4.3
CVSSv2

CVE-2018-4832

Published: 24/04/2018 Updated: 06/10/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability has been identified in OpenPCS 7 V7.1 and previous versions (All versions), OpenPCS 7 V8.0 (All versions), OpenPCS 7 V8.1 (All versions < V8.1 Upd5), OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd1), SIMATIC BATCH V7.1 and previous versions (All versions), SIMATIC BATCH V8.0 (All versions < V8.0 SP1 Upd21), SIMATIC BATCH V8.1 (All versions < V8.1 SP1 Upd16), SIMATIC BATCH V8.2 (All versions < V8.2 Upd10), SIMATIC BATCH V9.0 (All versions < V9.0 SP1), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions < 15 SP1), SIMATIC PCS 7 V7.1 and previous versions (All versions), SIMATIC PCS 7 V8.0 (All versions), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP1), SIMATIC Route Control V7.1 and previous versions (All versions), SIMATIC Route Control V8.0 (All versions), SIMATIC Route Control V8.1 (All versions), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions < V9.0 Upd1), SIMATIC WinCC Runtime Professional V13 (All versions < V13 SP2 Upd2), SIMATIC WinCC Runtime Professional V14 (All versions < V14 SP1 Upd5), SIMATIC WinCC V7.2 and previous versions (All versions < WinCC 7.2 Upd 15), SIMATIC WinCC V7.3 (All versions < WinCC 7.3 Upd 16), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 4), SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). Specially crafted messages sent to the RPC service of the affected products could cause a Denial-of-Service condition on the remote and local communication functionality of the affected products. A reboot of the system is required to recover the remote and local communication functionality. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

siemens openpcs 7 9.0

siemens openpcs 7 8.0

siemens openpcs 7 8.2

siemens openpcs 7

siemens openpcs 7 8.1

siemens simatic batch 8.1

siemens simatic batch 8.0

siemens simatic batch 9.0

siemens simatic batch 7.1

siemens simatic batch 8.2

siemens simatic net pc 15

siemens simatic net pc

siemens simatic pcs 7

siemens simatic pcs 7 8.1

siemens simatic pcs 7 8.0

siemens simatic pcs 7 9.0

siemens simatic pcs 7 8.2

siemens simatic route control

siemens simatic route control 8.0

siemens simatic route control 8.1

siemens simatic route control 9.0

siemens simatic wincc runtime professional 14

siemens simatic wincc runtime professional

siemens simatic wincc runtime professional 13

siemens simatic wincc 7.4

siemens simatic wincc 7.3

siemens simatic wincc 7.2

siemens simatic wincc

siemens sppa-t3000 application server r8.2

siemens sppa-t3000 application server

siemens simatic net pc software

Recent Articles

Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things
The Register • Shaun Nichols in San Francisco • 13 Dec 2019

Arbitrary code execution in a controller, what could go wrong?

Siemens industrial control systems designed specifically for energy plant gear are riddled with dozens of security vulnerabilities that are, luckily enough, tricky to exploit from the outside. The teams at Positive Technologies, Kaspersky Lab, and Biznet Bilisim took credit for finding and reporting 54 CVE-listed flaws in the SPPA-T3000 (PDF), an application server that handles the management of power plant controllers. According to Siemens this week, the control system is "mostly used in fossil...