First published: Wed Apr 17 2019(Updated: )
A vulnerability has been identified in SIMATIC S7-1500 CPU (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 CPU (All versions <= V1.8.5). Specially crafted network packets sent to port 80/tcp or 443/tcp could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems on port 80/tcp or 443/tcp. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens S7-1500 Firmware | <=1.8.5 | |
Siemens S7-1500 Firmware | >=2.0<2.5 | |
Siemens Simatic S7-1500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16559 is classified as a high-severity vulnerability due to its potential to cause a Denial-of-Service condition.
To fix CVE-2018-16559, you should upgrade the affected Siemens SIMATIC S7-1500 firmware to a version that is V2.5 or higher.
CVE-2018-16559 affects Siemens SIMATIC S7-1500 CPUs with firmware versions between V2.0 and V2.5 and versions up to V1.8.5.
CVE-2018-16559 allows unauthenticated remote attackers to perform a Denial-of-Service attack via specially crafted network packets sent to port 80/tcp or 443/tcp.
Yes, CVE-2018-16559 can be exploited remotely by sending crafted network packets without requiring authentication.