First published: Wed Apr 17 2019(Updated: )
A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). An attacker with network access to port 23/tcp could extract internal communication data or cause a Denial-of-Service condition. Successful exploitation requires network access to a vulnerable device. At the time of advisory publication no public exploitation of this vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens CP 1604 Firmware | <=2.8 | |
Siemens Simatic CP 1604 | ||
Siemens CP 1616 Firmware | <=2.8 | |
Siemens CP 1616 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13808 is classified as a high-severity vulnerability due to its potential for data extraction and Denial-of-Service impact.
To mitigate CVE-2018-13808, ensure that your Siemens CP 1604 and CP 1616 firmware are updated to the latest versions beyond 2.8, and restrict network access to port 23/tcp.
CVE-2018-13808 affects all versions of Siemens CP 1604 and CP 1616 devices.
An attacker exploiting CVE-2018-13808 could extract internal communication data or potentially cause a Denial-of-Service condition.
Yes, CVE-2018-13808 is exploitable remotely by an attacker with network access to the affected devices.