Your one-stop web resource providing safety and security information to manufacturers

Siemens has an update available to mitigate improper input validation vulnerabilities in its EN100 Ethernet Communication Module and SIPROTEC 5 relays, according to a report with NCCIC.

Successful exploitation of these remotely exploitable vulnerabilities could cause a denial-of-service condition of the network functionality of the device, compromising the availability of the system.

RELATED STORIES
Geutebrück Updates Hole in IP Cameras
GE Mitigates Path Traversal Hole
SINAMICS PERFECT HARMONY GH180 Hole Fixed
Siemens Fixes SINUMERIK Controllers

Siemens said the vulnerabilities, discovered by Victor Nikitin, Vladislav Suchkov, and Ilya Karpov from ScadaX, affect the following versions of the EN100 Ethernet Communication Module and SIPROTEC 5 relays:
• Firmware variant IEC 61850 for EN100 Ethernet module: All versions prior to v4.33
• Firmware variant PROFINET IO for EN100 Ethernet module: All versions
• Firmware variant Modbus TCP for EN100 Ethernet module: All versions
• Firmware variant DNP3 TCP for EN100 Ethernet module: All versions
• Firmware variant IEC104 for EN100 Ethernet module: All versions
• SIPROTEC 5 relays with CPU variants CP300 and CP100 and the respective Ethernet communication modules: All versions prior to v7.80
• SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules: All versions prior to v7.58

Some products are only affected by one of the two vulnerabilities. See Siemens advisory SSA-635129 for additional details.

Cyber Security

Specially crafted packets to Port 102/TCP could cause a denial-of-service condition in the affected products. A manual restart is required to recover the EN100 module functionality of SIPROTEC 4 and SIPROTEC Compact relays.

Successful exploitation requires an attacker with network access to send multiple packets to the affected products or modules. As a precondition, the IEC 61850-MMS communication needs to be activated on the affected products or modules. No user interaction or privileges are required to exploit the vulnerability.

CVE-2018-11451 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.

In addition, specially crafted packets to Port 102/TCP could cause a denial-of-service condition in the EN100 communication module if oscillographs are running. A manual restart is required to recover the EN100 module functionality.

Successful exploitation requires an attacker with network access to send multiple packets to the EN100 module. As a precondition, the IEC 61850-MMS communication needs to be activated on the affected EN100 modules. No user interaction or privileges are required to exploit the security vulnerability.

CVE-2018-11452 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 5.9.

The product sees use mainly in the energy sector. It also sees action on a global basis.

No known public exploits specifically target these vulnerabilities. However, an attacker with low skill level could leverage the vulnerabilities.

Siemens released updates for several affected products. Siemens is working on updates for the remaining affected products, and recommends specific countermeasures until fixes are available.
• Firmware variant IEC 61850 for EN100 Ethernet module: Update to v4.33
• SIPROTEC 5 relays with CPU variants CP300 and CP100 and the respective Ethernet communication modules: Update to firmware Version 7.80 for the device types listed in SSA-635129
• SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules: Update to firmware Version 7.58 for the device types listed in SSA-635129

The firmware version for the communications modules can also be found on each device’s download page. Applying the update causes the device/module/program to undergo a single restart cycle.

Siemens recommends applying the provided security updates using the corresponding tooling and documented procedures made available with the product. If supported by the product, an automated means to apply the security updates across multiple product instances may be used. Siemens strongly recommends prior validation of any security update before being applied, and supervision by trained staff of the update process in the target environment.

Until updates can be applied, Siemens recommends blocking access to Port 102/TCP with an external firewall.

As a general security measure Siemens recommends protecting network access with appropriate mechanisms (e.g. firewalls, segmentation, VPN). It is advised that users configure the environment according to Siemens operational guidelines in order to run the devices in a protected IT environment.

Click here for Siemens recommended security guidelines.

Click here for additional information on industrial security by Siemens.

For more information on this vulnerability and associated software updates, see Siemens security advisory SSA-635129 on their website.

Pin It on Pinterest

Share This