A vulnerability has been identified in SIMATIC CP 1543-1 (All versions < V2.0.28), SIPLUS NET CP 1543-1 (All versions < V2.0.28). Under special conditions it was possible to write SNMP variables on port 161/udp which should be read-only and should only be configured with TIA-Portal. A write to these variables could reduce the availability or cause a denial-of-service.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/94436 | Broken Link Third Party Advisory VDB Entry | 
| http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf | Broken Link Patch Vendor Advisory | 
| https://cert-portal.siemens.com/productcert/pdf/ssa-672373.pdf | Vendor Advisory | 
| https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01 | Third Party Advisory US Government Resource | 
| http://www.securityfocus.com/bid/94436 | Broken Link Third Party Advisory VDB Entry | 
| http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf | Broken Link Patch Vendor Advisory | 
| https://cert-portal.siemens.com/productcert/pdf/ssa-672373.pdf | Vendor Advisory | 
| https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01 | Third Party Advisory US Government Resource | 
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-8562 | 
Configurations
                    History
                    22 Oct 2025, 00:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Oct 2025, 20:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Oct 2025, 19:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Nov 2024, 02:59
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/bid/94436 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf - Broken Link, Patch, Vendor Advisory | |
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-672373.pdf - Vendor Advisory | |
| References | () https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01 - Third Party Advisory, US Government Resource | 
24 Jul 2024, 14:26
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:siemens:siplus_net_cp_1543-1:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:siplus_net_cp_1543-1_firmware:*:*:*:*:*:*:*:* | |
| CVSS | v2 : v3 : | v2 : 3.5 v3 : 7.5 | 
| First Time | Siemens siplus Net Cp 1543-1 Firmware Siemens siplus Net Cp 1543-1 | |
| CWE | NVD-CWE-noinfo | |
| References | () http://www.securityfocus.com/bid/94436 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-672373.pdf - Broken Link, Patch, Vendor Advisory | |
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-672373.pdf - Vendor Advisory | |
| References | () https://ics-cert.us-cert.gov/advisories/ICSA-16-327-01 - Third Party Advisory, US Government Resource | 
Information
                Published : 2016-11-18 21:59
Updated : 2025-10-22 00:15
NVD link : CVE-2016-8562
Mitre link : CVE-2016-8562
CVE.ORG link : CVE-2016-8562
JSON object : View
Products Affected
                siemens
- siplus_net_cp_1543-1
- siplus_net_cp_1543-1_firmware
- simatic_cp_1543-1_firmware
- simatic_cp_1543-1
CWE
                