![]() ![]() A CVSS v3 base score of 7.5 has been calculated the CVSS vector string is ( AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The vulnerability could allow a denial-of-service condition of the core functionality of the CPU.ĬVE-2018-16561 has been assigned to this vulnerability. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). ![]() Successful exploitation requires an attacker to send a specially crafted S7 communication packet to a communication interface of the CPU. The CPU will remain in DEFECT mode until manual restart. The affected CPUs improperly validate S7 communication packets, which could cause a denial-of-service condition of the CPU. SIMATIC S7-300 CPUs: All versions prior to v3.X.16.Siemens reports the following SIMATIC S7-300 CPU product is affected: Successful exploitation of this vulnerability could crash the device being accessed, resulting in a denial-of-service condition. Vulnerability: Improper Input Validation.ATTENTION: Exploitable remotely/low skill level to exploit. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |