First published: Sat Jul 18 2015(Updated: )
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02. Specially crafted packets sent to port 50000/UDP could cause a denial-of-service of the affected device. A manual reboot may be required to recover the service of the device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIPROTEC firmware | =4.24 | |
Siemens SIPROTEC 4 | ||
Siemens SIPROTEC Compact EN100 |
http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-732541.pdf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5374 is classified as a medium severity vulnerability.
To fix CVE-2015-5374, update the firmware to the latest versions of PROFINET IO, Modbus TCP, or DNP3 TCP for the EN100 Ethernet module.
CVE-2015-5374 affects Siemens SIPROTEC firmware versions prior to 4.24 and related EN100 Ethernet module firmware versions.
Currently, there are no specific workarounds for CVE-2015-5374 other than patching the affected firmware.
CVE-2015-5374 was reported in 2015.