CVE-2016-8562

A vulnerability has been identified in SIMATIC CP 1543-1 (All versions < V2.0.28), SIPLUS NET CP 1543-1 (All versions < V2.0.28). Under special conditions it was possible to write SNMP variables on port 161/udp which should be read-only and should only be configured with TIA-Portal. A write to these variables could reduce the availability or cause a denial-of-service.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*

History

22 Jan 2025, 19:30

Type Values Removed Values Added
References (MISC) https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01 - Third Party Advisory, US Government Resource
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-672373.pdf - Vendor Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-672373.pdf - Vendor Advisory
References (BID) http://www.securityfocus.com/bid/94436 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94436 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf - Broken Link, Patch, Vendor Advisory () http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf - Broken Link, Patch, Vendor Advisory

24 Jul 2024, 14:26

Type Values Removed Values Added
First Time Siemens siplus Net Cp 1543-1
Siemens siplus Net Cp 1543-1 Firmware
CPE cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:*
cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*
CWE CWE-20 NVD-CWE-noinfo
CVSS v2 : 3.5
v3 : 5.3
v2 : 3.5
v3 : 7.5
References (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-672373.pdf - (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-672373.pdf - Vendor Advisory
References (CONFIRM) http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf - Patch, Vendor Advisory (CONFIRM) http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf - Broken Link, Patch, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/94436 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/94436 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01 - (MISC) https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01 - Third Party Advisory, US Government Resource

Information

Published : 2016-11-18 21:59

Updated : 2025-03-14 15:30


NVD link : CVE-2016-8562

Mitre link : CVE-2016-8562


JSON object : View

Products Affected

siemens

  • simatic_cp_1543-1_firmware
  • siplus_net_cp_1543-1
  • simatic_cp_1543-1
  • siplus_net_cp_1543-1_firmware