Siemens Scalance S Security Module Firewall < 2.3.0.3 Buffer Overflow

medium Nessus Network Monitor Plugin ID 720016

Synopsis

The web server on the Siemens Scalance S Security Module is vulnerable to a denial of service via stack-based buffer overflow.

Description

Stack-based buffer overflow in the Profinet DCP protocol implementation on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 allows remote attackers to cause a denial of service (device outage) or possibly execute arbitrary code via a crafted DCP frame.

Solution

Perform vendor recommended mitigations and apply available vendor upgrades.

See Also

http://osvdb.org/81034,http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-268149.pdf,http://support.automation.siemens.com/WW/view/en/59869684,https://ics-cert.us-cert.gov/advisories/ICSA-12-102-05,http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf

Plugin Details

Severity: Medium

ID: 720016

Family: SCADA

Published: 5/8/2019

Updated: 9/30/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

Patch Publication Date: 4/11/2012

Vulnerability Publication Date: 4/11/2012

Reference Information

CVE: CVE-2012-1800