CWE
287
Advisory Published
Updated

CVE-2016-7114

First published: Tue Sep 06 2016(Updated: )

A vulnerability has been identified in Firmware variant PROFINET IO for EN100 Ethernet module : All versions < V1.04.01; Firmware variant Modbus TCP for EN100 Ethernet module : All versions < V1.11.00; Firmware variant DNP3 TCP for EN100 Ethernet module : All versions < V1.03; Firmware variant IEC 104 for EN100 Ethernet module : All versions < V1.21; EN100 Ethernet module included in SIPROTEC Merging Unit 6MU80 : All versions < 1.02.02; SIPROTEC 7SJ686 : All versions < V 4.87; SIPROTEC 7UT686 : All versions < V 4.02; SIPROTEC 7SD686 : All versions < V 4.05; SIPROTEC 7SJ66 : All versions < V 4.30. Attackers with network access to the device's web interface (port 80/tcp) could possibly circumvent authentication and perform certain administrative operations. A legitimate user must be logged into the web interface for the attack to be successful.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
siemens EN100 Ethernet module DNP3=4.28
siemens EN100 Ethernet module DNP3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-7114?

    The severity of CVE-2016-7114 is classified as high due to potential unauthorized access to sensitive data.

  • How do I fix CVE-2016-7114?

    To fix CVE-2016-7114, update the EN100 Ethernet module firmware to version 1.04.01 or later for PROFINET IO, version 1.11.00 or later for Modbus TCP, and version 1.03 or later for DNP3 TCP.

  • Which versions are affected by CVE-2016-7114?

    CVE-2016-7114 affects all versions of the firmware for the EN100 Ethernet module earlier than the specified fixed versions.

  • What systems are impacted by CVE-2016-7114?

    CVE-2016-7114 impacts systems utilizing the affected firmware variants of the EN100 Ethernet module including PROFINET IO, Modbus TCP, and DNP3 TCP.

  • Is there a workaround for CVE-2016-7114?

    There are no known workarounds for CVE-2016-7114, and the recommended action is to upgrade the firmware to a secure version.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203