CVE-2018-4843

Description

A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (All versions < V7.0.3), SIMATIC CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIMATIC ET 200pro IM154-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8F PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200pro IM154-8FX PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIMATIC ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V1.7.0), SIMATIC S7-1500 Software Controller (All versions < V1.7.0), SIMATIC S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIMATIC S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 315T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317T-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 317TF-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319-3 PN/DP (All versions < V3.2.16), SIMATIC S7-300 CPU 319F-3 PN/DP (All versions < V3.2.16), SIMATIC S7-400 CPU 412-2 PN V7 (All versions < V7.0.3), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.9), SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.7), SIMATIC S7-410 CPU family (incl. SIPLUS variants) (All versions < V8.1), SIMATIC WinAC RTX 2010 (All versions < V2010 SP3), SIMATIC WinAC RTX F 2010 (All versions < V2010 SP3), SINUMERIK 828D (All versions < V4.7 SP6 HF1), SIPLUS ET 200S IM151-8 PN/DP CPU (All versions < V3.2.16), SIPLUS ET 200S IM151-8F PN/DP CPU (All versions < V3.2.16), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-300 CPU 314C-2 PN/DP (All versions < V3.3.16), SIPLUS S7-300 CPU 315-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 315F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317-2 PN/DP (All versions < V3.2.16), SIPLUS S7-300 CPU 317F-2 PN/DP (All versions < V3.2.16), SIPLUS S7-400 CPU 414-3 PN/DP V7 (All versions < V7.0.3), SIPLUS S7-400 CPU 416-3 PN/DP V7 (All versions < V7.0.3), Softnet PROFINET IO for PC-based Windows systems (All versions). Responding to a PROFINET DCP request with a specially crafted PROFINET DCP packet could cause a denial of service condition of the requesting system. The security vulnerability could be exploited by an attacker located on the same Ethernet segment (OSI Layer 2) as the targeted device. A manual restart is required to recover the system.

Category

6.5
CVSS
Severity: Medium
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.25%
Vendor Advisory siemens.com
Affected: Siemens SIMATIC S7-400 CPU 414-3 PN/DP V7
Affected: Siemens SIMATIC S7-400 CPU 414F-3 PN/DP V7
Affected: Siemens SIMATIC S7-400 CPU 416-3 PN/DP V7
Affected: Siemens SIMATIC S7-400 CPU 416F-3 PN/DP V7
Affected: Siemens SIMATIC CP 343-1 (incl. SIPLUS variants)
Affected: Siemens SIMATIC CP 343-1 Advanced (incl. SIPLUS variants)
Affected: Siemens SIMATIC CP 443-1
Affected: Siemens SIMATIC CP 443-1
Affected: Siemens SIMATIC CP 443-1 Advanced
Affected: Siemens SIMATIC ET 200pro IM154-8 PN/DP CPU
Affected: Siemens SIMATIC ET 200pro IM154-8F PN/DP CPU
Affected: Siemens SIMATIC ET 200pro IM154-8FX PN/DP CPU
Affected: Siemens SIMATIC ET 200S IM151-8 PN/DP CPU
Affected: Siemens SIMATIC ET 200S IM151-8F PN/DP CPU
Affected: Siemens SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)
Affected: Siemens SIMATIC S7-1500 Software Controller
Affected: Siemens SIMATIC S7-300 CPU 314C-2 PN/DP
Affected: Siemens SIMATIC S7-300 CPU 315-2 PN/DP
Affected: Siemens SIMATIC S7-300 CPU 315F-2 PN/DP
Affected: Siemens SIMATIC S7-300 CPU 315T-3 PN/DP
Affected: Siemens SIMATIC S7-300 CPU 317-2 PN/DP
Affected: Siemens SIMATIC S7-300 CPU 317F-2 PN/DP
Affected: Siemens SIMATIC S7-300 CPU 317T-3 PN/DP
Affected: Siemens SIMATIC S7-300 CPU 317TF-3 PN/DP
Affected: Siemens SIMATIC S7-300 CPU 319-3 PN/DP
Affected: Siemens SIMATIC S7-300 CPU 319F-3 PN/DP
Affected: Siemens SIMATIC S7-400 CPU 412-2 PN V7
Affected: Siemens SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)
Affected: Siemens SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants)
Affected: Siemens SIMATIC S7-410 CPU family (incl. SIPLUS variants)
Affected: Siemens SIMATIC WinAC RTX 2010
Affected: Siemens SIMATIC WinAC RTX F 2010
Affected: Siemens SINUMERIK 828D
Affected: Siemens SIPLUS ET 200S IM151-8 PN/DP CPU
Affected: Siemens SIPLUS ET 200S IM151-8F PN/DP CPU
Affected: Siemens SIPLUS NET CP 443-1
Affected: Siemens SIPLUS NET CP 443-1 Advanced
Affected: Siemens SIPLUS S7-300 CPU 314C-2 PN/DP
Affected: Siemens SIPLUS S7-300 CPU 315-2 PN/DP
Affected: Siemens SIPLUS S7-300 CPU 315F-2 PN/DP
Affected: Siemens SIPLUS S7-300 CPU 317-2 PN/DP
Affected: Siemens SIPLUS S7-300 CPU 317F-2 PN/DP
Affected: Siemens SIPLUS S7-400 CPU 414-3 PN/DP V7
Affected: Siemens SIPLUS S7-400 CPU 416-3 PN/DP V7
Affected: Siemens Softnet PROFINET IO for PC-based Windows systems
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2018-4843?
CVE-2018-4843 has been scored as a medium severity vulnerability.
How to fix CVE-2018-4843?
To fix CVE-2018-4843, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2018-4843 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2018-4843 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2018-4843?
CVE-2018-4843 affects Siemens SIMATIC S7-400 CPU 414-3 PN/DP V7, Siemens SIMATIC S7-400 CPU 414F-3 PN/DP V7, Siemens SIMATIC S7-400 CPU 416-3 PN/DP V7, Siemens SIMATIC S7-400 CPU 416F-3 PN/DP V7, Siemens SIMATIC CP 343-1 (incl. SIPLUS variants), Siemens SIMATIC CP 343-1 Advanced (incl. SIPLUS variants), Siemens SIMATIC CP 443-1, Siemens SIMATIC CP 443-1, Siemens SIMATIC CP 443-1 Advanced, Siemens SIMATIC ET 200pro IM154-8 PN/DP CPU, Siemens SIMATIC ET 200pro IM154-8F PN/DP CPU, Siemens SIMATIC ET 200pro IM154-8FX PN/DP CPU, Siemens SIMATIC ET 200S IM151-8 PN/DP CPU, Siemens SIMATIC ET 200S IM151-8F PN/DP CPU, Siemens SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), Siemens SIMATIC S7-1500 Software Controller, Siemens SIMATIC S7-300 CPU 314C-2 PN/DP, Siemens SIMATIC S7-300 CPU 315-2 PN/DP, Siemens SIMATIC S7-300 CPU 315F-2 PN/DP, Siemens SIMATIC S7-300 CPU 315T-3 PN/DP, Siemens SIMATIC S7-300 CPU 317-2 PN/DP, Siemens SIMATIC S7-300 CPU 317F-2 PN/DP, Siemens SIMATIC S7-300 CPU 317T-3 PN/DP, Siemens SIMATIC S7-300 CPU 317TF-3 PN/DP, Siemens SIMATIC S7-300 CPU 319-3 PN/DP, Siemens SIMATIC S7-300 CPU 319F-3 PN/DP, Siemens SIMATIC S7-400 CPU 412-2 PN V7, Siemens SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), Siemens SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants), Siemens SIMATIC S7-410 CPU family (incl. SIPLUS variants), Siemens SIMATIC WinAC RTX 2010, Siemens SIMATIC WinAC RTX F 2010, Siemens SINUMERIK 828D, Siemens SIPLUS ET 200S IM151-8 PN/DP CPU, Siemens SIPLUS ET 200S IM151-8F PN/DP CPU, Siemens SIPLUS NET CP 443-1, Siemens SIPLUS NET CP 443-1 Advanced, Siemens SIPLUS S7-300 CPU 314C-2 PN/DP, Siemens SIPLUS S7-300 CPU 315-2 PN/DP, Siemens SIPLUS S7-300 CPU 315F-2 PN/DP, Siemens SIPLUS S7-300 CPU 317-2 PN/DP, Siemens SIPLUS S7-300 CPU 317F-2 PN/DP, Siemens SIPLUS S7-400 CPU 414-3 PN/DP V7, Siemens SIPLUS S7-400 CPU 416-3 PN/DP V7, Siemens Softnet PROFINET IO for PC-based Windows systems.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.