Remote Code Execution Vulnerability in Siemens SICAM RTUs
CVE-2017-12739
9.8CRITICAL
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 15 November 2017
Summary
A vulnerability exists in the integrated web server of Siemens SICAM RTUs SM-2556 COM Modules that allows unauthenticated remote attackers to execute arbitrary code. This potential exploitation opens significant security risks to affected systems, specifically those running firmware versions ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00. Users are advised to review their configurations and apply security updates to mitigate risks.
Affected Version(s)
Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00 Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved