Vulnerability Description
A vulnerability has been identified in SIMATIC S7-1500 CPU (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 CPU (All versions <= V1.8.5). Specially crafted network packets sent to port 80/tcp or 443/tcp could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems on port 80/tcp or 443/tcp. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | Simatic S7-1500 Firmware | <= 1.8.5 |
| Siemens | Simatic S7-1500 | - |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-180635.pdfVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-180635.pdfVendor Advisory
FAQ
What is CVE-2018-16558?
CVE-2018-16558 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability has been identified in SIMATIC S7-1500 CPU (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 CPU (All versions <= V1.8.5). Specially crafted network packets sent to port 80/tcp or 443...
How severe is CVE-2018-16558?
CVE-2018-16558 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16558?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens Simatic S7-1500 Firmware, Siemens Simatic S7-1500.