First published: Tue Mar 10 2020(Updated: )
A vulnerability has been identified in SIPROTEC 4 and SIPROTEC Compact relays equipped with EN100 Ethernet communication modules (All versions). Specially crafted packets sent to port 50000/UDP of the EN100 Ethernet communication modules could cause a Denial-of-Service of the affected device. A manual reboot is required to recover the service of the device. At the time of advisory publication no public exploitation of this security vulnerability was known to Siemens.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIPROTEC 4 | ||
Siemens SIPROTEC Compact EN100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19279 is classified as a Denial-of-Service vulnerability affecting Siemens SIPROTEC 4 and SIPROTEC Compact relays.
To fix CVE-2019-19279, it is recommended to apply the latest security patches provided by Siemens for the affected models.
CVE-2019-19279 affects all versions of Siemens SIPROTEC 4 and SIPROTEC Compact relays equipped with EN100 Ethernet communication modules.
If a device is found vulnerable to CVE-2019-19279, it should be isolated from the network until a patch can be applied.
Yes, CVE-2019-19279 can be exploited remotely by sending specially crafted packets to port 50000/UDP of the affected devices.