SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Siemens SIMATIC Controller Vendors:   Siemens
Siemens SIMATIC S7-300 CPU TSAP Processing Flaw Lets Remote Users Cause the Target System to Crash
SecurityTracker Alert ID:  1036089
SecurityTracker URL:  http://securitytracker.com/id/1036089
CVE Reference:   CVE-2016-3949   (Links to External Site)
Date:  Jun 14 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): S7-300; firmware prior to 3.2.12
Description:   A vulnerability was reported in Siemens SIMATIC S7-300 CPU. A remote user can cause the target system to crash.

A remote user can send specially crafted packets sent to port TCP 102 (ISO-TSAP) or via Profibus to cause the target system to enter defect mode.

A cold restart is required to return the system to normal operations.

Mate J. Csorba, DNV GL, Marine Cybernetics Services, and Amund Sole, Norwegian University of Science and Technology, reported this vulnerability.

Impact:   A remote user can cause the target system to crash.
Solution:   The vendor has issued a fix (3.2.12).

The vendor's advisory is available at:

http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-818183.pdf

Vendor URL:  www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-818183.pdf (Links to External Site)
Cause:   State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC