First published: Wed Oct 10 2018(Updated: )
A vulnerability has been identified in SIMATIC ET 200SP Open Controller (All versions >= V2.0 and < V2.1.6), SIMATIC S7-1500 Software Controller (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 incl. F (All versions >= V2.0 and < V2.5). An attacker can cause a denial-of-service condition on the network stack by sending a large number of specially crafted packets to the PLC. The PLC will lose its ability to communicate over the network. This vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no privileges and no user interaction. An attacker could use this vulnerability to compromise availability of the network connectivity. At the time of advisory publication no public exploitation of this vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Simatic Et 200sp Firmware | >=2.0 | |
Siemens Simatic Et 200sp | ||
Siemens Simatic S7-1500 Firmware | >=2.0<2.5 | |
Siemens Simatic S7-1500 | ||
Siemens Simatic S7-1500f Firmware | >=2.0<2.5 | |
Siemens Simatic S7-1500f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13805 is a vulnerability identified in SIMATIC ET 200SP Open Controller and SIMATIC S7-1500 Software Controller.
The severity of CVE-2018-13805 is high with a CVSS score of 7.5.
CVE-2018-13805 affects Siemens Simatic ET 200SP firmware versions >= V2.0 and < V2.1.6.
CVE-2018-13805 affects Siemens Simatic S7-1500 firmware versions >= V2.0 and < V2.5.
An attacker can cause a denial-of-service condition on the affected devices.