(I)IoT Security News
News, Vulnerabilities

Siemens SIMATIC CP 343-1CP 443-1 Modules and SIMATIC S7-300S7-400 CPUs (Update B)


1. EXECUTIVE SUMMARY

2. UPDATE INFORMATION

This updated advisory is a follow-up to the advisory update titled ICSA-16-327-02 Siemens SIMATIC CP 343-1/CP 443-1 Modules and SIMATIC S7-300/S7-400 CPUs (Update A) that was published March 21, 2017, on the ICS webpage.

3. RISK EVALUATION

Under certain conditions, an attacker could use these vulnerabilities to perform operations as an authenticated user.

4. TECHNICAL DETAILS

4.1 AFFECTED PRODUCTS

Siemens reports that the vulnerabilities affect the following SIMATIC products:

——— Begin Update B Part 1 of 2 ———

——— End Update B Part 1 of 2 ———

4.2 VULNERABILITY OVERVIEW

4.2.1    INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345

The integrated web server at Port 80/TCP or Port 443/TCP of the affected devices could allow remote attackers to perform actions with the permissions of an authenticated user, provided the targeted user has an active session and is induced to trigger the malicious request. 

CVE-2016-8673 has been assigned to this vulnerability. A CVSS v3 base score of 6.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).

4.2.2    SENSITIVE COOKIE IN HTTPS SESSION WITHOUT ‘SECURE’ ATTRIBUTE CWE-614

The integrated web server delivers cookies without the “secure” flag. Modern browsers interpreting the flag would mitigate potential data leakage in case of clear text transmission. 

CVE-2016-8672 has been assigned to this vulnerability. A CVSS v3 base score of 4.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N).

4.3 BACKGROUND

4.4 RESEARCHER

Inverse Path auditors in collaboration with Airbus ICT Industrial Security team reported this to Siemens.

——— Begin Update B Part 2 of 2 ———

Artem Zinenko from Kaspersky Lab identified additional affected products.

——— End Update B Part 2 of 2 ———

5. MITIGATIONS

Siemens provides firmware versions that fix the vulnerabilities and recommends that users update to the fixed versions:

For SIMATIC S7-300/S7-400 CPUs, Siemens recommends the following mitigations:

Siemens strongly recommends users protect network access to SIMATIC S7-300/S7-400 CPUs and to the web interface of SIMATIC CP 343-1 Advanced and CP 443-1 Advanced devices with appropriate mechanisms. Siemens also advises that users configure the protected operational environment according to Siemens’ Operational Guidelines for Industrial Security.

For more information on this vulnerability and more detailed mitigation instructions, please see Siemens Security Advisory SSA-603476 at the following location: http://www.siemens.com/cert/advisories

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on us-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.

No known public exploits specifically target these vulnerabilities.

Source:

https://www.us-cert.gov/ics/advisories/ICSA-16-327-02

Related posts

WAGO Industrial Managed Switches 852-303, 852-1305, and 852-1505

(I) IoT
5 years ago

Hitachi Energy AFF660/665 Series

IoT
2 years ago

GPUs are vulnerable to side-channel attacks

(I) IoT
5 years ago
Exit mobile version