1. EXECUTIVE SUMMARY

  • CVSS v3 7.5
  • ATTENTION: Remotely exploitable/low skill level to exploit
  • Vendor: Siemens
  • Equipment: Industrial Products
  • Vulnerability: Improper Input Validation

2. UPDATE INFORMATION

This updated advisory is a follow-up to the updated advisory titled ICSA-17-339-01 Siemens Industrial Products (Update G) published September 11, 2018, on the NCCIC/ICS-CERT website.

3. RISK EVALUATION

Successful exploitation of this vulnerability may allow a remote attacker to conduct a denial-of-service attack.

4. TECHNICAL DETAILS

4.1 AFFECTED PRODUCTS

Siemens reports the vulnerability affects the following industrial products:

  • SIMATIC S7-200 Smart: All versions prior to v2.03.01,
  • SIMATIC S7-400 PN v6: All versions prior to v6.0.6,
  • SIMATIC S7-400 H v6: All versions prior to v6.0.8,
  • SIMATIC S7-400 PN/DP v7: All versions prior to v7.0.2,
  • SIMATIC S7-410 v8: All versions,
  • SIMATIC S7-300: All versions,
——— Begin Update H Part 1 of 2 ——–
  • SIMATIC S7-1200: All versions prior to v4.2.3,
——— End Update H Part 1 of 2 ——–
  • SIMATIC S7-1500: All versions prior to v2.0,
  • SIMATIC S7-1500 Software Controller: All versions prior to v2.0,
  • SIMATIC WinAC RTX 2010 incl. F: All versions,
  • SIMATIC ET 200 Interface modules for PROFINET IO:
  • SIMATIC ET 200AL: All versions,
  • SIMATIC ET 200ecoPN: All versions,
  • SIMATIC ET 200M: All versions,
  • SIMATIC ET 200MP IM155-5 PN BA: All versions prior to v4.0.2,
  • SIMATIC ET 200MP IM155-5 PN ST: All versions prior to v4.1,
  • SIMATIC ET 200MP (except IM155-5 PN BA and IM155-5 PN ST): All versions,
  • SIMATIC ET 200pro: All versions,
  • SIMATIC ET 200S: All versions, and
  • SIMATIC ET 200SP: All versions.
  • Development/Evaluation Kits for PROFINET IO:
  • DK Standard Ethernet Controller: All versions prior to v4.1.1 Patch 05,
  • EK-ERTEC 200P: All versions prior to v4.5, and
  • EK-ERTEC 200 PN IO: All versions prior to v4.5
  • SIMOTION Firmware:
  • SIMOTION D: All versions prior to v5.1 HF1,
  • SIMOTION C: All versions prior to v5.1 HF1,
  • SIMOTION P v4.4 and v4.5: All versions prior to v4.5 HF5, and
  • SIMOTION P v5: All versions prior to v5.1 HF1
  • SINAMICS:
  • SINAMICS DCM: All versions prior to v1.4 SP1 HF6,
  • SINAMICS DCP: All versions prior to v1.2 HF2,
  • SINAMICS G110M / G120(C/P/D) w. PN: All versions prior to v4.7 SP9 HF1,
  • SINAMICS G130 and G150 v4.7 w. PN: All versions prior to v4.7 HF29,
  • SINAMICS G130 and G150 v4.8 w. PN: All versions prior to v4.8 HF4,
  • SINAMICS S110 w. PN: All versions prior to v4.4 SP3 HF6,
  • SINAMICS S120 w. PN v4.7: All versions prior to v4.7 HF29,
  • SINAMICS S120 w. PN v4.8: All versions prior to v4.8 HF5,
  • SINAMICS S150 w. PN:
  • v4.7: All versions prior to v4.7 HF29, and
  • v4.8: All versions prior to v4.8 HF4
  • SINAMICS v90 w. PN: All versions prior to v1.02
  • SINUMERIK 840D sl: All versions,
  • SIMATIC Compact Field Unit: All versions,
  • SIMATIC PN/PN Coupler: All versions,
  • SIMOCODE pro V PROFINET: All versions, and
  • SIRIUS Soft starter 3RW44 PN: All versions.

4.2 VULNERABILITY OVERVIEW

4.2.1 IMPROPER INPUT VALIDATION CWE-20

Specially crafted packets sent to Port 161/UDP could cause a denial-of-service condition. The affected devices must be restarted manually.

CVE-2017-12741 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

4.3 BACKGROUND

  • Critical Infrastructure Sectors: Commercial Facilities, Critical Manufacturing, Energy, Food and Agriculture, Water and Wastewater Systems
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Germany

4.4 RESEARCHER

George Lashenko of CyberX reported the vulnerability to Siemens.

5. MITIGATIONS

Siemens has provided firmware updates for the following products to fix the vulnerability:

  • SIMATIC S7-200 Smart: Update to v2.03.01

https://support.industry.siemens.com/cs/cn/en/view/109749409

  • SIMATIC S7-400 PN v6: Update to v6.0.6

https://support.industry.siemens.com/cs/de/en/view/109474874

  • EK-ERTEC 200P: Update to v4.5

https://support.industry.siemens.com/cs/ww/en/view/109750012

  • SIMOTION D: Update to v5.1 HF1

https://support.industry.siemens.com/cs/ww/en/view/31045047

  • SIMOTION C: Update to v5.1 HF1

https://support.industry.siemens.com/cs/ww/en/view/31263919

  • SIMOTION P V4.4 and 4.5: Update to v4.5 HF5

Please contact a Siemens representative for information on how to obtain the update.

  • SIMOTION P V5: Update to v5.1 HF1

Please contact a Siemens representative for information on how to obtain the update.

  • SINAMICS G110M / G120(C/P/D): Update to v4.7 SP9 HF1

https://support.industry.siemens.com/cs/ww/en/view/109750507

  • SIMATIC S7-1500: v2.0 and newer

https://support.industry.siemens.com/cs/us/en/ps/13717/dl

  • SIMATIC S7-1500 Software Controller: v2.0 and newer

https://support.industry.siemens.com/cs/us/en/view/109478528

  • SIMATIC S7-400 H v6: Update v6.0.8

https://support.industry.siemens.com/cs/ww/en/view/109474550

  • Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller: Update v4.1.1 Patch 05

https://support.industry.siemens.com/cs/ww/en/view/109755160

  • Development/Evaluation Kits for PROFINET IO EK-ERTEC 200P: Update v4.5

https://support.industry.siemens.com/cs/ww/en/view/109750012

  • Development/Evaluation Kits for PROFINET IO EK-ERTEC 200: Update v4.5

https://support.industry.siemens.com/cs/ww/en/view/109755151

  • SINAMICS S110: Update to v4.4 SP3 HF6

https://support.industry.siemens.com/cs/document/109474320

  • SINAMICS S120: Update to v4.8 SP3 HF5

https://support.industry.siemens.com/cs/document/109740193

  • SINAMICS V90: Update to v1.02

https://support.industry.siemens.com/cs/document/109746210

  • SINAMICS S7-400 PN/DP v7

https://support.industry.siemens.com/cs/document/109752685

  • SINAMICS ET 200MP IM155-5 PN BA: Update to v4.0.2

https://support.industry.siemens.com/cs/document/109754281

  • SINAMICS ET 200MP IM155-5 PN ST: Update to v4.1

https://support.industry.siemens.com/cs/document/78647504

  • SINAMICS G130 / G150 (v4.8 w.PN): Update to v4.8 HF4

https://support.industry.siemens.com/cs/ww/en/view/109742040

  • SINAMICS G130 / G150 (v4.7 w.PN): Update to v4.7 HF29

https://support.industry.siemens.com/cs/ww/en/view/103433117

  • SINAMICS S150 (v4.8 w.PN): Update to v4.8 HF4

https://support.industry.siemens.com/cs/ww/en/view/109742040

  • SINAMICS S150 (v4.7 w.PN): Update to v4.7 HF29

https://support.industry.siemens.com/cs/ww/en/view/103433117

  • SINAMICS S120 (v4.7 w.PN): Update to v4.7 HF29

https://support.industry.siemens.com/cs/ww/en/view/92522512

  • SINAMICS S120 (v4.8 w.PN): Update to v4.8 HF5

https://support.industry.siemens.com/cs/ww/en/view/109740193

  • SINAMICS DCM w. PN:  Update to v1.4 SP1 HF6

https://support.industry.siemens.com/cs/document/44029688

  • SINAMICS DCP w. PN:  Update to v1.2 HF2

https://support.industry.siemens.com/cs/document/109474935

——— Begin Update H Part 2 of 2 ———-
  • SIMATIC S7-1200:  Update to v4.2.3

https://support.industry.siemens.com/cs/document/109741461

——— End Update H Part 2 of 2 ———-

Siemens is preparing further updates and recommends the following mitigations until patches are available:

  • Disable SNMP if this is supported by the product (refer to the product documentation). Disabling SNMP fully mitigates the vulnerability
  • Protect network access to Port 161/UDP of affected devices
  • Apply cell protection concept
  • Use VPN for protecting network communication between cells
  • Apply Defense-in-Depth

Siemens recommends users configure the operational environment according to Siemens’ Operational Guidelines for Industrial Security:

https://www.siemens.com/cert/operational-guidelines-industrial-security

For more information on the vulnerability and more detailed mitigation instructions, please see Siemens Security Advisory SSA-346262 at the following location:

http://www.siemens.com/cert/advisories

NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.

No known public exploits specifically target this vulnerability.

 

Source:

https://ics-cert.us-cert.gov/advisories/ICSA-17-339-01