1. EXECUTIVE SUMMARY
- CVSS v3 8.1
- ATTENTION: Exploitable remotely/low skill level to exploit
- Vendor: Siemens
- Equipment: XHQ Operations Intelligence
- Vulnerabilities: Exposure of Sensitive Information to an Unauthorized Actor, Cross-site Scripting, Basic XSS, SQL Injection, Relative Path Traversal, Cross-site Request Forgery
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to read sensitive information, modify web content, and perform cross-site scripting and cross-site request forgery on unsuspecting users.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of XHQ Operations Intelligence are affected:
- XHQ: All versions prior to 6.1
3.2 VULNERABILITY OVERVIEW
The application’s web server could expose non-sensitive information about the server’s architecture. This could allow an attacker to adapt further attacks to the version in place.
The web interface could allow cross-site scripting (XSS) attacks if an attacker is able to modify content of particular webpages, causing the application to behave in unexpected ways for legitimate users.
The web interface could allow injections that could lead to XSS attacks if unsuspecting users are tricked into accessing a malicious link.
The web interface could allow SQL injection attacks if an attacker is able to modify content of particular webpages.
The web interface could allow attackers to traverse through the file system of the server based by sending specially crafted packets over the network without authentication.
The web interface could allow XSS attacks if unsuspecting users are tricked into accessing a malicious link.
The web interface could allow a cross-site request forgery attack if an unsuspecting user is tricked into accessing a malicious link.
- CRITICAL INFRASTRUCTURE SECTORS: Energy
- COUNTRIES/AREAS DEPLOYED: Worldwide
- COMPANY HEADQUARTERS LOCATION: Germany
Siemens reported these vulnerabilities to CISA.
Siemens recommends updating the XHQ Operations Intelligence product line to the newest version:
- Update to v6.1:
- Contact a service organization for further information on how to obtain the new version of XHQ. To identify a service organization, contact a Siemens hotline center.
- Follow XHQ’s documentation on how to implement a secure configuration for the Internet Information Services (IIS).
Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens’ operational guidelines for industrial security and following the recommendations in the product manuals.
CISA recommends users take the following measures to protect themselves from social engineering attacks:
- Do not click web links or open unsolicited attachments in email messages.
- Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.
- Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on us-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
No known public exploits specifically target these vulnerabilities.