CVE-2018-4843

A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIMATIC ET 200pro IM154-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8F PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8FX PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V1.7.0), SIMATIC S7-1500 Software Controller (All versions < V1.7.0), SIMATIC S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIMATIC S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317TF-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319F-3 PN/DP (All versions < V3.2.16), SIMATIC S7-400 CPU 412-2 PN V7 (All versions < V7.0.3), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.9), SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.7), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions < V8.1), SIMATIC WinAC RTX 2010 (All versions < V2010 SP3), SIMATIC WinAC RTX F 2010 (All versions < V2010 SP3), SINUMERIK 828D (All versions < V4.7 SP6 HF1), SIPLUS ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIPLUS ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIPLUS S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), Softnet PROFINET IO for PC-based Windows systems (All versions). Responding to a PROFINET DCP request with a specially crafted PROFINET DCP packet could cause a denial of service condition of the requesting system. The security vulnerability could be exploited by an attacker located on the same Ethernet segment (OSI Layer 2) as the targeted device. A manual restart is required to recover the system.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:simatic_cp_343-1_firmware:-:*:*:*:advanced:*:*:*
cpe:2.3:h:siemens:simatic_cp_343-1:-:*:*:*:advanced:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:simatic_cp_343-1_firmware:-:*:*:*:standard:*:*:*
cpe:2.3:h:siemens:simatic_cp_343-1:-:*:*:*:standard:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:siemens:simatic_cp_443-1_firmware:-:*:*:*:advanced:*:*:*
cpe:2.3:h:siemens:simatic_cp_443-1:-:*:*:*:advanced:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:siemens:simatic_cp_443-1_firmware:-:*:*:*:standard:*:*:*
cpe:2.3:h:siemens:simatic_cp_443-1:-:*:*:*:standard:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:siemens:simatic_s7-300_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_s7-300:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:siemens:simatic_s7-400_h_v6_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_s7-400_h_v6:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:siemens:simatic_s7-400_pn\/dp_v6_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_s7-400_pn\/dp_v6:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:siemens:simatic_s7-400_pn\/dp_v7_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_s7-400_pn\/dp_v7:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:siemens:simatic_s7-410_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_s7-410:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:siemens:simatic_winac_rtx_2010_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_winac_rtx_2010:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:siemens:sinumerik_828d_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:sinumerik_828d:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:siemens:softnet_pn-io_linux_firmware:-:*:*:*:*:windows:*:*
cpe:2.3:h:siemens:softnet_pn-io_linux:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:07

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/pdf/ssa-592007.pdf - Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-592007.pdf - Vendor Advisory

Information

Published : 2018-03-20 14:29

Updated : 2024-11-21 04:07


NVD link : CVE-2018-4843

Mitre link : CVE-2018-4843

CVE.ORG link : CVE-2018-4843


JSON object : View

Products Affected

siemens

  • simatic_s7-400_pn\/dp_v6_firmware
  • simatic_s7-400_pn\/dp_v7
  • softnet_pn-io_linux_firmware
  • simatic_s7-300
  • simatic_cp_343-1_firmware
  • simatic_s7-300_firmware
  • simatic_s7-1500_firmware
  • simatic_cp_443-1
  • simatic_s7-400_h_v6
  • simatic_s7-1500
  • softnet_pn-io_linux
  • sinumerik_828d
  • simatic_cp_343-1
  • simatic_s7-400_pn\/dp_v7_firmware
  • sinumerik_828d_firmware
  • simatic_winac_rtx_2010
  • simatic_s7-400_pn\/dp_v6
  • simatic_s7-400_h_v6_firmware
  • simatic_s7-410_firmware
  • simatic_winac_rtx_2010_firmware
  • simatic_cp_443-1_firmware
  • simatic_s7-410
CWE
CWE-20

Improper Input Validation