Research Lab

Positive Technologies Research Team and SecurityLab are willing to cooperate with independent researches in the analysis of the discovered vulnerabilities, in contacts with software vendors and CVE Number Reservation process. The vulnerabilities will be published in sections "Laboratory" and PT-advisory. The name of the researches will be preserved.

Our disclosure policy: en.securitylab.ru/lab/disclosure-policy.php

Severity:   High (7.5) (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
Vulnerability status:   Patched
Exploitation vector:   Remote
Vendor:   Siemens
Product:   EN100 Ethernet module IEC 61850 variant
EN100 Ethernet module PROFINET IO variant
EN100 Ethernet module Modbus TCP variant
EN100 Ethernet module DNP3 variant
EN100 Ethernet module IEC 104 variant
 
Identifier:   PT-2018-05   Advisory published: 17.12.2015
CVE ID:   CVE-2018-4838   Fix issued: 08-03-2018
Discovered by:
Ilya Karpov, Alexey Stennikov, Positive Research Center (Positive Technologies Company)
 
Severity:   High (9.0) (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Vulnerability status:   Patched
Exploitation vector:   Remote
Vendor:   Siemens
Product:   SIPROTEC 4 7SJ66
SIPROTEC Compact 7SK80
SIPROTEC Compact 7SJ80
SIPROTEC Compact
SIPROTEC 4
 
Identifier:   PT-2018-04   Advisory published: 17.12.2015
CVE ID:   CVE-2018-4839   Fix issued: 08-03-2018
Discovered by:
Ilya Karpov, Dmitry Sklyarov, Positive Research Center (Positive Technologies Company)
 
Severity:   High (10) (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Vulnerability status:   Patched
Exploitation vector:   Remote
Vendor:   Siemens
Product:   DIGSI 4
EN100 Ethernet module IEC 61850 variant
EN100 Ethernet module PROFINET IO variant
EN100 Ethernet module DNP3 variant
EN100 Ethernet module IEC 104 variant
 
Identifier:   PT-2018-03   Advisory published: 17.12.2015
CVE ID:   CVE-2018-4840   Fix issued: 08-03-2018
Discovered by:
Ilya Karpov, Dmitry Sklyarov, Positive Research Center (Positive Technologies Company)
 
Severity:   High (9.8) (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Vulnerability status:   Patched
Exploitation vector:   Remote
Vendor:   PHOENIX CONTACT
Product:   FL SWITCH 3xxx
FL SWITCH 4xxx
FL SWITCH 48xxx
 
Identifier:   PT-2018-02   Advisory published: 02.08.2017
CVE ID:   CVE-2017-16743   Fix issued: 11-01-2018
Discovered by:
Ilya Karpov, Evgeniy Druzhinin, Positive Research Center (Positive Technologies Company)
 
Severity:   Medium (5.3) (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Vulnerability status:   Patched
Exploitation vector:   Remote
Vendor:   PHOENIX CONTACT
Product:   FL SWITCH 3xxx
FL SWITCH 4xxx
FL SWITCH 48xxx
 
Identifier:   PT-2018-01   Advisory published: 02.08.2017
CVE ID:   CVE-2017-16741   Fix issued: 11-01-2018
Discovered by:
Ilya Karpov, Evgeniy Druzhinin, Positive Research Center (Positive Technologies Company)
 
Severity:   Medium (5.4) (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)
Vulnerability status:   Patched
Exploitation vector:   Remote
Vendor:   Kaspersky Labs
Product:   Kaspersky Security Center 10.x
 
Identifier:   PT-2017-56   Advisory published: 28.07.2017
CVE ID:   N/A   Fix issued: 27-10-2017
Discovered by:
Vaagn Israelyan, Positive Research Center (Positive Technologies Company)
 
Severity:   High (7.5) (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Vulnerability status:   Patched
Exploitation vector:   Remote
Vendor:   Open Information Security Foundation
Product:   Suricata 3.x
 
Identifier:   PT-2017-55   Advisory published: 13.10.2017
CVE ID:   CVE-2017-15377   Fix issued: 18-10-2017
Discovered by:
Kirill Shipulin, Positive Research Center (Positive Technologies Company)
 
Severity:   High (10) (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Vulnerability status:   Patched
Exploitation vector:   Remote
Vendor:   Dahua Technology
:  
 
Identifier:   PT-2017-54   Advisory published: 20.02.2017
CVE ID:   CVE-2017-3223   Fix issued: 17-07-2017
Discovered by:
Ilya Smith, Positive Research Center (Positive Technologies Company)
 
Severity:   High (9.8) (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Vulnerability status:   Patched
Exploitation vector:   Remote
Vendor:   Rockwell Automation
Product:   Rockwell Automation 1763 MicroLogix 1100 Controllers
Rockwell Automation 1766 MicroLogix 1400 Controllers
 
Identifier:   PT-2017-53   Advisory published: 27.10.2015
CVE ID:   CVE-2017-7903   Fix issued: 23-05-2017
Discovered by:
Ilya Karpov, Positive Research Center (Positive Technologies Company)
 
Severity:   High (9.8) (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Vulnerability status:   Patched
Exploitation vector:   Remote
Vendor:   Rockwell Automation
Product:   Rockwell Automation 1763 MicroLogix 1100 Controllers
Rockwell Automation 1766 MicroLogix 1400 Controllers
 
Identifier:   PT-2017-52   Advisory published: 27.10.2015
CVE ID:   CVE-2017-7899   Fix issued: 23-05-2017
Discovered by:
Ilya Karpov, Positive Research Center (Positive Technologies Company)