CVE-2017-6865

Description

A vulnerability has been identified in Primary Setup Tool (PST) (All versions < V4.2 HF1), SIMATIC Automation Tool (All versions < V3.0), SIMATIC NET PC-Software (All versions < V14 SP1), SIMATIC PCS 7 V8.1 (All versions), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1), SIMATIC STEP 7 (TIA Portal) V13 (All versions < V13 SP2), SIMATIC STEP 7 (TIA Portal) V14 (All versions < V14 SP1), SIMATIC STEP 7 V5.X (All versions < V5.6), SIMATIC WinAC RTX 2010 SP2 (All versions), SIMATIC WinAC RTX F 2010 SP2 (All versions), SIMATIC WinCC (TIA Portal) V13 (All versions < V13 SP2), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1), SIMATIC WinCC V7.2 and prior (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Update 15), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd1), SIMATIC WinCC flexible 2008 (All versions < flexible 2008 SP5), SINAUT ST7CC (All versions installed in conjunction with SIMATIC WinCC < V7.3 Update 15), SINEMA Server (All versions < V14), SINUMERIK 808D Programming Tool (All versions < V4.7 SP4 HF2), SMART PC Access (All versions < V2.3), STEP 7 - Micro/WIN SMART (All versions < V2.3), Security Configuration Tool (SCT) (All versions < V5.0). Specially crafted PROFINET DCP broadcast packets sent to the affected products on a local Ethernet segment (Layer 2) could cause a Denial-of-Service condition of some services. The services require manual restart to recover.

Category

6.5
CVSS
Severity: Medium
CVSS 3.0 •
CVSS 2.0 •
EPSS 0.08%
Affected: Siemens AG Primary Setup Tool (PST)
Affected: Siemens AG SIMATIC Automation Tool
Affected: Siemens AG SIMATIC NET PC-Software
Affected: Siemens AG SIMATIC PCS 7 V8.1
Affected: Siemens AG SIMATIC PCS 7 V8.2
Affected: Siemens AG SIMATIC STEP 7 (TIA Portal) V13
Affected: Siemens AG SIMATIC STEP 7 (TIA Portal) V14
Affected: Siemens AG SIMATIC STEP 7 V5.X
Affected: Siemens AG SIMATIC WinAC RTX 2010 SP2
Affected: Siemens AG SIMATIC WinAC RTX F 2010 SP2
Affected: Siemens AG SIMATIC WinCC (TIA Portal) V13
Affected: Siemens AG SIMATIC WinCC (TIA Portal) V14
Affected: Siemens AG SIMATIC WinCC V7.2 and prior
Affected: Siemens AG SIMATIC WinCC V7.3
Affected: Siemens AG SIMATIC WinCC V7.4
Affected: Siemens AG SIMATIC WinCC flexible 2008
Affected: Siemens AG SINAUT ST7CC
Affected: Siemens AG SINEMA Server
Affected: Siemens AG SINUMERIK 808D Programming Tool
Affected: Siemens AG SMART PC Access
Affected: Siemens AG STEP 7 - Micro/WIN SMART
Affected: Siemens AG Security Configuration Tool (SCT)
Affected: Siemens AG Security Configuration Tool (SCT)
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2017-6865?
CVE-2017-6865 has been scored as a medium severity vulnerability.
How to fix CVE-2017-6865?
To fix CVE-2017-6865, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2017-6865 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2017-6865 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2017-6865?
CVE-2017-6865 affects Siemens AG Primary Setup Tool (PST), Siemens AG SIMATIC Automation Tool, Siemens AG SIMATIC NET PC-Software, Siemens AG SIMATIC PCS 7 V8.1, Siemens AG SIMATIC PCS 7 V8.2, Siemens AG SIMATIC STEP 7 (TIA Portal) V13, Siemens AG SIMATIC STEP 7 (TIA Portal) V14, Siemens AG SIMATIC STEP 7 V5.X, Siemens AG SIMATIC WinAC RTX 2010 SP2, Siemens AG SIMATIC WinAC RTX F 2010 SP2, Siemens AG SIMATIC WinCC (TIA Portal) V13, Siemens AG SIMATIC WinCC (TIA Portal) V14, Siemens AG SIMATIC WinCC V7.2 and prior, Siemens AG SIMATIC WinCC V7.3, Siemens AG SIMATIC WinCC V7.4, Siemens AG SIMATIC WinCC flexible 2008, Siemens AG SINAUT ST7CC, Siemens AG SINEMA Server, Siemens AG SINUMERIK 808D Programming Tool, Siemens AG SMART PC Access, Siemens AG STEP 7 - Micro/WIN SMART, Siemens AG Security Configuration Tool (SCT), Siemens AG Security Configuration Tool (SCT).
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.