CVE-2018-13805
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability has been identified in SIMATIC ET 200SP Open Controller (All versions >= V2.0 and < V2.1.6), SIMATIC S7-1500 Software Controller (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 incl. F (All versions >= V2.0 and < V2.5). An attacker can cause a denial-of-service condition on the network stack by sending a large number of specially crafted packets to the PLC. The PLC will lose its ability to communicate over the network. This vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no privileges and no user interaction. An attacker could use this vulnerability to compromise availability of the network connectivity. At the time of advisory publication no public exploitation of this vulnerability was known.
Se ha identificado una vulnerabilidad en SIMATIC ET 200SP Open Controller (todas las versiones desde la V2.0 y antes de la V2.1.6), SIMATIC S7-1500 Software Controller (todas las versiones desde la V2.0 y antes de la V2.5) y SIMATIC S7-1500 incl. F (todas las versiones desde la V2.0 y antes de la V2.5). Un atacante puede provocar una condición de denegación de servicio (DoS) en la pila de red mediante el envío de un gran número de paquetes especialmente manipulados al PLC. El PLC perderá su capacidad de comunicarse a través de la red. Esta vulnerabilidad podría ser explotada por atacantes con acceso de red a los sistemas afectados. Su explotación con éxito no requiere privilegios de usuario ni interacción. Un atacante podría usar la vulnerabilidad para comprometer la disponibilidad de la conectividad de red. En el momento de la publicación del advisory, no se conoce ninguna explotación pública de la vulnerabilidad.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-07-10 CVE Reserved
- 2018-10-10 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-347726.pdf | 2019-03-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Siemens Search vendor "Siemens" | Simatic Et 200sp Firmware Search vendor "Siemens" for product "Simatic Et 200sp Firmware" | >= 2.0 Search vendor "Siemens" for product "Simatic Et 200sp Firmware" and version " >= 2.0" | - |
Affected
| in | Siemens Search vendor "Siemens" | Simatic Et 200sp Search vendor "Siemens" for product "Simatic Et 200sp" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Simatic S7-1500 Firmware Search vendor "Siemens" for product "Simatic S7-1500 Firmware" | >= 2.0 < 2.5 Search vendor "Siemens" for product "Simatic S7-1500 Firmware" and version " >= 2.0 < 2.5" | - |
Affected
| in | Siemens Search vendor "Siemens" | Simatic S7-1500 Search vendor "Siemens" for product "Simatic S7-1500" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Simatic S7-1500f Firmware Search vendor "Siemens" for product "Simatic S7-1500f Firmware" | >= 2.0 < 2.5 Search vendor "Siemens" for product "Simatic S7-1500f Firmware" and version " >= 2.0 < 2.5" | - |
Affected
| in | Siemens Search vendor "Siemens" | Simatic S7-1500f Search vendor "Siemens" for product "Simatic S7-1500f" | - | - |
Safe
|