVNDB: JVNDB-2018-003479 // CNNVD: CNNVD-201803-723 // NVD: CVE-2018-4843 // NVD: CVE-2018-4843

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-134874 // JVNDB: JVNDB-2018-003479 // NVD: CVE-2018-4843

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201803-723

TYPE

Input validation error

Trust: 1.1

sources: IVD: e2e91df0-39ab-11e9-bef8-000c29342cb1 // BID: 103465 // CNNVD: CNNVD-201803-723

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-003479

PATCH

title:SSA-592007url:https://cert-portal.siemens.com/productcert/pdf/ssa-592007.pdf

Trust: 0.8

title:Patch for Multiple Siemens Product Denial of Service Vulnerabilities (CNVD-2018-06025)url:https://www.cnvd.org.cn/patchInfo/show/122865

Trust: 0.6

title:Multiple Siemens Product security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=79323

Trust: 0.6

sources: CNVD: CNVD-2018-06025 // JVNDB: JVNDB-2018-003479 // CNNVD: CNNVD-201803-723

EXTERNAL IDS

db:NVDid:CVE-2018-4843

Trust: 3.6

db:SIEMENSid:SSA-592007

Trust: 2.0

db:ICS CERTid:ICSA-18-079-02

Trust: 1.7

db:CNVDid:CNVD-2018-06025

Trust: 0.8

db:CNNVDid:CNNVD-201803-723

Trust: 0.8

db:JVNDBid:JVNDB-2018-003479

Trust: 0.8

db:BIDid:103465

Trust: 0.4

db:IVDid:E2E91DF0-39AB-11E9-BEF8-000C29342CB1

Trust: 0.2

db:SEEBUGid:SSVID-98995

Trust: 0.1

db:VULHUBid:VHN-134874

Trust: 0.1

sources: IVD: e2e91df0-39ab-11e9-bef8-000c29342cb1 // CNVD: CNVD-2018-06025 // VULHUB: VHN-134874 // BID: 103465 // JVNDB: JVNDB-2018-003479 // CNNVD: CNNVD-201803-723 // NVD: CVE-2018-4843

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-592007.pdf

Trust: 2.0

url:https://ics-cert.us-cert.gov/advisories/icsa-18-079-02

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4843

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-4843

Trust: 0.8

url:http://www.siemens.com/

Trust: 0.3

sources: CNVD: CNVD-2018-06025 // VULHUB: VHN-134874 // BID: 103465 // JVNDB: JVNDB-2018-003479 // CNNVD: CNNVD-201803-723 // NVD: CVE-2018-4843

CREDITS

Siemens ProductCERT

Trust: 0.3

sources: BID: 103465

SOURCES

db:IVDid:e2e91df0-39ab-11e9-bef8-000c29342cb1
db:CNVDid:CNVD-2018-06025
db:VULHUBid:VHN-134874
db:BIDid:103465
db:JVNDBid:JVNDB-2018-003479
db:CNNVDid:CNNVD-201803-723
db:NVDid:CVE-2018-4843

LAST UPDATE DATE

2024-08-14T13:46:01.724000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-06025date:2019-08-22T00:00:00
db:VULHUBid:VHN-134874date:2023-01-10T00:00:00
db:BIDid:103465date:2018-03-20T00:00:00
db:JVNDBid:JVNDB-2018-003479date:2018-07-04T00:00:00
db:CNNVDid:CNNVD-201803-723date:2023-05-10T00:00:00
db:NVDid:CVE-2018-4843date:2023-05-09T13:15:12.543

SOURCES RELEASE DATE

db:IVDid:e2e91df0-39ab-11e9-bef8-000c29342cb1date:2018-03-22T00:00:00
db:CNVDid:CNVD-2018-06025date:2018-03-22T00:00:00
db:VULHUBid:VHN-134874date:2018-03-20T00:00:00
db:BIDid:103465date:2018-03-20T00:00:00
db:JVNDBid:JVNDB-2018-003479date:2018-05-24T00:00:00
db:CNNVDid:CNNVD-201803-723date:2018-03-21T00:00:00
db:NVDid:CVE-2018-4843date:2018-03-20T14:29:00.413