CVE-2017-2681 is a vulnerability in Siemens Simatic S7 1500 Software Controller
Published on May 11, 2017
Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.
Weakness Type
What is a Resource Exhaustion Vulnerability?
The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CVE-2017-2681 has been classified to as a Resource Exhaustion vulnerability or weakness.
Products Associated with CVE-2017-2681
Want to know whenever a new CVE is published for Siemens Simatic S7 1500 Software Controller? stack.watch will email you.
Affected Versions
Siemens Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller:- Version All versions < V4.1.1 Patch04 is affected.
- Version All versions < V4.2.1 Patch03 is affected.
- Version All versions < V4.4.0 Patch01 is affected.
- Version All versions is affected.
- Version All versions < V3.0 is affected.
- Version All versions < V4.03 is affected.
- Version All versions < V6.1 is affected.
- Version All versions < V5.2.2 is affected.
- Version All versions < V5.4.0 is affected.
- Version All versions < V4.1.0 is affected.
- Version All versions < V4.1.0 is affected.
- Version All versions < V3.10.2 is affected.
- Version All versions < V6.1 is affected.
- Version All versions < V6.1 is affected.
- Version All versions < V2.0 is affected.
- Version All versions < V1.0.15 is affected.
- Version All versions < V2.1.82 is affected.
- Before * is affected.
- Version All versions is affected.
- Version All versions < V2.1.82 is affected.
- Version All versions < V1.0.15 is affected.
- Version All versions < V2.1 is affected.
- Version All versions < V1.0.15 is affected.
- Version All versions < V2.7 is affected.
- Version All versions < V2.7 is affected.
- Version All versions < V3.1.3 is affected.
- Version All versions is affected.
- Version All versions < V3.1.3 is affected.
- Version All versions < V3.2.17 is affected.
- Version All versions < V3.2.17 is affected.
- Version All versions is affected.
- Version All versions < V2.7 is affected.
- Before V1.0.2 is affected.
- Version All versions is affected.
- Before V4.0.1 is affected.
- Before V4.2.0 is affected.
- Before V4.1.0 is affected.
- Before * is affected.
- Before * is affected.
- Before * is affected.
- Before V4.2.0 is affected.
- Before V4.0.1 is affected.
- Before V4.1.0 is affected.
- Before V4.1.0 is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions < V15.1 is affected.
- Before V7.0.6 is affected.
- Before V7.0.6 is affected.
- Before V7.0.6 is affected.
- Before V7.0.6 is affected.
- Before V7.0.6 is affected.
- Before V7.0.6 is affected.
- Before V7.0.6 is affected.
- Version All versions < V4.0 is affected.
- Version All versions < V3.0 is affected.
- Version All versions < V3.0 is affected.
- Version All versions < V3.0 is affected.
- Version All versions < V4.2.1 is affected.
- Version All versions < V2.1 is affected.
- Version All versions < V2.1 is affected.
- Version All versions < V2.3 is affected.
- Before V3.X.14 is affected.
- Before V6.0.7 is affected.
- Before V6.0.6 is affected.
- Before V7.0.2 is affected.
- Version All versions < V8.2 is affected.
- Before V1.1.8 is affected.
- Before V1.1.1 is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions < V2010 SP3 is affected.
- Version All versions < V2010 SP3 is affected.
- Version All versions < V2.0.0 is affected.
- Version All versions < V4.5 HF1 is affected.
- Version All versions < V1.4 SP1 HF5 is affected.
- Version All versions < V1.2 HF1 is affected.
- Version All versions < V4.7 SP6 HF3 is affected.
- Version All versions < V4.7 SP6 HF3 is affected.
- Version All versions < V4.7 HF27 is affected.
- Version All versions < V4.8 HF4 is affected.
- Version V4.7: All versions < V4.7 HF27 is affected.
- Version All versions < V4.8 HF4 is affected.
- Version All versions < V4.4 SP3 HF5 is affected.
- Version All versions < V4.7 is affected.
- Version All versions is affected.
- Version All versions < V4.7 HF27 is affected.
- Version All versions < V4.8 HF4 is affected.
- Version All versions < V4.7 HF27 is affected.
- Version All versions < V4.8 HF4 is affected.
- Version All versions < V1.01 is affected.
- Version All versions < V4.5 SP6 HF2 is affected.
- Version All versions < V4.7 SP4 HF1 is affected.
- Version All versions < V4.5 SP6 HF2 is affected.
- Version All versions < V4.7 SP4 HF1 is affected.
- Before V4.2.0 is affected.
- Before V4.2.0 is affected.
- Before V4.2.0 is affected.
- Before V4.1.0 is affected.
- Before V4.1.0 is affected.
- Before V4.2.0 is affected.
- Before V4.2.0 is affected.
- Before V4.2.0 is affected.
- Before V4.1.0 is affected.
- Before V4.1.0 is affected.
- Before V4.1.0 is affected.
- Before V4.1.0 is affected.
- Version All versions < V1.1.0 is affected.
- Version All versions is affected.
- Version All versions is affected.
- Version All versions < V1.2.0 is affected.
- Version All versions < V2.2.0 is affected.
- Version All versions < V14 SP1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.