CVE Vulnerabilities

CVE-2017-12739

Insecure Default Initialization of Resource

Published: Nov 15, 2017 | Modified: Oct 03, 2019
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
10 HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00. The integrated web server (port 80/tcp) of the affected devices could allow unauthenticated remote attackers to execute arbitrary code on the affected device.

Weakness

The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.

Affected Software

Name Vendor Start Version End Version
Sm-2556_firmware Siemens dnpi00 (including) dnpi00 (including)
Sm-2556_firmware Siemens enos00 (including) enos00 (including)
Sm-2556_firmware Siemens erac00 (including) erac00 (including)
Sm-2556_firmware Siemens eta2 (including) eta2 (including)
Sm-2556_firmware Siemens etls00 (including) etls00 (including)
Sm-2556_firmware Siemens modi00 (including) modi00 (including)

Extended Description

Developers often choose default values that leave the product as open and easy to use as possible out-of-the-box, under the assumption that the administrator can (or should) change the default value. However, this ease-of-use comes at a cost when the default is insecure and the administrator does not change it.

References