Denial of service in Siemens 7KM PAC Switched Ethernet



Published: 2017-09-01
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-9945
CWE-ID CWE-400
Exploitation vector Local network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
7KM PAC Switched Ethernet
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Siemens

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Resource exhaustion

EUVDB-ID: #VU8067

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-9945

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows an adajacent attacker to cause DoS condition on the target system.

The weakness exists in the Siemens 7KM PAC Switched Ethernet PROFINET expansion module due to input validation flaw. An adjacent attacker can send a specially crafted PROFINET DCP packet as a local Ethernet (Layer 2) broadcast, cause memory exhaustion and cause the application to restart.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update to version 2.1.3.

Vulnerable software versions

7KM PAC Switched Ethernet: All versions

External links

http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-771218.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###