ID

VAR-201912-1289


CVE

CVE-2019-18323


TITLE

SPPA-T3000 MS3000 Migration Server Vulnerable to out-of-bounds writing

Trust: 0.8

sources: JVNDB: JVNDB-2019-013105

DESCRIPTION

A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could cause a Denial-of-Service condition and potentially gain remote code execution by sending specifically crafted packets to 5010/tcp. This vulnerability is independent from CVE-2019-18324, CVE-2019-18325, CVE-2019-18326, CVE-2019-18327, CVE-2019-18328, CVE-2019-18329, and CVE-2019-18330. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. This vulnerability CVE-2019-18324 , CVE-2019-18325 , CVE-2019-18326 , CVE-2019-18327 , CVE-2019-18328 , CVE-2019-18329 , CVE-2019-18330 Is a different vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SPPA-T3000 is a distributed control system mainly used in thermal power plants and large renewable energy power plants. Siemens SPPA-T3000 has a heap buffer overflow vulnerability

Trust: 2.34

sources: NVD: CVE-2019-18323 // JVNDB: JVNDB-2019-013105 // CNVD: CNVD-2019-44774 // IVD: 1b52a85f-b104-4a2b-ac88-6b9bd2f95849

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 1b52a85f-b104-4a2b-ac88-6b9bd2f95849 // CNVD: CNVD-2019-44774

AFFECTED PRODUCTS

vendor:siemensmodel:sppa-t3000 ms3000 migration serverscope: - version: -

Trust: 1.4

vendor:siemensmodel:sppa-t3000 ms3000 migration serverscope:eqversion:*

Trust: 1.0

vendor:sppa t3000 ms3000 migration servermodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 1b52a85f-b104-4a2b-ac88-6b9bd2f95849 // CNVD: CNVD-2019-44774 // JVNDB: JVNDB-2019-013105 // NVD: CVE-2019-18323

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-18323
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-18323
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-44774
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201912-641
value: CRITICAL

Trust: 0.6

IVD: 1b52a85f-b104-4a2b-ac88-6b9bd2f95849
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2019-18323
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-44774
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 1b52a85f-b104-4a2b-ac88-6b9bd2f95849
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2019-18323
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-18323
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 1b52a85f-b104-4a2b-ac88-6b9bd2f95849 // CNVD: CNVD-2019-44774 // JVNDB: JVNDB-2019-013105 // CNNVD: CNNVD-201912-641 // NVD: CVE-2019-18323

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.8

problemtype:CWE-122

Trust: 1.0

sources: JVNDB: JVNDB-2019-013105 // NVD: CVE-2019-18323

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201912-641

TYPE

Buffer error

Trust: 0.8

sources: IVD: 1b52a85f-b104-4a2b-ac88-6b9bd2f95849 // CNNVD: CNNVD-201912-641

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-013105

PATCH

title:SSA-451445url:https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf

Trust: 0.8

title:Patch for Siemens SPPA-T3000 Heap Buffer Overflow Vulnerability (CNVD-2019-44774)url:https://www.cnvd.org.cn/patchInfo/show/193753

Trust: 0.6

sources: CNVD: CNVD-2019-44774 // JVNDB: JVNDB-2019-013105

EXTERNAL IDS

db:NVDid:CVE-2019-18323

Trust: 3.2

db:SIEMENSid:SSA-451445

Trust: 2.2

db:ICS CERTid:ICSA-19-351-02

Trust: 1.4

db:CNVDid:CNVD-2019-44774

Trust: 0.8

db:CNNVDid:CNNVD-201912-641

Trust: 0.8

db:JVNDBid:JVNDB-2019-013105

Trust: 0.8

db:AUSCERTid:ESB-2019.4705

Trust: 0.6

db:IVDid:1B52A85F-B104-4A2B-AC88-6B9BD2F95849

Trust: 0.2

sources: IVD: 1b52a85f-b104-4a2b-ac88-6b9bd2f95849 // CNVD: CNVD-2019-44774 // JVNDB: JVNDB-2019-013105 // CNNVD: CNNVD-201912-641 // NVD: CVE-2019-18323

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf

Trust: 2.2

url:https://www.us-cert.gov/ics/advisories/icsa-19-351-02

Trust: 1.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-18323

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18323

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2019.4705/

Trust: 0.6

sources: CNVD: CNVD-2019-44774 // JVNDB: JVNDB-2019-013105 // CNNVD: CNNVD-201912-641 // NVD: CVE-2019-18323

SOURCES

db:IVDid:1b52a85f-b104-4a2b-ac88-6b9bd2f95849
db:CNVDid:CNVD-2019-44774
db:JVNDBid:JVNDB-2019-013105
db:CNNVDid:CNNVD-201912-641
db:NVDid:CVE-2019-18323

LAST UPDATE DATE

2024-11-23T21:36:21.224000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-44774date:2019-12-11T00:00:00
db:JVNDBid:JVNDB-2019-013105date:2019-12-26T00:00:00
db:CNNVDid:CNNVD-201912-641date:2022-02-25T00:00:00
db:NVDid:CVE-2019-18323date:2024-11-21T04:33:02.857

SOURCES RELEASE DATE

db:IVDid:1b52a85f-b104-4a2b-ac88-6b9bd2f95849date:2019-12-11T00:00:00
db:CNVDid:CNVD-2019-44774date:2019-12-11T00:00:00
db:JVNDBid:JVNDB-2019-013105date:2019-12-19T00:00:00
db:CNNVDid:CNNVD-201912-641date:2019-12-12T00:00:00
db:NVDid:CVE-2019-18323date:2019-12-12T19:15:18.857