Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2019-18336

Disclosure Date: March 10, 2020
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V3.X.17), SIMATIC TDC CP51M1 (All versions < V1.1.8), SIMATIC TDC CPU555 (All versions < V1.1.1), SINUMERIK 840D sl (All versions < V4.8.6), SINUMERIK 840D sl (All versions < V4.94). Specially crafted packets sent to port 102/tcp (Profinet) could cause the affected device to go into defect mode. A restart is required in order to recover the system. Successful exploitation requires an attacker to have network access to port 102/tcp, with no authentication. No user interation is required. At the time of advisory publication no public exploitation of this security vulnerability was known.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.5 High
Impact Score:
3.6
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High

General Information

Vendors

  • siemens

Products

  • simatic s7-300 cpu 312 ifm firmware,
  • simatic s7-300 cpu 313 firmware,
  • simatic s7-300 cpu 314 firmware,
  • simatic s7-300 cpu 314 ifm firmware,
  • simatic s7-300 cpu 315 firmware,
  • simatic s7-300 cpu 315-2 dp firmware,
  • simatic s7-300 cpu 316-2 dp firmware,
  • simatic s7-300 cpu 318-2 firmware,
  • simatic s7-300 cpu firmware,
  • simatic tdc cp51m1 firmware,
  • simatic tdc cpu555 firmware,
  • sinumerik 840d sl

Additional Info

Technical Analysis