CVE-2017-6867
Published May 11, 2017
Last updated 6 years ago
Overview
- Description
- A vulnerability was discovered in Siemens SIMATIC WinCC (V7.3 before Upd 11 and V7.4 before SP1), SIMATIC WinCC Runtime Professional (V13 before SP2 and V14 before SP1), SIMATIC WinCC (TIA Portal) Professional (V13 before SP2 and V14 before SP1) that could allow an authenticated, remote attacker who is member of the "administrators" group to crash services by sending specially crafted messages to the DCOM interface.
- Source
- productcert@siemens.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 3.6
- Exploitability score
- 1.2
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:N/A:P
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D6229A2-9B8E-4F76-8425-589D2CE58B16" }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F64B795A-7E66-49AE-BE40-E8EEAC12D280" }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):13:sp1:*:*:professional:*:*:*", "vulnerable": true, "matchCriteriaId": "F8FA6B17-FA61-44FC-BAA7-AAC63ECBD996" }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):14:*:*:*:professional:*:*:*", "vulnerable": true, "matchCriteriaId": "B0E21465-76ED-4803-A40A-539500B993F9" }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc_runtime:13:sp1:*:*:professional:*:*:*", "vulnerable": true, "matchCriteriaId": "57CE0216-AA81-416B-88D2-3321D2A2A16D" }, { "criteria": "cpe:2.3:a:siemens:simatic_wincc_runtime:14:*:*:*:professional:*:*:*", "vulnerable": true, "matchCriteriaId": "D8893E54-CF26-448A-9C32-90E5F8D8CC84" } ], "operator": "OR" } ] } ]