New Firmware Fixes SCALANCE W1750D

Wednesday, October 10, 2018 @ 01:10 PM gHale

Siemens has new firmware to mitigate a cryptographic issues vulnerability in its SCALANCE W1750D, according to a report with NCCIC.

Successful exploitation of this vulnerability could allow an attacker to decrypt TLS traffic.

RELATED STORIES
Siemens Fixes SIMATIC S7-1200 CPU Family
Siemens Clears SIMATIC Holes
GE Plugs Hole in iFix
WECON PI Studio Vulnerabilities

SCALANCE W1750D: All versions prior to v8.3.0.1 suffer from the remotely exploitable vulnerability, which Siemens self-reported. Public exploits are available.

An attacker with network access to affected devices could potentially obtain a TLS session key. If the attacker is able to observe TLS traffic between a legitimate user and the device, the attacker could decrypt the TLS traffic.

CVE-2017-13099 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 5.9.

The product sees use in the chemical, energy, food and agriculture, healthcare and public health, transportation systems, and water and wastewater systems sectors. It also sees action on a global basis.

Siemens provides a firmware update (v8.3.0.1) and recommends users to update to the new version.

To reduce the risk, Siemens recommends administrators restrict access to the web interface of the affected devices.

As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens’ operational guidelines for industrial security, and following the recommendations in the product manuals.

Click here for additional information on industrial security by Siemens.

For more information on this vulnerability and associated software updates, please see Siemens security advisory SSA-464260 on their website.



Leave a Reply

You must be logged in to post a comment.