// For flags

CVE-2018-13805

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability has been identified in SIMATIC ET 200SP Open Controller (All versions >= V2.0 and < V2.1.6), SIMATIC S7-1500 Software Controller (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 incl. F (All versions >= V2.0 and < V2.5). An attacker can cause a denial-of-service condition on the network stack by sending a large number of specially crafted packets to the PLC. The PLC will lose its ability to communicate over the network. This vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no privileges and no user interaction. An attacker could use this vulnerability to compromise availability of the network connectivity. At the time of advisory publication no public exploitation of this vulnerability was known.

Se ha identificado una vulnerabilidad en SIMATIC ET 200SP Open Controller (todas las versiones desde la V2.0 y antes de la V2.1.6), SIMATIC S7-1500 Software Controller (todas las versiones desde la V2.0 y antes de la V2.5) y SIMATIC S7-1500 incl. F (todas las versiones desde la V2.0 y antes de la V2.5). Un atacante puede provocar una condición de denegación de servicio (DoS) en la pila de red mediante el envío de un gran número de paquetes especialmente manipulados al PLC. El PLC perderá su capacidad de comunicarse a través de la red. Esta vulnerabilidad podría ser explotada por atacantes con acceso de red a los sistemas afectados. Su explotación con éxito no requiere privilegios de usuario ni interacción. Un atacante podría usar la vulnerabilidad para comprometer la disponibilidad de la conectividad de red. En el momento de la publicación del advisory, no se conoce ninguna explotación pública de la vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-07-10 CVE Reserved
  • 2018-10-10 CVE Published
  • 2024-08-05 CVE Updated
  • 2024-08-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Simatic Et 200sp Firmware
Search vendor "Siemens" for product "Simatic Et 200sp Firmware"
>= 2.0
Search vendor "Siemens" for product "Simatic Et 200sp Firmware" and version " >= 2.0"
-
Affected
in Siemens
Search vendor "Siemens"
Simatic Et 200sp
Search vendor "Siemens" for product "Simatic Et 200sp"
--
Safe
Siemens
Search vendor "Siemens"
Simatic S7-1500 Firmware
Search vendor "Siemens" for product "Simatic S7-1500 Firmware"
>= 2.0 < 2.5
Search vendor "Siemens" for product "Simatic S7-1500 Firmware" and version " >= 2.0 < 2.5"
-
Affected
in Siemens
Search vendor "Siemens"
Simatic S7-1500
Search vendor "Siemens" for product "Simatic S7-1500"
--
Safe
Siemens
Search vendor "Siemens"
Simatic S7-1500f Firmware
Search vendor "Siemens" for product "Simatic S7-1500f Firmware"
>= 2.0 < 2.5
Search vendor "Siemens" for product "Simatic S7-1500f Firmware" and version " >= 2.0 < 2.5"
-
Affected
in Siemens
Search vendor "Siemens"
Simatic S7-1500f
Search vendor "Siemens" for product "Simatic S7-1500f"
--
Safe