Podatność CVE-2019-10923


Publikacja: 2019-10-10

Opis:
A vulnerability has been identified in CP1604 (All versions < V2.8), CP1616 (All versions < V2.8), Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller (All versions < V4.1.1 Patch 05), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 (All versions < V4.5.0 Patch 01), Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P (All versions < V4.5.0), SCALANCE X-200IRT (All versions < V5.2.1), SIMATIC ET 200M (All versions), SIMATIC ET 200S (All versions), SIMATIC ET 200ecoPN (except 6ES7148-6JD00-0AB0 and 6ES7146-6FF00-0AB0) (All versions), SIMATIC ET 200pro (All versions), SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (All versions), SIMATIC S7-300 CPU family (incl. F) (All versions), SIMATIC S7-400 (incl. F) V6 and below (All versions), SIMATIC S7-400 PN/DP V7 (incl. F) (All versions), SIMATIC WinAC RTX (F) 2010 (All versions < SIMATIC WinAC RTX 2010 SP3), SIMOTION (All versions), SINAMICS DCM (All versions < V1.5 HF1), SINAMICS DCP (All versions), SINAMICS G110M V4.7 (Control Unit) (All versions < V4.7 SP10 HF5), SINAMICS G120 V4.7 (Control Unit) (All versions < V4.7 SP10 HF5), SINAMICS G130 V4.7 (Control Unit) (All versions < V4.7 HF29), SINAMICS G150 (Control Unit) (All versions < V4.8), SINAMICS GH150 V4.7 (Control Unit) (All versions), SINAMICS GL150 V4.7 (Control Unit) (All versions), SINAMICS GM150 V4.7 (Control Unit) (All versions), SINAMICS S110 (Control Unit) (All versions), SINAMICS S120 V4.7 (Control Unit and CBE20) (All versions < V4.7 HF34), SINAMICS S150 (Control Unit) (All versions < V4.8), SINAMICS SL150 V4.7 (Control Unit) (All versions), SINAMICS SM120 V4.7 (Control Unit) (All versions), SINUMERIK 828D (All versions < V4.8 SP5), SINUMERIK 840D sl (All versions). An attacker with network access to an affected product may cause a Denial-of-Service condition by breaking the real-time synchronization (IRT) of the affected installation. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected installation. No user interaction is required to exploit this security vulnerability. The vulnerability impacts the availability of the affected installations.

Typ:

CWE-400

(Uncontrolled Resource Consumption ('Resource Exhaustion'))

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

Ogólna skala CVSS
Znaczenie
Łatwość wykorzystania
5/10
2.9/10
10/10
Wymagany dostęp
Złożoność ataku
Autoryzacja
Zdalny
Niska
Nie wymagana
Wpływ na poufność
Wpływ na integralność
Wpływ na dostępność
Brak
Brak
Częściowy
Affected software
Siemens -> Simatic s7-300 cpu 318-2 firmware 
Siemens -> Sinamics s120 firmware 
Siemens -> Sinumerik 828d 
Siemens -> Simatic s7-300 cpu firmware 
Siemens -> Sinamics sl150 firmware 
Siemens -> Sinumerik 840d sl 
Siemens -> Simatic s7-400 dp v7 firmware 
Siemens -> Sinamics sm120 firmware 
Siemens -> Dk standard ethernet controller firmware 
Siemens -> Simatic s7-400 pn v7 firmware 
Siemens -> Ek-ertec 200 firmware 
Siemens -> Simatic s7-400 v6 firmware 
Siemens -> Simatic et 200ecopn firmware 
Siemens -> Simatic winac rtx (f) 2010 firmware 
Siemens -> Simatic et 200m firmware 
Siemens -> Simotion firmware 
Siemens -> Simatic et 200s firmware 
Siemens -> Sinamics dcm firmware 
Siemens -> Simatic pn/pn coupler 6es7158-3ad01-0xa0 firmware 
Siemens -> Sinamics dcp firmware 
Siemens -> Simatic s7-300 cpu 312 ifm firmware 
Siemens -> Sinamics g110m firmware 
Siemens -> Simatic s7-300 cpu 313 firmware 
Siemens -> Sinamics g120 firmware 
Siemens -> Simatic s7-300 cpu 314 firmware 
Siemens -> Sinamics g130 firmware 
Siemens -> Simatic s7-300 cpu 314 ifm firmware 
Siemens -> Sinamics gh150 firmware 
Siemens -> Simatic s7-300 cpu 315-2 dp firmware 
Siemens -> Sinamics gl150 firmware 
Siemens -> Simatic s7-300 cpu 315 firmware 
Siemens -> Sinamics gm150 firmware 
Siemens -> Simatic s7-300 cpu 316-2 dp firmware 
Siemens -> Sinamics s110 firmware 

 Referencje:
https://cert-portal.siemens.com/productcert/pdf/ssa-349422.pdf
https://www.us-cert.gov/ics/advisories/icsa-19-283-01

Copyright 2024, cxsecurity.com

 

Back to Top