支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2017-6865 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC Automation Tool (All versions < V3.0), SIMATIC NET PC-Software (All versions < V14 SP1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1), SIMATIC STEP 7 V5.X (All versions < V5.6), SIMATIC WinAC RTX 2010 SP2 (All versions), SIMATIC WinAC RTX F 2010 SP2 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1), SIMATIC WinCC V7.2 and prior (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Update 15), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd1), SIMATIC WinCC flexible 2008 (All versions < flexible 2008 SP5), SINAUT ST7CC (All versions installed in conjunction with SIMATIC WinCC < V7.3 Update 15), SINEMA Server (All versions < V14), SINUMERIK 808D Programming Tool (All versions < V4.7 SP4 HF2), SMART PC Access (All versions < V2.3), STEP 7 - Micro/WIN SMART (All versions < V2.3), Security Configuration Tool (SCT) (All versions < V5.0). Specially crafted PROFINET DCP broadcast packets sent to the affected products on a local Ethernet segment (Layer 2) could cause a Denial-of-Service condition of some services. The services require manual restart to recover.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
多款Siemens产品输入验证漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Siemens SIMATIC WinCC等都是德国西门子(Siemens)公司的工业自动化产品。Siemens SIMATIC WinCC是一套自动化的数据采集与监控(SCADA)系统;SIMATIC PCS 7是一套使用了WinCC的分布式过程控制系统。 多款Siemens产品存在安全漏洞。攻击者可借助特制的PROFINET DCP broadcast (Layer 2 - Ethernet)数据包利用该漏洞造成拒绝服务。以下产品和版本受到影响:Siemens SIMATIC WinCC (TIA P
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Siemens AGPrimary Setup Tool (PST) All versions < V4.2 HF1 -
Siemens AGSIMATIC Automation Tool All versions < V3.0 -
Siemens AGSIMATIC NET PC-Software All versions < V14 SP1 -
Siemens AGSIMATIC PCS 7 V8.1 All versions -
Siemens AGSIMATIC PCS 7 V8.2 All versions < V8.2 SP1 -
Siemens AGSIMATIC STEP 7 (TIA Portal) V13 All versions < V13 SP2 -
Siemens AGSIMATIC STEP 7 (TIA Portal) V14 All versions < V14 SP1 -
Siemens AGSIMATIC STEP 7 V5.X All versions < V5.6 -
Siemens AGSIMATIC WinAC RTX 2010 SP2 All versions -
Siemens AGSIMATIC WinAC RTX F 2010 SP2 All versions -
Siemens AGSIMATIC WinCC (TIA Portal) V13 All versions < V13 SP2 -
Siemens AGSIMATIC WinCC (TIA Portal) V14 All versions < V14 SP1 -
Siemens AGSIMATIC WinCC V7.2 and prior All versions -
Siemens AGSIMATIC WinCC V7.3 All versions < V7.3 Update 15 -
Siemens AGSIMATIC WinCC V7.4 All versions < V7.4 SP1 Upd1 -
Siemens AGSIMATIC WinCC flexible 2008 All versions < flexible 2008 SP5 -
Siemens AGSINAUT ST7CC All versions installed in conjunction with SIMATIC WinCC < V7.3 Update 15 -
Siemens AGSINEMA Server All versions < V14 -
Siemens AGSINUMERIK 808D Programming Tool All versions < V4.7 SP4 HF2 -
Siemens AGSMART PC Access All versions < V2.3 -
Siemens AGSTEP 7 - Micro/WIN SMART All versions < V2.3 -
Siemens AGSecurity Configuration Tool (SCT) All versions < V5.0 -
Siemens AGSecurity Configuration Tool (SCT) All versions < V5.0 -
二、漏洞 CVE-2017-6865 的公开POC
#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2017-6865 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2017-6865 的评论

暂无评论


发表评论