Legal Notice
All information products included in http://ics-cert.us-cert.gov are provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.
1. EXECUTIVE SUMMARY
-
CVSS v3 7.5
- ATTENTION: Remotely exploitable/low skill level to exploit
- Vendor: Siemens
- Equipment: Industrial Products
- Vulnerability: Improper Input Validation
2. UPDATE INFORMATION
This updated advisory is a follow-up to the updated advisory titled ICSA-17-339-01 Siemens Industrial Products (Update K) published February 05, 2019, on the NCCIC/ICS-CERT website.
3. RISK EVALUATION
Successful exploitation of this vulnerability may allow a remote attacker to conduct a denial-of-service attack.
4. TECHNICAL DETAILS
4.1 AFFECTED PRODUCTS
Siemens reports the vulnerability affects the following industrial products:
- SIMATIC S7-200 Smart: All versions prior to v2.03.01,
- SIMATIC S7-400 PN v6: All versions prior to v6.0.6,
- SIMATIC S7-400 H v6: All versions prior to v6.0.8,
- SIMATIC S7-400 PN/DP v7: All versions prior to v7.0.2,
- SIMATIC S7-410 v8: All versions prior to v8.2.1,
- SIMATIC S7-300: All versions prior to v3.X.16,
- SIMATIC S7-1200: All versions prior to v4.2.3,
- SIMATIC S7-1500: All versions prior to v2.0,
- SIMATIC S7-1500 Software Controller: All versions prior to v2.0,
- SIMATIC WinAC RTX 2010 incl. F: All versions,
- SIMATIC ET 200 Interface modules for PROFINET IO:
- SIMATIC ET 200AL: All versions,
- SIMATIC ET 200ecoPN: All versions,
- SIMATIC ET 200M: All versions,
- SIMATIC ET 200MP IM155-5 PN BA: All versions prior to v4.0.2,
- SIMATIC ET 200MP IM155-5 PN ST: All versions prior to v4.1,
- SIMATIC ET 200MP IM155-5 PN HF: All versions prior to v4.2
- SIMATIC ET 200pro: All versions,
- SIMATIC ET 200S: All versions, and
- SIMATIC ET 200SP IM 155-6 PN HF: All versions prior to v4.2.0,
- SIMATIC ET 200SP IM 155-6 PN HA: All versions prior to v1.1.0,
- SIMATIC ET 200SP IM 155-6 PN (BA, ST, HS): All versions,
- Development/Evaluation Kits for PROFINET IO:
- DK Standard Ethernet Controller: All versions prior to v4.1.1 Patch 05,
- EK-ERTEC 200P: All versions prior to v4.5, and
- EK-ERTEC 200: All versions prior to v4.5
- SIMOTION Firmware:
- SIMOTION D: All versions prior to v5.1 HF1,
- SIMOTION C: All versions prior to v5.1 HF1,
- SIMOTION P v4.4 and v4.5: All versions prior to v4.5 HF5, and
- SIMOTION P v5: All versions prior to v5.1 HF1
- SINAMICS:
- SINAMICS DCM w. PN: All versions prior to v1.4 SP1 HF6,
- SINAMICS DCP w. PN: All versions prior to v1.2 HF2,
- SINAMICS G110M / G120(C/P/D) w. PN: All versions prior to v4.7 SP9 HF1,
- SINAMICS G130 and G150 v4.7 w. PN: All versions prior to v4.7 HF29,
- SINAMICS G130 and G150 v4.8 w. PN: All versions prior to v4.8 HF4,
- SINAMICS S110 w. PN: All versions prior to v4.4 SP3 HF6,
- SINAMICS S120 prior to v4.7 w. PN: All versions prior to v4.7,
- SINAMICS S120 v4.7 w. PN: All versions prior to v4.7 HF29,
- SINAMICS S120 v4.7 SP1 w. PN: All versions,
- SINAMICS S120 v4.8 w. PN: All versions prior to v4.8 HF5,
- SIMATIC PN/PN Coupler: All versions prior to v4.2.0,
- SINAMICS S150 w. PN:
- v4.7: All versions prior to v4.7 HF29, and
- v4.8: All versions prior to v4.8 HF4
- SINAMICS v90 w. PN: All versions prior to v1.02
- SINUMERIK 840D sl: All versions,
- SIMATIC Compact Field Unit: All versions,
- SIMOCODE pro V PROFINET: All versions prior to v2.1.1, and
- SIRIUS Soft starter 3RW44 PN: All versions
4.2 VULNERABILITY OVERVIEW
4.2.1 IMPROPER INPUT VALIDATION CWE-20
Specially crafted packets sent to Port 161/UDP could cause a denial-of-service condition. The affected devices must be restarted manually.
CVE-2017-12741 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
4.3 BACKGROUND
- Critical Infrastructure Sectors: Commercial Facilities, Critical Manufacturing, Energy, Food and Agriculture, Water and Wastewater Systems
- Countries/Areas Deployed: Worldwide
- Company Headquarters Location: Germany
4.4 RESEARCHER
George Lashenko of CyberX reported the vulnerability to Siemens.
5. MITIGATIONS
Siemens has provided firmware updates for the following products to fix the vulnerability:
- SIMATIC S7-200 Smart: Update to v2.03.01
https://support.industry.siemens.com/cs/cn/en/view/109749409
- SIMATIC S7-400 PN v6: Update to v6.0.6
https://support.industry.siemens.com/cs/de/en/view/109474874
- SIMATIC S7-400 H v6: Update v6.0.8
https://support.industry.siemens.com/cs/ww/en/view/109474550
- SIMATIC S7-400 PN/DP V7: Update to V7.0.2
https://support.industry.siemens.com/cs/ww/en/view/109752685
- SIMATIC S7-410 v8: Update to v8.2.1
https://support.industry.siemens.com/cs/ww/en/view/109476571
- SIMATIC S7-300: Update to v3.X.16
https://support.industry.siemens.com/cs/ww/en/ps/13752/dl
- SIMATIC S7-1200: Update to v4.2.3
https://support.industry.siemens.com/cs/document/109741461
- SIMATIC S7-1500: v2.0 and newer
https://support.industry.siemens.com/cs/us/en/ps/13717/dl
- SIMATIC S7-1500 Software Controller: v2.0 and newer
https://support.industry.siemens.com/cs/us/en/view/109478528
- SIMATIC ET 200MP IM155-5 PN BA: Update to V4.0.2
https://support.industry.siemens.com/cs/ww/en/view/109754281
- SIMATIC ET 200MP IM155-5 PN ST: Update to V4.1
https://support.industry.siemens.com/cs/ww/en/view/78647504
- SIMATIC ET 200MP IM155-5 PN HF: Update to v4.2
https://support.industry.siemens.com/cs/us/en/view/93012181
- SIMATIC ET 200SP IM 155-6 PN HF: Update to v4.2.0
https://support.industry.siemens.com/cs/ww/en/view/85624387
- SIMATIC ET 200SP IM 155-6 PN HA: Update to v1.1.0
https://support.industry.siemens.com/cs/ww/en/view/109763483
- Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller: Update v4.1.1 Patch 05
https://support.industry.siemens.com/cs/ww/en/view/109755160
- Development/Evaluation Kits for PROFINET IO EK-ERTEC 200P: Update v4.5
https://support.industry.siemens.com/cs/ww/en/view/109750012
- Development/Evaluation Kits for PROFINET IO EK-ERTEC 200: Update v4.5
https://support.industry.siemens.com/cs/ww/en/view/109755151
- SIMOTION D: Update to v5.1 HF1
https://support.industry.siemens.com/cs/ww/en/view/31045047
- SIMOTION C: Update to v5.1 HF1
https://support.industry.siemens.com/cs/ww/en/view/31263919
- SIMOTION P v4.4 and 4.5: Update to v4.5 HF5
Please contact a Siemens representative for information on how to obtain the update.
- SIMOTION P v5: Update to v5.1 HF1
Please contact a Siemens representative for information on how to obtain the update.
- SINAMICS DCM w. PN: Update to v1.4 SP1 HF6
https://support.industry.siemens.com/cs/document/44029688
- SINAMICS DCP w. PN: Update to v1.2 HF2
https://support.industry.siemens.com/cs/document/109474935
- SINAMICS G110M / G120(C/P/D): Update to v4.7 SP9 HF1
https://support.industry.siemens.com/cs/ww/en/view/109750507
- SINAMICS G130 / G150 V4.7 w. PN: Update to V4.7 HF29
https://support.industry.siemens.com/cs/ww/en/view/103433117
- SINAMICS G130 / G150 V4.8 w. PN: Update to V4.8 HF4
https://support.industry.siemens.com/cs/ww/en/view/109742040
- SINAMICS S110 w. PN:: Update to v4.4 SP3 HF6
https://support.industry.siemens.com/cs/document/109474320
- SINAMICS S120 prior to V4.7 w. PN: Update to latest version of V5.1 SP1
https://support.industry.siemens.com/cs/document/109758423
- SINAMICS S120 V4.7 w. PN: Update to V4.7 HF29
https://support.industry.siemens.com/cs/ww/en/view/92522512
- SINAMICS S120 V4.7 SP1 w. PN: Update to latest version of V5.1 SP1
https://support.industry.siemens.com/cs/document/109758423
- SINAMICS S120 V4.8 w. PN: Update to V4.8 HF5
https://support.industry.siemens.com/cs/us/en/view/109740193
- SINAMICS S150 v4.7 w.PN: Update to v4.7 HF29
https://support.industry.siemens.com/cs/ww/en/view/103433117
- SINAMICS S150 v4.8 w.PN: Update to v4.8 HF4
https://support.industry.siemens.com/cs/ww/en/view/109742040
- SINAMICS v90: Update to v1.02
https://support.industry.siemens.com/cs/document/109746210
- SIMATIC PN/PN Coupler: Update to v4.2.0
https://support.industry.siemens.com/cs/ww/en/view/109760973
- SIMOCODE pro V PROFINET: Update to v2.1.1
https://support.industry.siemens.com/cs/ww/en/view/109749989
Siemens is preparing further updates and recommends the following mitigations until patches are available:
- Disable SNMP if this is supported by the product (refer to the product documentation). Disabling SNMP fully mitigates the vulnerability
- Protect network access to Port 161/UDP of affected devices
- Apply cell protection concept
- Use VPN for protecting network communication between cells
- Apply defense-in-depth
Siemens recommends users configure the operational environment according to Siemens’ Operational Guidelines for Industrial Security:
https://www.siemens.com/cert/operational-guidelines-industrial-security
For more information on the vulnerability and more detailed mitigation instructions, please see Siemens Security Advisory SSA-346262 at the following location:
http://www.siemens.com/cert/advisories
NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.
No known public exploits specifically target this vulnerability.
Source:
https://ics-cert.us-cert.gov/advisories/ICSA-17-339-01