An issue was discovered in Siemens ETA4 firmware (all versions prior to Revision 08) of the SM-2558 extension module for: SICAM AK, SICAM TM 1703, SICAM BC 1703, and SICAM AK 3. Specially crafted packets sent to Port 2404/TCP could cause the affected device to go into defect mode. A cold start might be required to recover the system, a Denial-of-Service Vulnerability.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93832 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-16-299-01 | Mitigation Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/93832 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-16-299-01 | Mitigation Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 02:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/93832 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-16-299-01 - Mitigation, Third Party Advisory, US Government Resource |
Information
Published : 2017-02-13 21:59
Updated : 2024-11-21 02:58
NVD link : CVE-2016-7987
Mitre link : CVE-2016-7987
CVE.ORG link : CVE-2016-7987
JSON object : View
Products Affected
siemens
- sicam_ak_3
- sicam_ak
- eta2_firmware
- sicam_tm
- sicam_bc
- sicam_tm_1703
- sicam_bc_1703
- eta4_firmware
CWE
CWE-19
Data Processing Errors