First published: Mon Feb 08 2016(Updated: )
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service (STOP mode transition) via crafted packets on TCP port 102.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC S7-1511-1 PN CPU | ||
Siemens SIMATIC S7-1511C-1 PN CPU | ||
Siemens SIMATIC S7-1500 CPU 1511f-1 PN | ||
Siemens SIMATIC S7-1500 CPU 1512C-1 PN | ||
Siemens SIMATIC S7-1513-1 PN CPU | ||
Siemens SIMATIC S7-1500 CPU 1513f-1 PN | ||
Siemens SIMATIC S7-1515-2 PN CPU | ||
Siemens SIMATIC S7-1515F-2 PN CPU | ||
Siemens SIMATIC s7-1516-3 pn/dp CPU | ||
Siemens SIMATIC s7-1516f-3 pn/dp CPU | ||
Siemens SIMATIC S7-1517-3 PN/DP CPU | ||
Siemens SIMATIC s7-1517f-3 pn/dp CPU | ||
Siemens SIMATIC S7-1518-4 PN/DP CPU | ||
Siemens SIMATIC s7-1518f-4 pn/dp CPU | ||
Siemens S7-1500 CPU firmware | <=1.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2200 has a medium severity rating due to its ability to cause a denial of service condition.
To mitigate CVE-2016-2200, upgrade the Siemens SIMATIC S7-1500 CPU firmware to version 1.8.3 or later.
CVE-2016-2200 affects Siemens SIMATIC S7-1500 CPU devices running firmware versions prior to 1.8.3.
Exploiting CVE-2016-2200 may result in a denial of service, causing potential disruptions but not directly leading to data loss.
CVE-2016-2200 is associated with a remote denial of service attack through crafted packets sent to TCP port 102.