Unknown
CVE-2019-18336
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2019-18336
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V3.X.17), SIMATIC TDC CP51M1 (All versions < V1.1.8), SIMATIC TDC CPU555 (All versions < V1.1.1), SINUMERIK 840D sl (All versions < V4.8.6), SINUMERIK 840D sl (All versions < V4.94). Specially crafted packets sent to port 102/tcp (Profinet) could cause the affected device to go into defect mode. A restart is required in order to recover the system. Successful exploitation requires an attacker to have network access to port 102/tcp, with no authentication. No user interation is required. At the time of advisory publication no public exploitation of this security vulnerability was known.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- siemens
Products
- simatic s7-300 cpu 312 ifm firmware,
- simatic s7-300 cpu 313 firmware,
- simatic s7-300 cpu 314 firmware,
- simatic s7-300 cpu 314 ifm firmware,
- simatic s7-300 cpu 315 firmware,
- simatic s7-300 cpu 315-2 dp firmware,
- simatic s7-300 cpu 316-2 dp firmware,
- simatic s7-300 cpu 318-2 firmware,
- simatic s7-300 cpu firmware,
- simatic tdc cp51m1 firmware,
- simatic tdc cpu555 firmware,
- sinumerik 840d sl
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: