Multiple vulnerabilities in Siemens SIMATIC HMI Products



Published: 2020-09-09
Risk Medium
Patch available NO
Number of vulnerabilities 2
CVE-ID CVE-2020-15786
CVE-2020-15787
CWE-ID CWE-307
CWE-287
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SIMATIC HMI Basic Panels 2nd Generation
Server applications / SCADA systems

SIMATIC HMI Comfort Panels
Server applications / SCADA systems

SIMATIC HMI Mobile Panels
Server applications / SCADA systems

SIMATIC HMI United Comfort Panels
Server applications / SCADA systems

Vendor Siemens

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper Restriction of Excessive Authentication Attempts

EUVDB-ID: #VU46526

Risk: Medium

CVSSv3.1: 6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-15786

CWE-ID: CWE-307 - Improper Restriction of Excessive Authentication Attempts

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to the system.

The vulnerability exists due to the authentication mechanism has no brute-force prevention. A remote attacker can launch a brute-force authentication attack to discover user passwords and obtain access to the Sm@rt Server.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

SIMATIC HMI Basic Panels 2nd Generation: All versions

SIMATIC HMI Comfort Panels: All versions

SIMATIC HMI Mobile Panels: All versions

External links

http://ics-cert.us-cert.gov/advisories/icsa-20-252-06


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Authentication

EUVDB-ID: #VU46527

Risk: Medium

CVSSv3.1: 6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-15787

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests. A remote attacker can discover user passwords and obtain access to the Sm@rt Server via a brute-force attack.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

SIMATIC HMI United Comfort Panels: All versions

External links

http://ics-cert.us-cert.gov/advisories/icsa-20-252-06


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###