Vulnerability Details : CVE-2016-2201
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.
Products affected by CVE-2016-2201
- cpe:2.3:o:siemens:simatic_s7-1500_cpu_firmware:1.8.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-2201
1.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-2201
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2016-2201
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-2201
-
http://www.securitytracker.com/id/1034954
Siemens SIMATIC S7-1500 CPU Controller Bugs Let Remote Users Bypass Replay Security Mechanisms and Deny Service - SecurityTrackerThird Party Advisory;VDB Entry
-
https://ics-cert.us-cert.gov/advisories/ICSA-16-040-02
Siemens SIMATIC S7-1500 CPU Vulnerabilities | CISAThird Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/83110
Siemens SIMATIC S7-1500 CVE-2016-2201 Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://cert-portal.siemens.com/productcert/pdf/ssa-253230.pdf
-
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-253230.pdf
Vendor Advisory
Jump to