Siemens created a new version and mitigation instructions to address vulnerabilities in its SICAM PAS (Power Automation System), according to a report on ICS-CERT.
SICAM PAS, versions older than Version 8.07 suffer from the vulnerabilities, discovered by Positive Technologies’ Ilya Karpov and Dmitry Sklyarov.
An authenticated local user utilizing these vulnerabilities could obtain sensitive information under certain conditions.
Siemens is a multinational company headquartered in Munich, Germany.
The Siemens SICAM PAS is energy automation software for operating electrical substations. SICAM PAS products end up deployed across the energy sector. Siemens said these products see use on a global basis.
An authenticated local attacker with certain privileges to the SICAM PAS database could possibly reconstruct passwords.
CVE-2016-5848 is the case number assigned to this vulnerability, which has a CVSSv3 base score of 2.3.
In addition, an authenticated local attacker could possibly access sensitive configuration information from the SICAM PAS database file if the database is in a stopped state.
CVE-2016-5849 is the case number assigned to this vulnerability, which has a CVSSv3 base score of 2.5.
These vulnerabilities are not remotely exploitable and no known public exploits specifically target these vulnerabilities. However, an attacker with low skill would be able to exploit these vulnerabilities.
Siemens provides SICAM PAS, Version 8.07, which fixes the insufficiently protected credentials vulnerability. Siemens recommends users update to this version. To obtain Version 8.07 and instructions on how to fix the information exposure vulnerability, email the Siemens Energy Customer Support Center.
For more information on this vulnerability and detailed instructions, click on Siemens Security Advisory SSA-444217.