First published: Wed Dec 12 2018(Updated: )
A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). Specially crafted network packets sent to port 102/tcp (ISO-TSAP) could allow a remote attacker to either cause a Denial-of-Service condition of the integrated software firewall or allow to execute code in the context of the software firewall. The security vulnerability could be exploited by an attacker with network access to the affected systems on port 102/tcp. Successful exploitation requires no user privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SINUMERIK 808D Firmware | ||
Siemens SINUMERIK 808D Firmware | ||
Siemens SINUMERIK 808D V4.8 Firmware | ||
Siemens SINUMERIK 808D V4.8 Firmware | ||
Siemens SINUMERIK 840D sl V4.7 | <=4.7 | |
Siemens SINUMERIK 840D sl | ||
Siemens SINUMERIK 840D sl V4.8 | <=4.8 | |
Siemens SINUMERIK 840D sl V4.8 firmware | ||
Siemens Sinumerik 828D Firmware | <=4.7 | |
Siemens SINUMERIK 828D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11466 has been assigned a moderate severity level, indicating it could lead to potential security issues if exploited.
To fix CVE-2018-11466, update to SINUMERIK 808D V4.8 SP3 or later, or SINUMERIK 840D sl V4.7 SP6 HF5 or later.
CVE-2018-11466 affects SINUMERIK 808D (V4.7, V4.8), SINUMERIK 828D (V4.7 < V4.7 SP6 HF1), and SINUMERIK 840D sl (V4.7 < V4.7 SP6 HF5, V4.8 < V4.8 SP3).
CVE-2018-11466 was discovered due to vulnerabilities found in the processing of specially crafted network packets.
Currently, there are no documented workarounds for CVE-2018-11466, so updating to the patched versions is recommended.