ID

VAR-201912-1282


CVE

CVE-2019-18316


TITLE

Siemens SPPA-T3000 Application Server Untrusted Data Deserialization Vulnerability

Trust: 0.8

sources: IVD: ee383cc4-ca45-4748-9251-dd2ad3536c15 // CNVD: CNVD-2019-45372

DESCRIPTION

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could gain remote code execution by sending specifically crafted packets to 1099/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. SPPA-T3000 Application Server Contains a vulnerability in the deserialization of unreliable data.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. Application Server is one of the application servers that provides the main system services, including access control, data distribution to thin clients, and archiving. There is a security vulnerability in the Siemens SPPA-T3000 Application Server

Trust: 2.43

sources: NVD: CVE-2019-18316 // JVNDB: JVNDB-2019-013094 // CNVD: CNVD-2019-45372 // IVD: ee383cc4-ca45-4748-9251-dd2ad3536c15 // VULMON: CVE-2019-18316

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: ee383cc4-ca45-4748-9251-dd2ad3536c15 // CNVD: CNVD-2019-45372

AFFECTED PRODUCTS

vendor:siemensmodel:sppa-t3000 application serverscope: - version: -

Trust: 1.4

vendor:siemensmodel:sppa-t3000 application serverscope:ltversion:r8.2

Trust: 1.0

vendor:siemensmodel:sppa-t3000 application serverscope:eqversion:r8.2

Trust: 1.0

vendor:sppa t3000 application servermodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: ee383cc4-ca45-4748-9251-dd2ad3536c15 // CNVD: CNVD-2019-45372 // JVNDB: JVNDB-2019-013094 // NVD: CVE-2019-18316

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-18316
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-18316
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-45372
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201912-631
value: CRITICAL

Trust: 0.6

IVD: ee383cc4-ca45-4748-9251-dd2ad3536c15
value: HIGH

Trust: 0.2

VULMON: CVE-2019-18316
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-18316
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-45372
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: ee383cc4-ca45-4748-9251-dd2ad3536c15
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2019-18316
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-18316
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: ee383cc4-ca45-4748-9251-dd2ad3536c15 // CNVD: CNVD-2019-45372 // VULMON: CVE-2019-18316 // JVNDB: JVNDB-2019-013094 // CNNVD: CNNVD-201912-631 // NVD: CVE-2019-18316

PROBLEMTYPE DATA

problemtype:CWE-502

Trust: 1.8

sources: JVNDB: JVNDB-2019-013094 // NVD: CVE-2019-18316

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201912-631

TYPE

Code problem

Trust: 0.8

sources: IVD: ee383cc4-ca45-4748-9251-dd2ad3536c15 // CNNVD: CNNVD-201912-631

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-013094

PATCH

title:SSA-451445url:https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf

Trust: 0.8

title:Patch for Siemens SPPA-T3000 Application Server Untrusted Data Deserialization Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/194225

Trust: 0.6

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=abc44ea961d2d15de1d1eca8d6f07d8a

Trust: 0.1

title:Threatposturl:https://threatpost.com/critical-remote-code-execution-global-power-plants/151087/

Trust: 0.1

sources: CNVD: CNVD-2019-45372 // VULMON: CVE-2019-18316 // JVNDB: JVNDB-2019-013094

EXTERNAL IDS

db:NVDid:CVE-2019-18316

Trust: 3.3

db:SIEMENSid:SSA-451445

Trust: 2.3

db:ICS CERTid:ICSA-19-351-02

Trust: 1.4

db:CNVDid:CNVD-2019-45372

Trust: 0.8

db:CNNVDid:CNNVD-201912-631

Trust: 0.8

db:JVNDBid:JVNDB-2019-013094

Trust: 0.8

db:AUSCERTid:ESB-2019.4705

Trust: 0.6

db:IVDid:EE383CC4-CA45-4748-9251-DD2AD3536C15

Trust: 0.2

db:VULMONid:CVE-2019-18316

Trust: 0.1

sources: IVD: ee383cc4-ca45-4748-9251-dd2ad3536c15 // CNVD: CNVD-2019-45372 // VULMON: CVE-2019-18316 // JVNDB: JVNDB-2019-013094 // CNNVD: CNNVD-201912-631 // NVD: CVE-2019-18316

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf

Trust: 2.3

url:https://www.us-cert.gov/ics/advisories/icsa-19-351-02

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-18316

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18316

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2019.4705/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/502.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/critical-remote-code-execution-global-power-plants/151087/

Trust: 0.1

url:https://cert-portal.siemens.com/productcert/txt/ssa-451445.txt

Trust: 0.1

sources: CNVD: CNVD-2019-45372 // VULMON: CVE-2019-18316 // JVNDB: JVNDB-2019-013094 // CNNVD: CNNVD-201912-631 // NVD: CVE-2019-18316

SOURCES

db:IVDid:ee383cc4-ca45-4748-9251-dd2ad3536c15
db:CNVDid:CNVD-2019-45372
db:VULMONid:CVE-2019-18316
db:JVNDBid:JVNDB-2019-013094
db:CNNVDid:CNNVD-201912-631
db:NVDid:CVE-2019-18316

LAST UPDATE DATE

2024-08-14T13:25:15.418000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-45372date:2019-12-16T00:00:00
db:VULMONid:CVE-2019-18316date:2020-03-10T00:00:00
db:JVNDBid:JVNDB-2019-013094date:2019-12-26T00:00:00
db:CNNVDid:CNNVD-201912-631date:2022-02-25T00:00:00
db:NVDid:CVE-2019-18316date:2022-03-04T20:48:27.510

SOURCES RELEASE DATE

db:IVDid:ee383cc4-ca45-4748-9251-dd2ad3536c15date:2019-12-16T00:00:00
db:CNVDid:CNVD-2019-45372date:2019-12-16T00:00:00
db:VULMONid:CVE-2019-18316date:2019-12-12T00:00:00
db:JVNDBid:JVNDB-2019-013094date:2019-12-19T00:00:00
db:CNNVDid:CNNVD-201912-631date:2019-12-12T00:00:00
db:NVDid:CVE-2019-18316date:2019-12-12T19:15:18.297