First published: Tue Sep 06 2016(Updated: )
A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02; SIPROTEC 7SJ686 : All versions < V 4.87; SIPROTEC 7UT686 : All versions < V 4.02; SIPROTEC 7SD686 : All versions < V 4.05; SIPROTEC 7SJ66 : All versions < V 4.30. Attackers with network access to the device's web interface (port 80/tcp) could possibly circumvent authentication and perform certain administrative operations. A legitimate user must be logged into the web interface for the attack to be successful.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
siemens EN100 Ethernet module DNP3 | =4.28 | |
siemens EN100 Ethernet module DNP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-7114 is classified as high due to potential unauthorized access to sensitive data.
To fix CVE-2016-7114, update the EN100 Ethernet module firmware to version 1.04.01 or later for PROFINET IO, version 1.11.00 or later for Modbus TCP, and version 1.03 or later for DNP3 TCP.
CVE-2016-7114 affects all versions of the firmware for the EN100 Ethernet module earlier than the specified fixed versions.
CVE-2016-7114 impacts systems utilizing the affected firmware variants of the EN100 Ethernet module including PROFINET IO, Modbus TCP, and DNP3 TCP.
There are no known workarounds for CVE-2016-7114, and the recommended action is to upgrade the firmware to a secure version.