PatchSiren

PatchSiren cyber security CVE debrief

CVE-2016-8364 Ibhsoftec CVE debrief

CVE-2016-8364 describes a critical heap-based buffer overflow in IBHsoftec S7-SoftPLC. According to the CVE record, object memory can process a network packet that is larger than the space available, which can lead to memory corruption in versions prior to 4.12b. NVD rates the issue CVSS 3.0 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating a remotely reachable issue with potentially severe impact.

Vendor
Ibhsoftec
Product
CVE-2016-8364
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-13
Original CVE updated
2026-05-13
Advisory published
2017-02-13
Advisory updated
2026-05-13

Who should care

Administrators, integrators, and defenders responsible for IBHsoftec S7-SoftPLC deployments, especially systems that are network-reachable or exposed beyond tightly controlled segments.

Technical summary

The official record maps this issue to CWE-119 and a vulnerable CPE range for ibhsoftec:s7-softplc ending at version 4.12 inclusive, while the narrative description says the problem affects versions prior to 4.12b. The vulnerability is described as a heap-based buffer overflow triggered when object memory reads a network packet larger than the available space. The supplied record does not include a CISA KEV date or ransomware association.

Defensive priority

Critical

Recommended defensive actions

  • Upgrade IBHsoftec S7-SoftPLC to 4.12b or later, following vendor and advisory guidance.
  • Inventory all S7-SoftPLC instances and confirm the exact installed version against the vulnerable range.
  • Restrict network exposure to trusted management paths only; do not leave affected systems broadly reachable.
  • Segment affected systems from untrusted networks and apply strict allowlisting where feasible.
  • Monitor for service crashes, abnormal memory faults, and unexpected packet handling on affected hosts.
  • Review the ICS-CERT advisory referenced in the record for any vendor-specific mitigation or update instructions.

Evidence notes

This debrief is based on the supplied CVE description, NVD record metadata, and referenced advisories. The record states publication on 2017-02-13 and a later NVD modification on 2026-05-13, which are used only as record-timing context. The supplied enrichment does not indicate a CISA KEV listing or ransomware campaign use. Version boundary wording differs slightly between sources: the narrative says 'prior to 4.12b' while the CPE range ends at 4.12 inclusive.

Official resources

Publicly disclosed in the CVE record on 2017-02-13. The supplied NVD record was modified on 2026-05-13. No KEV dates were provided in the source corpus.