Siemens Fixes SINEMA Vulnerabilities

Tuesday, April 22, 2014 @ 12:04 PM gHale


Siemens created an update that mitigates vulnerabilities in its SINEMA server, according to a report on ICS-CERT.

All versions of the SINEMA server prior to V12 SP1 suffer from the remotely exploitable vulnerabilities.

RELATED STORIES
Progea Fixes Movicon SCADA App
Alert: DNP3 Implementation Vulnerability
OSIsoft Mitigates Hole in DNP3 Line
WellinTech Corrects KingSCADA Hole

Successful exploitation of these vulnerabilities may result in attackers performing remote code execution, traversing through the file system, or causing a denial of service.

Siemens is a multinational company headquartered in Munich, Germany.

The affected product, SINEMA, is a network management appliance for industrial applications and allows network monitoring as well as diagnostics and reporting functions integrated into SCADA systems such as WinCC.

SINEMA products see action across several sectors including critical manufacturing, commercial facilities, government facilities, chemical, water and wastewater, energy, and others. Siemens estimated these products end up used primarily in the United States and Europe with a small percentage in Asia.

The integrated web servers at Port 4999/TCP and Port 80/TCP could allow unauthenticated remote code execution if an attacker has network access to the server.

CVE-2014-2731 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 9.3.

The integrated web servers at Port 4999/TCP and Port 80/TCP could allow unauthenticated directory traversal on the server based on the application’s file system permissions if an attacker has network access to the server.

CVE-2014-2732 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 5.0.

An attacker could cause a denial of service of the SINEMA web interfaces at Port 4999/TCP and Port 80/TCP if specially crafted HTTP requests go out to these ports. To recover the web interfaces, the SINEMA server must restart via the SINEMAserver-Monitor.

CVE-2014-2733 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 5.0.

No known public exploits specifically target these vulnerabilities. However, an attacker with a low skill would be able to exploit these vulnerabilities.

Siemens has provided a software update (V12 SP1) for SINEMA server that fixes these vulnerabilities. Users of these systems can click on this Siemens web site for the update.

For more information on this vulnerability, please see Siemens Security Advisory SSA-364879.



Leave a Reply

You must be logged in to post a comment.