First published: Tue Sep 06 2016(Updated: )
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02. Attackers with network access to the device's web interface (port 80/tcp) could possibly circumvent authentication and perform certain administrative operations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
siemens EN100 Ethernet module DNP3 | <=4.28 | |
siemens EN100 Ethernet module DNP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7112 is classified as a high-severity vulnerability due to its impact on various firmware variants of the EN100 Ethernet module.
To mitigate CVE-2016-7112, users should upgrade the firmware of the EN100 Ethernet module to versions equal to or greater than V1.04.01 for PROFINET IO, V1.11.00 for Modbus TCP, and V1.03 for DNP3 TCP.
CVE-2016-7112 affects all versions of the firmware for the EN100 Ethernet module prior to V1.04.01 for PROFINET IO, V1.11.00 for Modbus TCP, and V1.03 for DNP3 TCP.
CVE-2016-7112 impacts the Siemens EN100 Ethernet module across multiple firmware variants.
There are currently no documented workarounds for CVE-2016-7112 aside from upgrading the firmware to the appropriate versions.