Denial of service in Siemens Industrial Real-Time (IRT) Devices

Published: 2019-10-10 | Updated: 2019-10-18
Severity Medium
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2019-10923
CWE ID CWE-20
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software SINUMERIK 840D sl Subscribe
SINUMERIK 828D
SINAMICS SM120
SINAMICS SL150
SINAMICS S150
SINAMICS S120
SINAMICS S110
SINAMICS GM150
SINAMICS GL150
SINAMICS GH150
SINAMICS G150
SINAMICS G130
SINAMICS G120
SINAMICS G110M
SINAMICS DCP
SINAMICS DCM
SIMOTION Firmware
SIMATIC WinAC RTX (F) 2010
SIMATIC S7-400 PN/DP V7
SIMATIC S7-400
SIMATIC S7-300
SIMATIC PN/PN Coupler
SIMATIC ET 200pro
SIMATIC ET 200ecoPN
SIMATIC ET 200S
SIMATIC ET 200M
SCALANCE X-200 IRT
CP1616
CP1604
Vendor Siemens

Security Advisory

This security advisory describes one medium risk vulnerability.

1) Input validation error

Severity: Medium

CVSSv3: 6.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C] [PCI]

CVE-ID: CVE-2019-10923

CWE-ID: CWE-20 - Improper Input Validation

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted packet, break the real-time synchronization of the affected installation and cause a denial-of-service condition on the target system.


Mitigation

Install updates from vendor's website for the following vulnerable products:
  • CP1604/CP1616: All versions prior to 2.8
  • Development/Evaluation Kits for PROFINET IO:
    • DK Standard Ethernet Controller: All versions prior to 4.1.1 Patch 05
    • EK-ERTEC 200: All versions prior to 4.5.0 Patch 01
    • EK-ERTEC 200P: All versions prior to 4.5.0
  • SCALANCE X-200IRT: All versions prior to 5.2.1
  • SIMATIC ET 200M: All versions
  • SIMATIC ET 200S: All versions
  • SIMATIC ET 200ecoPN (except 6ES7148-6JD00-0AB0 and 6ES7146-6FF00-0AB0): All versions
  • SIMATIC ET 200pro: All versions
  • SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0: All versions
  • SIMATIC S7-300 CPU family (incl. F): All versions
  • SIMATIC S7-400 (incl. F) v6 and below: All versions
  • SIMATIC S7-400 PN/DP v7 (incl. F): All versions
  • SIMATIC WinAC RTX (F) 2010: All versions prior to SP3
  • SIMOTION: All versions
  • SINAMICS DCM: All versions prior to 1.5 HF1
  • SINAMICS DCP: All versions
  • SINAMICS G110M v4.7 (Control Unit): All versions prior to 4.7 SP10 HF5
  • SINAMICS G120 v4.7 (Control Unit): All versions prior to 4.7 SP10 HF5
  • SINAMICS G130 v4.7 (Control Unit): All versions prior to 4.7 HF29
  • SINAMICS G150 (Control Unit): All versions prior to 4.8
  • SINAMICS GH150 v4.7 (Control Unit): All versions
  • SINAMICS GL150 v4.7 (Control Unit): All versions
  • SINAMICS GM150 v4.7 (Control Unit): All versions
  • SINAMICS S110 (Control Unit): All versions
  • SINAMICS S120 v4.7 (Control Unit and CBE20): All versions prior to 4.7 HF34
  • SINAMICS S150 (Control Unit): All versions prior to 4.8
  • SINAMICS SL150 v4.7 (Control Unit): All versions
  • SINAMICS SM120 v4.7 (Control Unit): All versions
  • SINUMERIK 828D: All versions prior to 4.8 SP5
  • SINUMERIK 840D sl: All versions

Vulnerable software versions

SINUMERIK 840D sl: -

SINUMERIK 828D: -

SINAMICS SM120: -

SINAMICS SL150: -

SINAMICS S150: -

SINAMICS S120: -

SINAMICS S110: -

SINAMICS GM150: -

SINAMICS GL150: -

SINAMICS GH150: -

SINAMICS G150: -

SINAMICS G130: -

SINAMICS G120: -

SINAMICS G110M: -

SINAMICS DCP: -

SINAMICS DCM: -

SIMOTION Firmware: -

SIMATIC WinAC RTX (F) 2010: -

SIMATIC S7-400 PN/DP V7: -

SIMATIC S7-400: -

SIMATIC S7-300: -

SIMATIC PN/PN Coupler: -

SIMATIC ET 200pro: -

SIMATIC ET 200ecoPN: -

SIMATIC ET 200S: -

SIMATIC ET 200M: -

SCALANCE X-200 IRT: -

CP1616: 1.0, 1.1, 2.0, 2.0.1, 2.1, 2.1.2, 2.1.3, 2.1.4, 2.2, 2.2.1, 2.3.1, 2.4.1, 2.5, 2.5.1, 2.5.2, 2.5.2.2, 2.6, 2.6.0.1, 2.7.2

CP1604: 1.0, 1.1, 2.0, 2.0.1, 2.1, 2.1.2, 2.1.3, 2.1.4, 2.2, 2.2.1, 2.3.1, 2.4.1, 2.5, 2.5.1, 2.5.2, 2.5.2.2, 2.6, 2.6.0.1, 2.7.2

CPE External links

https://cert-portal.siemens.com/productcert/pdf/ssa-349422.pdf
https://www.us-cert.gov/ics/advisories/icsa-19-283-01

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.