(I)IoT Security News
News, Vulnerabilities

Siemens Industrial Products (Update M)

1. EXECUTIVE SUMMARY

2. UPDATE INFORMATION

This updated advisory is a follow-up to the updated advisory titled ICSA-17-339-01 Siemens Industrial Products (Update L) published February 12, 2019, on the NCCIC/ICS-CERT website.

3. RISK EVALUATION

Successful exploitation of this vulnerability may allow a remote attacker to conduct a denial-of-service attack.

4. TECHNICAL DETAILS

4.1 AFFECTED PRODUCTS

Siemens reports the vulnerability affects the following industrial products:

——— Begin Update M Part 1 of 2 ———
——— End Update M Part 1 of 2 ———

4.2 VULNERABILITY OVERVIEW

4.2.1 IMPROPER INPUT VALIDATION CWE-20

Specially crafted packets sent to Port 161/UDP could cause a denial-of-service condition. The affected devices must be restarted manually.

CVE-2017-12741 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

4.3 BACKGROUND

4.4 RESEARCHER

George Lashenko of CyberX reported the vulnerability to Siemens.

5. MITIGATIONS

Siemens has provided firmware updates for the following products to fix the vulnerability:

https://support.industry.siemens.com/cs/cn/en/view/109749409

https://support.industry.siemens.com/cs/de/en/view/109474874

https://support.industry.siemens.com/cs/ww/en/view/109474550

https://support.industry.siemens.com/cs/ww/en/view/109752685

https://support.industry.siemens.com/cs/ww/en/view/109476571

https://support.industry.siemens.com/cs/ww/en/ps/13752/dl

https://support.industry.siemens.com/cs/document/109741461

https://support.industry.siemens.com/cs/us/en/ps/13717/dl

https://support.industry.siemens.com/cs/us/en/view/109478528

https://support.industry.siemens.com/cs/ww/en/view/109754281

https://support.industry.siemens.com/cs/ww/en/view/78647504

https://support.industry.siemens.com/cs/us/en/view/93012181

https://support.industry.siemens.com/cs/ww/en/view/85624387

https://support.industry.siemens.com/cs/ww/en/view/109763483

https://support.industry.siemens.com/cs/ww/en/view/109755160

https://support.industry.siemens.com/cs/ww/en/view/109750012

https://support.industry.siemens.com/cs/ww/en/view/109755151

https://support.industry.siemens.com/cs/ww/en/view/31045047

https://support.industry.siemens.com/cs/ww/en/view/31263919

Please contact a Siemens representative for information on how to obtain the update.

Please contact a Siemens representative for information on how to obtain the update.

https://support.industry.siemens.com/cs/document/44029688

https://support.industry.siemens.com/cs/document/109474935

https://support.industry.siemens.com/cs/ww/en/view/109750507

https://support.industry.siemens.com/cs/ww/en/view/103433117

https://support.industry.siemens.com/cs/ww/en/view/109742040

https://support.industry.siemens.com/cs/document/109474320

https://support.industry.siemens.com/cs/document/109758423

https://support.industry.siemens.com/cs/ww/en/view/92522512

https://support.industry.siemens.com/cs/document/109758423

https://support.industry.siemens.com/cs/us/en/view/109740193

https://support.industry.siemens.com/cs/ww/en/view/103433117

https://support.industry.siemens.com/cs/ww/en/view/109742040

https://support.industry.siemens.com/cs/document/109746210

——— Begin Update M Part 2 of 2 ———

https://w3.siemens.com/aspa_app/

——— End Update M Part 2 of 2 ———

https://support.industry.siemens.com/cs/ww/en/view/109760973

https://support.industry.siemens.com/cs/ww/en/view/109749989

Siemens is preparing further updates and recommends the following mitigations until patches are available:

Siemens recommends users configure the operational environment according to Siemens’ Operational Guidelines for Industrial Security:

https://www.siemens.com/cert/operational-guidelines-industrial-security

For more information on the vulnerability and more detailed mitigation instructions, please see Siemens Security Advisory SSA-346262 at the following location:

http://www.siemens.com/cert/advisories

NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.

No known public exploits specifically target this vulnerability.

 

Source:

https://ics-cert.us-cert.gov/advisories/ICSA-17-339-01

 

 

Related posts

Schneider Electric SoMachine Basic

(I) IoT
4 years ago

Schneider Electric EcoStruxure Building Operation (EBO)

(I) IoT
4 years ago

Mitsubishi Electric MELFA

(I) IoT
4 years ago
Exit mobile version