Siemens SIMATIC CP 343-1CP 443-1 Modules and SIMATIC S7-300S7-400 CPUs (Update B)
1. EXECUTIVE SUMMARY
- CVSS v3 6.3
- ATTENTION: Exploitable remotely; low skill level is needed to exploit.
- Vendor: Siemens
- Equipment: SIMATIC
- Vulnerabilities: Insufficient Verification of Data Authenticity, Sensitive Cookie in HTTPS Session Without ‘Secure’ Attribute
2. UPDATE INFORMATION
This updated advisory is a follow-up to the advisory update titled ICSA-16-327-02 Siemens SIMATIC CP 343-1/CP 443-1 Modules and SIMATIC S7-300/S7-400 CPUs (Update A) that was published March 21, 2017, on the ICS webpage.
3. RISK EVALUATION
Under certain conditions, an attacker could use these vulnerabilities to perform operations as an authenticated user.
4. TECHNICAL DETAILS
4.1 AFFECTED PRODUCTS
Siemens reports that the vulnerabilities affect the following SIMATIC products:
——— Begin Update B Part 1 of 2 ———
- SIMATIC CP 343-1 Advanced (incl. SIPLUS NET variant): All versions prior to v3.0.53
- SIMATIC CP 443-1 Advanced (incl. SIPLUS NET variant): All versions prior to v3.2.17
- SIMATIC S7-300 CPU family (incl. SIPLUS NET variant): All firmware versions
- SIMATIC S7-400 CPU family (incl. SIPLUS NET variant): All firmware versions
——— End Update B Part 1 of 2 ———
4.2 VULNERABILITY OVERVIEW
The integrated web server at Port 80/TCP or Port 443/TCP of the affected devices could allow remote attackers to perform actions with the permissions of an authenticated user, provided the targeted user has an active session and is induced to trigger the malicious request.
The integrated web server delivers cookies without the “secure” flag. Modern browsers interpreting the flag would mitigate potential data leakage in case of clear text transmission.
- CRITICAL INFRASTRUCTURE SECTORS: Chemical, Critical Manufacturing, and Food and Agriculture
- COUNTRIES/AREAS DEPLOYED: Worldwide
- COMPANY HEADQUARTERS LOCATION: Germany
Inverse Path auditors in collaboration with Airbus ICT Industrial Security team reported this to Siemens.
——— Begin Update B Part 2 of 2 ———
Artem Zinenko from Kaspersky Lab identified additional affected products.
——— End Update B Part 2 of 2 ———
Siemens provides firmware versions that fix the vulnerabilities and recommends that users update to the fixed versions:
For SIMATIC S7-300/S7-400 CPUs, Siemens recommends the following mitigations:
- Apply cell protection concept,
- Use VPN for protecting network communication between cells, and
- Apply defense-in-depth.
Siemens strongly recommends users protect network access to SIMATIC S7-300/S7-400 CPUs and to the web interface of SIMATIC CP 343-1 Advanced and CP 443-1 Advanced devices with appropriate mechanisms. Siemens also advises that users configure the protected operational environment according to Siemens’ Operational Guidelines for Industrial Security.
For more information on this vulnerability and more detailed mitigation instructions, please see Siemens Security Advisory SSA-603476 at the following location: http://www.siemens.com/cert/advisories
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
- Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.
- Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on us-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
No known public exploits specifically target these vulnerabilities.