In the Siemens 7KM PAC Switched Ethernet PROFINET expansion module (All versions < V2.1.3), a Denial-of-Service condition could be induced by a specially crafted PROFINET DCP packet sent as a local Ethernet (Layer 2) broadcast. The affected component requires a manual restart via the main device to recover.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/100562 | Third Party Advisory VDB Entry | 
| https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-771218.pdf | Vendor Advisory | 
| http://www.securityfocus.com/bid/100562 | Third Party Advisory VDB Entry | 
| https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-771218.pdf | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 03:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/bid/100562 - Third Party Advisory, VDB Entry | |
| References | () https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-771218.pdf - Vendor Advisory | 
Information
                Published : 2017-08-30 19:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-9945
Mitre link : CVE-2017-9945
CVE.ORG link : CVE-2017-9945
JSON object : View
Products Affected
                siemens
- 7km_pac_switched_ethernet_profinet_expansion_module
- 7km_pac_switched_ethernet_profinet_expansion_module_firmware
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
