CVE-2016-7114
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02; SIPROTEC 7SJ686 : All versions < V 4.87; SIPROTEC 7UT686 : All versions < V 4.02; SIPROTEC 7SD686 : All versions < V 4.05; SIPROTEC 7SJ66 : All versions < V 4.30. Attackers with network access to the device's web interface (port 80/tcp) could possibly circumvent authentication and perform certain administrative operations. A legitimate user must be logged into the web interface for the attack to be successful.
Se ha identificado una vulnerabilidad en la variante de Firmware PROFINET IO para los módulos EN100 Ethernet: en todas las versiones anteriores a V1.04.01; la variante de Firmware Modbus TCP para los módulos EN100 Ethernet: en todas las versiones anteriores a V1.11.00; la variante de Firmware v TCP para los módulos EN100 Ethernet: en todas las versiones anteriores a V1.03; la variante de Firmware IEC 104 para los módulos EN100 Ethernet: en todas las versiones anteriores a V1.21 y el módulo EN100 Ethernet incluido en SIPROTEC Merging Unit 6MU80: todas las versiones anteriores a la 1.02.02; SIPROTEC 7SJ686: todas las versiones anteriores a la V 4.87 y SIPROTEC 7UT686: todas las versiones anteriores a la V 4.02 y SIPROTEC 7SD686: todas las versiones anteriores a la V 4.05 y SIPROTEC 7SJ66: todas las versiones anteriores a la V 4.30. Los atacantes que tengan acceso de red a la interfaz web del dispositivo (puerto 80/tcp) podrían omitir la autenticación y realizar ciertas operaciones administrativas. Un usuario legítimo debe tener la sesión iniciada en la interfaz web para que el ataque tenga éxito.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-08-30 CVE Reserved
- 2016-09-06 CVE Published
- 2023-03-07 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/92745 | Vdb Entry | |
http://www.securityfocus.com/bid/99471 | Vdb Entry | |
https://ics-cert.us-cert.gov/advisories/ICSA-17-187-03 | X_refsource_misc | |
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_SSA-323211.pdf | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-630413.pdf | 2018-03-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | En100 Ethernet Module Firmware Search vendor "Siemens" for product "En100 Ethernet Module Firmware" | 4.28 Search vendor "Siemens" for product "En100 Ethernet Module Firmware" and version "4.28" | - |
Affected
| in | Siemens Search vendor "Siemens" | En100 Ethernet Module Search vendor "Siemens" for product "En100 Ethernet Module" | - | - |
Safe
|