7.5
CWE
20
Advisory Published
Updated

CVE-2018-4832: Input Validation

First published: Tue Apr 24 2018(Updated: )

A vulnerability has been identified in OpenPCS 7 V7.1 and earlier (All versions), OpenPCS 7 V8.0 (All versions), OpenPCS 7 V8.1 (All versions < V8.1 Upd5), OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd1), SIMATIC BATCH V7.1 and earlier (All versions), SIMATIC BATCH V8.0 (All versions < V8.0 SP1 Upd21), SIMATIC BATCH V8.1 (All versions < V8.1 SP1 Upd16), SIMATIC BATCH V8.2 (All versions < V8.2 Upd10), SIMATIC BATCH V9.0 (All versions < V9.0 SP1), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions < 15 SP1), SIMATIC PCS 7 V7.1 and earlier (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP1), SIMATIC Route Control V7.1 and earlier (All versions), SIMATIC Route Control V8.0 (All versions), SIMATIC Route Control V8.1 (All versions), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions < V9.0 Upd1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Upd2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Upd5), SIMATIC WinCC V7.2 and earlier (All versions < WinCC 7.2 Upd 15), SIMATIC WinCC V7.3 (All versions < WinCC 7.3 Upd 16), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 4), SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). Specially crafted messages sent to the RPC service of the affected products could cause a Denial-of-Service condition on the remote and local communication functionality of the affected products. A reboot of the system is required to recover the remote and local communication functionality. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Credit: productcert@siemens.com

Affected SoftwareAffected VersionHow to fix
Siemens Openpcs 7<=7.1
Siemens Openpcs 7=8.0
Siemens Openpcs 7=8.1
Siemens Openpcs 7=8.1-upd_1
Siemens Openpcs 7=8.1-upd_2
Siemens Openpcs 7=8.1-upd_3
Siemens Openpcs 7=8.1-upd_4
Siemens Openpcs 7=8.2
Siemens Openpcs 7=9.0
Siemens Simatic Batch=7.1
Siemens Simatic Batch=8.0
Siemens Simatic Batch=8.0-sp1_upd20
Siemens Simatic Batch=8.1
Siemens Simatic Batch=8.1-sp1_upd14
Siemens Simatic Batch=8.1-sp1_upd15
Siemens Simatic Batch=8.2
Siemens Simatic Batch=8.2-upd_9
Siemens Simatic Batch=9.0
Siemens Simatic Net Pc<15
Siemens Simatic Net Pc=15
SIEMENS SIMATIC PCS 7<=7.1
SIEMENS SIMATIC PCS 7=8.0
SIEMENS SIMATIC PCS 7=8.1
SIEMENS SIMATIC PCS 7=8.2
SIEMENS SIMATIC PCS 7=9.0
Siemens Simatic Route Control<=7.1
Siemens Simatic Route Control=8.0
Siemens Simatic Route Control=8.1
Siemens Simatic Route Control=9.0
Siemens Simatic Wincc Runtime Professional<13
Siemens Simatic Wincc Runtime Professional=13
Siemens Simatic Wincc Runtime Professional=13-sp2_upd_1
Siemens Simatic Wincc Runtime Professional=14
Siemens Simatic Wincc Runtime Professional=14-sp1_upd_4
Siemens Simatic WinCC<7.2
Siemens Simatic WinCC=7.2
Siemens Simatic WinCC=7.2-upd_14
Siemens Simatic WinCC=7.3
Siemens Simatic WinCC=7.3-upd_15
Siemens Simatic WinCC=7.4
Siemens Simatic WinCC=7.4-sp1
Siemens Simatic WinCC=7.4-sp1_upd_3
Siemens Sppa-t3000 Application Server<r8.2
Siemens Sppa-t3000 Application Server=r8.2
Siemens Sppa-t3000 Application Server=r8.2-sp1
Siemens Simatic Net Pc Software<14.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2018-4832?

    The severity of CVE-2018-4832 is high.

  • Which software versions are affected by CVE-2018-4832?

    OpenPCS 7 V7.1 and earlier, OpenPCS 7 V8.0, OpenPCS 7 V8.1 (versions < V8.1 Upd5), OpenPCS 7 V8.2, OpenPCS 7 V9.0 (versions < V9.0 Upd1), SIMATIC BATCH V7.1 and earlier, SIMATIC BATCH V8.0, SIMATIC BATCH V8.1, SIMATIC BATCH V8.1 (versions < V8.1 Upd5), SIMATIC BATCH V8.2, SIMATIC BATCH V9.0 (versions < V9.0 Upd1) are affected by CVE-2018-4832.

  • How can I fix CVE-2018-4832?

    Apply the necessary updates or patches provided by Siemens to fix CVE-2018-4832.

  • What is the Common Weakness Enumeration (CWE) ID of CVE-2018-4832?

    The CWE ID of CVE-2018-4832 is 20.

  • Where can I find more information about CVE-2018-4832?

    You can find more information about CVE-2018-4832 in the following references: [1](http://packetstormsecurity.com/files/155665/Siemens-Security-Advisory-SPPA-T3000-Code-Execution.html), [2](https://cert-portal.siemens.com/productcert/pdf/ssa-348629.pdf), [3](https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203