CVE-2016-3963 – Siemens SCALANCE S613 - Remote Denial of Service
https://notcve.org/view.php?id=CVE-2016-3963
Siemens SCALANCE S613 allows remote attackers to cause a denial of service (web-server outage) via traffic to TCP port 443. Siemens SCALANCE S613 permite a atacantes remotos provocar una denegación de servicio (interrupción del servidor web) a través de tráfico en el puerto TCP 443. Siemens SCALANCE S613 suffers from a remote denial of service vulnerability. • https://www.exploit-db.com/exploits/44721 http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-751155.pdf https://ics-cert.us-cert.gov/advisories/ICSA-16-103-02 •
CVE-2012-1799
https://notcve.org/view.php?id=CVE-2012-1799
The web server on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 does not limit the rate of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack on the administrative password. Ell servidor web en el cortafuegos Siemens Scalance S Security Module S602 V2, S612 V2, and S613 V2 con el firmware anterior a v2.3.0.3 no limita la tasa de intentos de autenticación, lo que hace que sea más fácil para los atacantes remotos obtener acceso a través de un ataque de fuerza bruta sobre la contraseña administrativa. • http://osvdb.org/81033 http://support.automation.siemens.com/WW/view/en/59869684 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-268149.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf • CWE-287: Improper Authentication •
CVE-2012-1800
https://notcve.org/view.php?id=CVE-2012-1800
Stack-based buffer overflow in the Profinet DCP protocol implementation on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 allows remote attackers to cause a denial of service (device outage) or possibly execute arbitrary code via a crafted DCP frame. Desbordamiento de búfer basado en pila en la implementación del protocolo Profinet DCP en Siemens Scalance S Security Module firewall S602 V2, S612 V2, S613 V2 con el firmware anterior a v2.3.0.3, permite a atacantes remotos causar una denegación de servicio (interrupción del dispositivo) o ejecutar, posiblemente, código arbitrario a través de un marco de DCP manipulado. • http://osvdb.org/81034 http://support.automation.siemens.com/WW/view/en/59869684 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-268149.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •