Siemens Updates SIMATIC Vulnerability

Tuesday, May 9, 2017 @ 04:05 PM gHale


Siemens updated a denial of service (DoS) vulnerability in its SIMATIC WinCC and SIMATIC WinCC Runtime Professional, according to a report with ICS-CERT.

Successful exploitation of this remotely exploitable vulnerability, discovered by Sergey Temnikov and Vladimir Dashchenko of the Kaspersky Lab Critical Infrastructure Defense Team, under certain circumstances may allow the attacker to cause the affected service to crash, resulting in a denial-of-service condition.

RELATED STORIES
Rockwell Clears Multiple Stratix 5900 Issues
Advantech Fixes WebAccess Hole
Rockwell Mitigates Issues with PACs
Advantech B+B SmartWorx Gateway Hole

Siemens reports that the vulnerability affects the following versions of SIMATIC WinCC, SIMATIC WinCC (TIA Portal), and SIMATIC WinCC Runtime Professional:
• SIMATIC WinCC:
V7.3: All versions prior to V7.3 Update 11
V7.4: All versions prior to V7.4 SP1

• SIMATIC WinCC Runtime Professional:
V13: All versions prior to V13 SP2
V14: All versions prior to V14 SP1

• SIMATIC WinCC (TIA Portal) Professional
V13: All versions prior to V13 SP2
V14: All versions prior to V14 SP1

The products see use in the food and agriculture, chemical, energy and water and wastewater systems sectors. The products see action on a global basis.

No known public exploits specifically target this vulnerability. However, an attacker with low skill level would be able to exploit the vulnerability.

An authenticated, remote attacker who is a member of the “administrators” group could crash services by sending specially crafted messages to the DCOM interface.

CVE-2017-6867 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 4.9.

Siemens released updates for the following products and strongly encourages users to upgrade to the new versions as soon as possible:

• SIMATIC WinCC:
V7.3: Update to WinCC V7.3 Update 13
V7.4: Update to WinCC V7.4 SP1

• SIMATIC WinCC Runtime Professional:
V13: Update to V13 SP2
V14: Update to V14 SP1

• SIMATIC WinCC (TIA Portal) Professional:
V13: Update to V13 SP2
V14: Update to V14 SP1

For more information on this vulnerability and more detailed mitigation instructions, click on Siemens Security Advisory SSA-156872.

As a general security measure Siemens recommends protecting network access to SIMATIC WinCC, SIMATIC WinCC Runtime, and SIMATIC WinCC (TIA Portal) Professional stations with appropriate mechanisms. Siemens advises configuring the environment according to Siemens operational guidelines in order to run the devices in a protected IT environment.



Leave a Reply

You must be logged in to post a comment.