Siemens SIMATIC S7-300 Profinet-enabled CPU devices with firmware before 3.2.12 and SIMATIC S7-300 Profinet-disabled CPU devices with firmware before 3.3.12 allow remote attackers to cause a denial of service (defect-mode transition) via crafted (1) ISO-TSAP or (2) Profibus packets.
References
Link | Resource |
---|---|
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-818183.pdf | Vendor Advisory |
http://www.securitytracker.com/id/1036089 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-16-161-01 | Mitigation Third Party Advisory US Government Resource |
https://cert-portal.siemens.com/productcert/pdf/ssa-818183.pdf |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Information
Published : 2016-06-27 03:59
Updated : 2020-02-10 07:15
NVD link : CVE-2016-3949
Mitre link : CVE-2016-3949
JSON object : View
CWE
CWE-399
Resource Management Errors
Products Affected
siemens
- simatic_s7-300_with_profitnet_support
- simatic_s7-300_with_profitnet_support_firmware
- simatic_s7-300_without_profitnet_support
- simatic_s7-300_without_profitnet_support_firmware