First published: Tue Sep 06 2016(Updated: )
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02. Specially crafted packets sent to port 80/tcp could cause the affected device to go into defect mode.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
siemens EN100 Ethernet module DNP3 | =4.28 | |
siemens EN100 Ethernet module DNP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7113 is classified as a medium severity vulnerability due to potential unauthorized access or manipulation.
To fix CVE-2016-7113, update your Siemens EN100 Ethernet module firmware to version 1.04.01 or a later version for PROFINET IO, version 1.11.00 or higher for Modbus TCP, and version 1.03 or higher for DNP3 TCP.
All versions of the Siemens EN100 Ethernet module firmware prior to version 1.04.01 for PROFINET IO, version 1.11.00 for Modbus TCP, and version 1.03 for DNP3 TCP are affected by CVE-2016-7113.
As of now, there are no public reports indicating that CVE-2016-7113 is being actively exploited in the wild.
CVE-2016-7113 can potentially lead to unauthorized access, data manipulation, or disruption of operations if left unpatched.