First published: Mon Jun 27 2016(Updated: )
Siemens SIMATIC S7-300 Profinet-enabled CPU devices with firmware before 3.2.12 and SIMATIC S7-300 Profinet-disabled CPU devices with firmware before 3.3.12 allow remote attackers to cause a denial of service (defect-mode transition) via crafted (1) ISO-TSAP or (2) Profibus packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic S7-300 With Profitnet Support Firmware | =3.2.11 | |
Siemens Simatic S7-300 | ||
Siemens Simatic S7-300 Without Profitnet Support Firmware | ||
Siemens Simatic S7-300 Without Profitnet Support | =3.3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3949 is classified as a high-severity vulnerability due to its potential to cause denial of service in affected Siemens devices.
To mitigate CVE-2016-3949, update the firmware to version 3.2.12 or higher for Profinet-enabled CPUs and to version 3.3.12 or higher for Profinet-disabled CPUs.
CVE-2016-3949 affects Siemens SIMATIC S7-300 Profinet-enabled CPUs with firmware before 3.2.12 and Profinet-disabled CPUs with firmware before 3.3.12.
CVE-2016-3949 allows remote attackers to perform denial of service attacks via crafted ISO-TSAP or Profibus packets.
Yes, CVE-2016-3949 is exploitable remotely, allowing attackers to send malicious packets to affect the operation of the device.