Multiple vulnerabilities in Siemens SCALANCE SC-600 Family



Published: 2022-12-16 | Updated: 2022-12-19
Risk High
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2018-25032
CVE-2022-30065
CVE-2022-32205
CVE-2022-32206
CVE-2022-25032
CWE-ID CWE-119
CWE-416
CWE-400
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SCALANCE SC626-2C
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE SC622-2C
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE SC632-2C
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE SC636-2C
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE SC642-2C
Hardware solutions / Routers & switches, VoIP, GSM, etc

SCALANCE SC646-2C
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Siemens

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

Updated 19.12.2022

Added vulnerability #5

1) Buffer overflow

EUVDB-ID: #VU61671

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-25032

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when compressing data. A remote attacker can pass specially crafted input to the application, trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

SCALANCE SC626-2C: before 3.0

SCALANCE SC622-2C: before 3.0

SCALANCE SC632-2C: before 3.0

SCALANCE SC636-2C: before 3.0

SCALANCE SC642-2C: before 3.0

SCALANCE SC646-2C: before 3.0

External links

http://cert-portal.siemens.com/productcert/txt/ssa-333517.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU66182

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-30065

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing a crafted awk pattern in the copyvar function. A remote attacker can execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

SCALANCE SC626-2C: before 3.0

SCALANCE SC622-2C: before 3.0

SCALANCE SC632-2C: before 3.0

SCALANCE SC636-2C: before 3.0

SCALANCE SC642-2C: before 3.0

SCALANCE SC646-2C: before 3.0

External links

http://cert-portal.siemens.com/productcert/txt/ssa-333517.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Resource exhaustion

EUVDB-ID: #VU64681

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-32205

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to curl does not impose limits to the size of cookies stored in the system. A malicious server can serve excessive amounts of Set-Cookie: headers in a HTTP response to curl and consume all available disk space.

Mitigation

Install update from vendor's website.

Vulnerable software versions

SCALANCE SC626-2C: before 3.0

SCALANCE SC622-2C: before 3.0

SCALANCE SC632-2C: before 3.0

SCALANCE SC636-2C: before 3.0

SCALANCE SC642-2C: before 3.0

SCALANCE SC646-2C: before 3.0

External links

http://cert-portal.siemens.com/productcert/txt/ssa-333517.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Resource exhaustion

EUVDB-ID: #VU64682

Risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-32206

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insecure processing of compressed HTTP responses. A malicious server can send a specially crafted HTTP response to curl and perform a denial of service attack by forcing curl to spend enormous amounts of allocated heap memory, or trying to and returning out of memory errors.

Mitigation

Install update from vendor's website.

Vulnerable software versions

SCALANCE SC626-2C: before 3.0

SCALANCE SC622-2C: before 3.0

SCALANCE SC632-2C: before 3.0

SCALANCE SC636-2C: before 3.0

SCALANCE SC642-2C: before 3.0

SCALANCE SC646-2C: before 3.0

External links

http://cert-portal.siemens.com/productcert/txt/ssa-333517.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer overflow

EUVDB-ID: #VU70425

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-25032

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application, trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

SCALANCE SC622-2C: before 3.0

SCALANCE SC626-2C: before 3.0

SCALANCE SC632-2C: before 3.0

SCALANCE SC636-2C: before 3.0

SCALANCE SC642-2C: before 3.0

SCALANCE SC646-2C: before 3.0

External links

http://ics-cert.us-cert.gov/advisories/icsa-22-349-18


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###