U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-8673

Change History

CVE Modified by MITRE 12/12/2019 2:15:12 PM

Action Type Old Value New Value
Changed Description
Cross-site request forgery (CSRF) vulnerability in the integrated web server on Siemens SIMATIC CP 343-1 Advanced prior to version 3.0.53, SIMATIC CP 443-1 Advanced prior to version 3.2.17, SIMATIC S7-300 CPU, and SIMATIC S7-400 CPU devices allows remote attackers to hijack the authentication of arbitrary users.
A vulnerability has been identified in SIMATIC CP 343-1 Advanced (incl. SIPLUS NET variant) (All versions < V3.0.53), SIMATIC CP 443-1 Advanced (incl. SIPLUS NET variant) (All versions < V3.2.17), SIMATIC S7-300 PN/DP CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-400 PN/DP CPU family (incl. SIPLUS variants) (All versions). The integrated web server at port 80/TCP or port 443/TCP of the affected devices could allow remote attackers to perform actions with the permissions of an authenticated user, provided the targeted user has an active session and is induced to trigger the malicious request.
Added CWE

								
							
							
						
Siemens AG CWE-345
Removed Reference
http://www.securityfocus.com/bid/94460 [Third Party Advisory, VDB Entry]

								
						
Removed Reference
http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-603476.pdf [Vendor Advisory]

								
						
Removed Reference
https://ics-cert.us-cert.gov/advisories/ICSA-16-327-02 [Mitigation, Patch, Third Party Advisory, US Government Resource, VDB Entry]