Multiple vulnerabilites in Siemens SIMATIC S7-1200 and SIMATIC S7-1500 CPU families



Published: 2019-08-13 | Updated: 2019-10-21
Risk Medium
Patch available NO
Number of vulnerabilities 2
CVE-ID CVE-2019-10943
CVE-2019-10929
CWE-ID CWE-284
CWE-300
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
SIMATIC S7-PLCSIM Advanced
Server applications / SCADA systems

SIMATIC S7-1500 Software Controller
Server applications / SCADA systems

SIMATIC ET 200SP Open Controller
Server applications / SCADA systems

SIMATIC S7-1500 CPU
Hardware solutions / Firmware

SIMATIC S7-1200
Hardware solutions / Firmware

Vendor Siemens

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU21970

Risk: Medium

CVSSv3.1: 5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C]

CVE-ID: CVE-2019-10943

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote attacker with network access to port 102/tcp can modify the user program stored on the affected devices such that the source code differs from the actual running code and gain unauthorized access to the application.

This vulnerability affects the following products:

  • SIMATIC ET 200SP Open Controller CPU 1515SP PC (All versions)
  • SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (All versions)
  • SIMATIC S7-1200 CPU family (All versions >= V4.0)
  • SIMATIC S7-1500 CPU family (All versions)
  • SIMATIC S7-1500 Software Controller (All versions)
  • SIMATIC S7-PLCSIM Advanced (All versions)

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

SIMATIC S7-PLCSIM Advanced: All versions

SIMATIC S7-1500 Software Controller: All versions

SIMATIC S7-1500 CPU: All versions

SIMATIC S7-1200: 2.00 - 4.0

SIMATIC ET 200SP Open Controller: All versions

External links

http://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Man-in-the-Middle (MitM) attack

EUVDB-ID: #VU21969

Risk: Low

CVSSv3.1: 3.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2019-10929

CWE-ID: CWE-300 - Channel Accessible by Non-Endpoint ('Man-in-the-Middle')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform man-in-the-middle (MitM) attack.

The vulnerability exists due to certain properties in the calculation used for integrity protection. A remote attacker in a Man-in-the-Middle position can modify network traffic exchanged on 102/tcp port.

This vulnerability affects the following products:

  • SIMATIC ET 200SP Open Controller CPU 1515SP PC (All versions)
  • SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (All versions)
  • SIMATIC S7-1200 CPU family (All versions >= V4.0)
  • SIMATIC S7-1500 CPU family (All versions)
  • SIMATIC S7-1500 Software Controller (All versions)
  • SIMATIC S7-PLCSIM Advanced (All versions)

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

SIMATIC S7-PLCSIM Advanced: All versions

SIMATIC S7-1500 Software Controller: All versions

SIMATIC S7-1500 CPU: All versions

SIMATIC S7-1200: 2.00 - 4.0

SIMATIC ET 200SP Open Controller: All versions

External links

http://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###