Ruggedcom Vulnerabilities Fixed

Wednesday, February 4, 2015 @ 02:02 PM gHale

Siemens produced firmware updates that mitigate multiple vulnerabilities in the Ruggedcom WIN firmware, according to a report on ICS-CERT.

These vulnerabilities, discovered by IOActive, could end up exploited remotely if there is network access to the affected service.

RELATED STORIES
Siemens Fixes SCALANCE Hole
HART DTM Vulnerability a Small Risk
Honeywell Updates HART DTM Vulnerability
Schneider Mitigates Buffer Overflow

The following Siemens Ruggedcom WIN versions suffer from the issue:
• WIN51xx: all versions prior to SS4.4.4624.35
• WIN52xx: all versions prior to SS4.4.4624.35
• WIN70xx: all versions prior to BS4.4.4621.32
• WIN72xx: all versions prior to BS4.4.4621.32

These vulnerabilities could allow an attacker to perform administrative actions without proper authentication.

Siemens is a multinational company headquartered in Munich, Germany.

Ruggedcom WIN products act as base stations or subscriber units in wide area private wireless networks. The products are compliant to the IEEE 802.16e standard and can operate in harsh environments.

According to Siemens, these devices work across several sectors including chemical, communications, critical manufacturing, dams, defense industrial base, energy, food and agriculture, government facilities, transportation systems, and water and wastewater systems. Siemens estimates that these products see action globally.

The integrated management service might allow attackers to perform administrative operations over the network without prior authentication.

CVE- 2015-1448 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 10.0.

The integrated web server (Port 443/TCP) of the affected devices is vulnerable to a buffer overflow that might allow remote code execution.

CVE- 2015-1449 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 10.0.

Sensitive information, such as password hashes, might end up insecurely stored and may end up obtained by a malicious attacker from local files or security logs.

CVE- 2015-1357 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 2.6.

No known public exploits specifically target these vulnerabilities. An attacker with a low skill would be able to exploit these vulnerabilities.

Siemens created a firmware update that mitigates these vulnerabilities and recommends updating as soon as possible. The firmware update for the affected products can be obtained for free by the following methods:
• Submit a support request online
• Call a local hotline center and click here for a location

Siemens also recommends protecting network access to all products except for perimeter devices with appropriate mechanisms. Click here for Siemens operational guidelines.

For more information on these vulnerabilities and detailed instructions, click on Siemens Security Advisory SSA-753139.



Leave a Reply

You must be logged in to post a comment.