PatchSiren cyber security CVE debrief
CVE-2016-8364 Ibhsoftec CVE debrief
CVE-2016-8364 describes a critical heap-based buffer overflow in IBHsoftec S7-SoftPLC. According to the CVE record, object memory can process a network packet that is larger than the space available, which can lead to memory corruption in versions prior to 4.12b. NVD rates the issue CVSS 3.0 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating a remotely reachable issue with potentially severe impact.
- Vendor
- Ibhsoftec
- Product
- CVE-2016-8364
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
Administrators, integrators, and defenders responsible for IBHsoftec S7-SoftPLC deployments, especially systems that are network-reachable or exposed beyond tightly controlled segments.
Technical summary
The official record maps this issue to CWE-119 and a vulnerable CPE range for ibhsoftec:s7-softplc ending at version 4.12 inclusive, while the narrative description says the problem affects versions prior to 4.12b. The vulnerability is described as a heap-based buffer overflow triggered when object memory reads a network packet larger than the available space. The supplied record does not include a CISA KEV date or ransomware association.
Defensive priority
Critical
Recommended defensive actions
- Upgrade IBHsoftec S7-SoftPLC to 4.12b or later, following vendor and advisory guidance.
- Inventory all S7-SoftPLC instances and confirm the exact installed version against the vulnerable range.
- Restrict network exposure to trusted management paths only; do not leave affected systems broadly reachable.
- Segment affected systems from untrusted networks and apply strict allowlisting where feasible.
- Monitor for service crashes, abnormal memory faults, and unexpected packet handling on affected hosts.
- Review the ICS-CERT advisory referenced in the record for any vendor-specific mitigation or update instructions.
Evidence notes
This debrief is based on the supplied CVE description, NVD record metadata, and referenced advisories. The record states publication on 2017-02-13 and a later NVD modification on 2026-05-13, which are used only as record-timing context. The supplied enrichment does not indicate a CISA KEV listing or ransomware campaign use. Version boundary wording differs slightly between sources: the narrative says 'prior to 4.12b' while the CPE range ends at 4.12 inclusive.
Official resources
-
CVE-2016-8364 CVE record
CVE.org
-
CVE-2016-8364 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, US Government Resource
Publicly disclosed in the CVE record on 2017-02-13. The supplied NVD record was modified on 2026-05-13. No KEV dates were provided in the source corpus.