ID

VAR-201812-0452


CVE

CVE-2018-11457


TITLE

SINUMERIK 828D and SINUMERIK 840D Vulnerabilities related to authorization, permissions, and access control

Trust: 0.8

sources: JVNDB: JVNDB-2018-013321

DESCRIPTION

A vulnerability has been identified in SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). The integrated web server on port 4842/tcp of the affected products could allow a remote attacker to execute code with privileged permissions on the system by sending specially crafted network requests to port 4842/tcp. Please note that this vulnerability is only exploitable if port 4842/tcp is manually opened in the firewall configuration of network port X130. The security vulnerability could be exploited by an attacker with network access to the affected devices on port 4842/tcp. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the web server. At the time of advisory publication no public exploitation of this security vulnerability was known. SINUMERIK 828D and SINUMERIK 840D Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Siemens SINUMERIK 808D is a CNC machine system controller from Siemens AG. A heap buffer overflow vulnerability exists in the Siemens SINUMERIK CNC Controller. Siemens SINUMERIK Controllers is prone to the following security vulnerabilities: 1. A heap based buffer-overflow vulnerability. 2. An integer overflow vulnerability. 3. A security bypass vulnerability. 4. An arbitrary code execution vulnerability. 5. Multiple privilege escalation vulnerabilities. 6. A stack based buffer-overflow vulnerability. 7. A buffer-overflow vulnerability. 8. Multiple denial-of-service vulnerabilities Attackers can exploit these issues to execute arbitrary code within the context of affected device, gain host privileges and perform unauthorized actions, to modify or destroy data without having proper authorization to do so, to bypass security restrictions or cause a denial-of-service condition. Siemens SINUMERIK 808D, etc

Trust: 2.7

sources: NVD: CVE-2018-11457 // JVNDB: JVNDB-2018-013321 // CNVD: CNVD-2018-25413 // BID: 106185 // IVD: 7d823502-463f-11e9-8a07-000c29342cb1 // VULHUB: VHN-121318

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 7d823502-463f-11e9-8a07-000c29342cb1 // CNVD: CNVD-2018-25413

AFFECTED PRODUCTS

vendor:siemensmodel:sinumerik 840d sl v4.7scope:lteversion:4.7

Trust: 1.0

vendor:siemensmodel:sinumerik 840d sl v4.8scope:lteversion:4.8

Trust: 1.0

vendor:siemensmodel:sinumerik 828d v4.7scope:lteversion:4.7

Trust: 1.0

vendor:siemensmodel:sinumerik 828dscope: - version: -

Trust: 0.8

vendor:siemensmodel:sinumerik 840d slscope: - version: -

Trust: 0.8

vendor:siemensmodel:sinumerik 808dscope:eqversion:v4.7

Trust: 0.6

vendor:siemensmodel:sinumerik 808dscope:eqversion:v4.8

Trust: 0.6

vendor:siemensmodel:sinumerik 840d sp6 hf5scope:ltversion:v4.7

Trust: 0.6

vendor:siemensmodel:sinumerik 840d sp3scope:ltversion:v4.8

Trust: 0.6

vendor:siemensmodel:sinumerik 828d sp6 hf1scope:ltversion:v4.7

Trust: 0.6

vendor:siemensmodel:sinumerik 828d v4.7scope:eqversion:4.7

Trust: 0.6

vendor:siemensmodel:sinumerik 840d sl v4.8scope:eqversion:4.8

Trust: 0.6

vendor:siemensmodel:sinumerik 840d sl v4.7scope:eqversion:4.7

Trust: 0.6

vendor:siemensmodel:sinumerik 840d slscope:eqversion:4.8

Trust: 0.3

vendor:siemensmodel:sinumerik 840d slscope:eqversion:4.7

Trust: 0.3

vendor:siemensmodel:sinumerik 828dscope:eqversion:4.7

Trust: 0.3

vendor:siemensmodel:sinumerik 808dscope:eqversion:4.8

Trust: 0.3

vendor:siemensmodel:sinumerik 808dscope:eqversion:4.7

Trust: 0.3

vendor:siemensmodel:sinumerik 840d sl sp3scope:neversion:4.8

Trust: 0.3

vendor:siemensmodel:sinumerik 840d sl sp6 hf5scope:neversion:4.7

Trust: 0.3

vendor:siemensmodel:sinumerik 828d sp6 hf1scope:neversion:4.7

Trust: 0.3

vendor:sinumerik 828d v4 7model: - scope:eqversion:*

Trust: 0.2

vendor:sinumerik 840d sl v4 7model: - scope:eqversion:*

Trust: 0.2

vendor:sinumerik 840d sl v4 8model: - scope:eqversion:*

Trust: 0.2

sources: IVD: 7d823502-463f-11e9-8a07-000c29342cb1 // CNVD: CNVD-2018-25413 // BID: 106185 // JVNDB: JVNDB-2018-013321 // CNNVD: CNNVD-201812-598 // NVD: CVE-2018-11457

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-11457
value: HIGH

Trust: 1.0

NVD: CVE-2018-11457
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-25413
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201812-598
value: HIGH

Trust: 0.6

IVD: 7d823502-463f-11e9-8a07-000c29342cb1
value: HIGH

Trust: 0.2

VULHUB: VHN-121318
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-11457
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-25413
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7d823502-463f-11e9-8a07-000c29342cb1
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-121318
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-11457
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 7d823502-463f-11e9-8a07-000c29342cb1 // CNVD: CNVD-2018-25413 // VULHUB: VHN-121318 // JVNDB: JVNDB-2018-013321 // CNNVD: CNNVD-201812-598 // NVD: CVE-2018-11457

PROBLEMTYPE DATA

problemtype:CWE-122

Trust: 1.0

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.8

sources: JVNDB: JVNDB-2018-013321 // NVD: CVE-2018-11457

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201812-598

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201812-598

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013321

PATCH

title:SSA-170881url:https://cert-portal.siemens.com/productcert/pdf/ssa-170881.pdf

Trust: 0.8

title:Patches for multiple Siemens product heap buffer overflow vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/147309

Trust: 0.6

title:Multiple Siemens Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87842

Trust: 0.6

sources: CNVD: CNVD-2018-25413 // JVNDB: JVNDB-2018-013321 // CNNVD: CNNVD-201812-598

EXTERNAL IDS

db:NVDid:CVE-2018-11457

Trust: 3.6

db:SIEMENSid:SSA-170881

Trust: 2.6

db:BIDid:106185

Trust: 2.0

db:ICS CERTid:ICSA-18-345-02

Trust: 1.1

db:CNNVDid:CNNVD-201812-598

Trust: 0.9

db:CNVDid:CNVD-2018-25413

Trust: 0.8

db:JVNDBid:JVNDB-2018-013321

Trust: 0.8

db:IVDid:7D823502-463F-11E9-8A07-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-121318

Trust: 0.1

sources: IVD: 7d823502-463f-11e9-8a07-000c29342cb1 // CNVD: CNVD-2018-25413 // VULHUB: VHN-121318 // BID: 106185 // JVNDB: JVNDB-2018-013321 // CNNVD: CNNVD-201812-598 // NVD: CVE-2018-11457

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-170881.pdf

Trust: 2.6

url:http://www.securityfocus.com/bid/106185

Trust: 1.7

url:https://ics-cert.us-cert.gov/advisories/icsa-18-345-02

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-11457

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-11457

Trust: 0.8

url:http://subscriber.communications.siemens.com/

Trust: 0.3

url:https://www.industry.siemens.com/topics/global/en/cnc4you/cnc_downloads/sinutrain_downloads/pages/sinutrain_downloads.aspx

Trust: 0.3

sources: CNVD: CNVD-2018-25413 // VULHUB: VHN-121318 // BID: 106185 // JVNDB: JVNDB-2018-013321 // CNNVD: CNNVD-201812-598 // NVD: CVE-2018-11457

CREDITS

Anton Kalinin, Danila Parnishchev, Dmitry Sklyar, Gleb Gritsai, Kirill Nesterov, Radu Motspan, and Sergey Sidorov from Kaspersky Lab.

Trust: 0.3

sources: BID: 106185

SOURCES

db:IVDid:7d823502-463f-11e9-8a07-000c29342cb1
db:CNVDid:CNVD-2018-25413
db:VULHUBid:VHN-121318
db:BIDid:106185
db:JVNDBid:JVNDB-2018-013321
db:CNNVDid:CNNVD-201812-598
db:NVDid:CVE-2018-11457

LAST UPDATE DATE

2024-08-14T13:45:23.900000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-25413date:2018-12-14T00:00:00
db:VULHUBid:VHN-121318date:2019-10-09T00:00:00
db:BIDid:106185date:2018-12-11T00:00:00
db:JVNDBid:JVNDB-2018-013321date:2019-03-14T00:00:00
db:CNNVDid:CNNVD-201812-598date:2019-10-17T00:00:00
db:NVDid:CVE-2018-11457date:2019-10-09T23:33:32.667

SOURCES RELEASE DATE

db:IVDid:7d823502-463f-11e9-8a07-000c29342cb1date:2018-12-14T00:00:00
db:CNVDid:CNVD-2018-25413date:2018-12-14T00:00:00
db:VULHUBid:VHN-121318date:2018-12-12T00:00:00
db:BIDid:106185date:2018-12-11T00:00:00
db:JVNDBid:JVNDB-2018-013321date:2019-02-19T00:00:00
db:CNNVDid:CNNVD-201812-598date:2018-12-12T00:00:00
db:NVDid:CVE-2018-11457date:2018-12-12T16:29:00.247