Unauthenticated Firmware Manipulation in Siemens EN100 Ethernet Modules
CVE-2018-4838

7.5HIGH

Summary

A vulnerability in Siemens EN100 Ethernet modules has been identified, which allows unauthenticated users to manipulate the firmware through the web interface on TCP port 80. This could enable attackers to upgrade or downgrade the device's firmware to earlier versions that contain known vulnerabilities, putting the device and the network at risk. The affected products span various communication protocols, including IEC 61850, DNP3, PROFINET IO, Modbus TCP, and IEC 104. It is crucial for users to secure their devices by applying the latest firmware updates.

Affected Version(s)

EN100 Ethernet module DNP3 variant All versions < V1.04

EN100 Ethernet module IEC 104 variant All versions < V1.22

EN100 Ethernet module IEC 61850 variant All versions < V4.30

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.