First published: Fri Nov 18 2016(Updated: )
A vulnerability has been identified in SIMATIC CP 1543-1 (All versions < V2.0.28), SIPLUS NET CP 1543-1 (All versions < V2.0.28). Under special conditions it was possible to write SNMP variables on port 161/udp which should be read-only and should only be configured with TIA-Portal. A write to these variables could reduce the availability or cause a denial-of-service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIMATIC CP | ||
Siemens Simatic CP 1543-1 | ||
Siemens SIMATIC NET CP 1543-1 | ||
All of | ||
Siemens Simatic CP 1543-1 | <2.0.28 | |
Siemens SIMATIC NET CP 1543-1 | ||
All of | ||
Siemens SIPLUS NET CP 1543-1 | <2.0.28 | |
Siemens SIPLUS NET CP 1543-1 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8562 is classified as a high-severity vulnerability due to its potential impact on the security of affected devices.
To fix CVE-2016-8562, upgrade the firmware of SIMATIC CP 1543-1 and SIPLUS NET CP 1543-1 to version 2.0.28 or later.
CVE-2016-8562 affects all versions of SIMATIC CP 1543-1 and SIPLUS NET CP 1543-1 prior to version 2.0.28.
CVE-2016-8562 exploits a flaw that allows writing to SNMP variables on port 161/udp which should be read-only.
Mitigating CVE-2016-8562 without a firmware patch is not recommended, as the patch addresses the core vulnerability.