Siemens SCALANCE S612 Firewall > 2.1 and < Multiple Vulnerabilities (SSA-268149)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.

Synopsis :

The remote Siemens SCALANCE S612 firewall is affected by multiple

Description :

The Siemens SCALANCE S612 firewall device has a firmware version that
is greater than 2.1 and prior to It is, therefore, affected
by the following vulnerabilities :

- A brute-force weakness exists due to a failure to
enforce time delays between failed login attempts. This
allows a remote attacker to perform rapid, multiple
authentication attempts within a short time frame.

- A stack-based buffer overflow vulnerability exists in
the Profinet DCP protocol implementation due to a
failure to correctly handle unexpected input. A remote
attacker, using a specially crafted DCP frame, can crash
the DCP protocol stack, resulting in a denial of service
condition or possible arbitrary code execution.

See also :

Solution :

Upgrade to firmware release or later.

Risk factor :

Critical / CVSS Base Score : 10.0

Family: SCADA

Nessus Plugin ID: 83263 ()

Bugtraq ID: 52923

CVE ID: CVE-2012-1799

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now