Siemens Scalance S Improper Restriction of Operations within the Bounds of a Memory Buffer (CVE-2012-1800)

medium Tenable OT Security Plugin ID 502794

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Stack-based buffer overflow in the Profinet DCP protocol implementation on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 allows remote attackers to cause a denial of service (device outage) or possibly execute arbitrary code via a crafted DCP frame.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

http://osvdb.org/81034

http://support.automation.siemens.com/WW/view/en/59869684

http://www.nessus.org/u?f5aa672c

http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf

Plugin Details

Severity: Medium

ID: 502794

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 12/4/2024

Updated: 12/5/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2012-1800

Vulnerability Information

CPE: cpe:/h:siemens:scalance_s613:v2, cpe:/h:siemens:scalance_s612:v2, cpe:/h:siemens:scalance_s602:v2

Required KB Items: Tenable.ot/Siemens

Exploit Ease: No known exploits are available

Patch Publication Date: 4/18/2012

Vulnerability Publication Date: 4/18/2012

Reference Information

CVE: CVE-2012-1800

CWE: 119

ICSA: 12-102-05