First published: Thu Mar 21 2019(Updated: )
A vulnerability has been identified in Firmware variant IEC 61850 for EN100 Ethernet module (All versions < V4.35), Firmware variant MODBUS TCP for EN100 Ethernet module (All versions), Firmware variant DNP3 TCP for EN100 Ethernet module (All versions), Firmware variant IEC104 for EN100 Ethernet module (All versions), Firmware variant Profinet IO for EN100 Ethernet module (All versions), SIPROTEC 5 relays with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.82), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions < V7.58). Specially crafted packets to port 102/tcp could cause a denial-of-service condition in the affected products. A manual restart is required to recover the EN100 module functionality of the affected devices. Successful exploitation requires an attacker with network access to send multiple packets to the affected products or modules. As a precondition the IEC 61850-MMS communication needs to be activated on the affected products or modules. No user interaction or privileges are required to exploit the vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the network functionality of the device, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIPROTEC 5 with CPU variant CP100 | <7.82 | |
Siemens SIPROTEC 5 with CPU variant CP200 | <7.58 | |
Siemens SIPROTEC 5 with CPU variant CP300 | <7.82 | |
Siemens 6MD85 Firmware | ||
Siemens 6MD86 Firmware | ||
Siemens 7KE85 Firmware | ||
Siemens 7SA82 Firmware | ||
Siemens 7SA86 Firmware | ||
Siemens 7SA87 Firmware | ||
Siemens Siprotec 5 7sd82 | ||
Siemens 7SD86 firmware | ||
Siemens 7SD87 Firmware | ||
Siemens Siprotec 5 7SJ82 | ||
Siemens 7SJ85 firmware | ||
Siemens 7SJ86 Firmware | ||
Siemens 7SK82 Firmware | ||
Siemens 7SK85 Firmware | ||
Siemens 7SL82 Firmware | ||
Siemens 7SL86 Firmware | ||
Siemens 7SL87 Firmware | ||
Siemens 7SS85 Firmware | ||
Siemens 7UM85 Firmware | ||
Siemens 7UT82 Firmware | ||
Siemens 7UT85 firmware | ||
Siemens 7UT86 firmware | ||
Siemens 7UT87 Firmware | ||
Siemens 7VK87 | ||
siemens EN100 Ethernet module DNP3 | ||
Siemens EN100 Ethernet Module DNP3 Firmware | ||
Siemens EN100 Ethernet Module IEC 61850 | =4.35 | |
Siemens EN100 Ethernet Module with Firmware variant IEC104 | ||
Siemens EN100 Ethernet Module with MODBUS TCP Firmware | ||
Siemens EN100 Ethernet module PROFINET IO Firmware | ||
siemens EN100 Ethernet module DNP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16563 is a vulnerability identified in Firmware variant IEC 61850 for EN100 Ethernet module.
CVE-2018-16563 affects Siemens Siprotec 5 with CPU Variant CP100, CP200, and CP300, as well as Siemens EN100 Ethernet modules with various firmware variants including IEC 61850, MODBUS TCP, and DNP3 TCP.
The severity of CVE-2018-16563 is medium with a CVSS score of 5.9.
To fix CVE-2018-16563, Siemens recommends updating the affected EN100 Ethernet module firmware to version 4.35 or higher.
You can find more information about CVE-2018-16563 in the Siemens ProductCERT advisory at the following link: [Siemens ProductCERT Advisory](https://cert-portal.siemens.com/productcert/pdf/ssa-104088.pdf)