Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-6865

EPSS 0.08% · P24
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-6865

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC Automation Tool (All versions < V3.0), SIMATIC NET PC-Software (All versions < V14 SP1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1), SIMATIC STEP 7 V5.X (All versions < V5.6), SIMATIC WinAC RTX 2010 SP2 (All versions), SIMATIC WinAC RTX F 2010 SP2 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1), SIMATIC WinCC V7.2 and prior (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Update 15), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd1), SIMATIC WinCC flexible 2008 (All versions < flexible 2008 SP5), SINAUT ST7CC (All versions installed in conjunction with SIMATIC WinCC < V7.3 Update 15), SINEMA Server (All versions < V14), SINUMERIK 808D Programming Tool (All versions < V4.7 SP4 HF2), SMART PC Access (All versions < V2.3), STEP 7 - Micro/WIN SMART (All versions < V2.3), Security Configuration Tool (SCT) (All versions < V5.0). Specially crafted PROFINET DCP broadcast packets sent to the affected products on a local Ethernet segment (Layer 2) could cause a Denial-of-Service condition of some services. The services require manual restart to recover.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Siemens产品输入验证漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Siemens SIMATIC WinCC等都是德国西门子(Siemens)公司的工业自动化产品。Siemens SIMATIC WinCC是一套自动化的数据采集与监控(SCADA)系统;SIMATIC PCS 7是一套使用了WinCC的分布式过程控制系统。 多款Siemens产品存在安全漏洞。攻击者可借助特制的PROFINET DCP broadcast (Layer 2 - Ethernet)数据包利用该漏洞造成拒绝服务。以下产品和版本受到影响:Siemens SIMATIC WinCC (TIA P
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Siemens AGPrimary Setup Tool (PST) All versions < V4.2 HF1 -
Siemens AGSIMATIC Automation Tool All versions < V3.0 -
Siemens AGSIMATIC NET PC-Software All versions < V14 SP1 -
Siemens AGSIMATIC PCS 7 V8.1 All versions -
Siemens AGSIMATIC PCS 7 V8.2 All versions < V8.2 SP1 -
Siemens AGSIMATIC STEP 7 (TIA Portal) V13 All versions < V13 SP2 -
Siemens AGSIMATIC STEP 7 (TIA Portal) V14 All versions < V14 SP1 -
Siemens AGSIMATIC STEP 7 V5.X All versions < V5.6 -
Siemens AGSIMATIC WinAC RTX 2010 SP2 All versions -
Siemens AGSIMATIC WinAC RTX F 2010 SP2 All versions -
Siemens AGSIMATIC WinCC (TIA Portal) V13 All versions < V13 SP2 -
Siemens AGSIMATIC WinCC (TIA Portal) V14 All versions < V14 SP1 -
Siemens AGSIMATIC WinCC V7.2 and prior All versions -
Siemens AGSIMATIC WinCC V7.3 All versions < V7.3 Update 15 -
Siemens AGSIMATIC WinCC V7.4 All versions < V7.4 SP1 Upd1 -
Siemens AGSIMATIC WinCC flexible 2008 All versions < flexible 2008 SP5 -
Siemens AGSINAUT ST7CC All versions installed in conjunction with SIMATIC WinCC < V7.3 Update 15 -
Siemens AGSINEMA Server All versions < V14 -
Siemens AGSINUMERIK 808D Programming Tool All versions < V4.7 SP4 HF2 -
Siemens AGSMART PC Access All versions < V2.3 -
Siemens AGSTEP 7 - Micro/WIN SMART All versions < V2.3 -
Siemens AGSecurity Configuration Tool (SCT) All versions < V5.0 -
Siemens AGSecurity Configuration Tool (SCT) All versions < V5.0 -

II. Public POCs for CVE-2017-6865

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-6865

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2017-6865

No comments yet


Leave a comment