SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-431493028] Siemens Ruggedcom ROS, SCALANCE

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2017-09-28OtherSiemensSiemens reported this vulnerability to ICS-CERT. N/ACVE-2017-1273 N/AN/AN/A

Source

						
							
								
#
# Siemens Ruggedcom ROS, SCALANCE
#


### VULNERABLE VENDOR
Siemens


### VULNERABLE PRODUCT
Ruggedcom ROS, SCALANCE



### RESEARCHER
Siemens reported this vulnerability to ICS-CERT.



### AFFECTED PRODUCTS

Siemens reports that the vulnerability affects the following devices which use the Ruggedcom Discovery Protocol (RCDP):

RUGGEDCOM ROS for RSL910 devices: All versions prior to ROS v5.0.1
RUGGEDCOM ROS for all other devices: All versions prior to ROS v4.3.4
SCALANCE XB-200/XC-200/XP-200/XR300-WG: All versions newer than v3.0
SCALANCE XR-500/XM-400: All versions newer than v6.1



### IMPACT

Successful exploitation of this vulnerability could allow users of networks adjacent to the targeted device to perform unauthorized administrative actions.



### VULNERABILITY OVERVIEW

IMPROPER ACCESS CONTROL CWE-284
After initial configuration, the RCDP is still able to write to the device under certain conditions, potentially allowing users located in the adjacent network of the targeted device to perform unauthorized administrative actions.
CVE-2017-12736 has been assigned to this vulnerability.
A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)





### BACKGROUND

Critical Infrastructure Sectors: Energy, Healthcare and Public Health, and Transportation Systems
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Germany




### MITIGATION

Siemens provides Ruggedcom ROS firmware Version v4.3.4, v5.0.1 and Ruggedcom Explorer v1.5.2 which fixes the vulnerability and recommends users update to the newest version. The firmware updates for the Ruggedcom ROS-based devices can be obtained for free by contacting the Ruggedcom support team at support@ruggedcom.com


Siemens is preparing updates for the remaining affected products and recommends that users manually deactivate RCDP according to the instructions in the user guide. The user guide can be found on the Siemens web site at the following location:

https://support.industry.siemens.com/cs/ww/en/view/109748693


As a general security measure, Siemens advises configuring the IT environment according to Siemens operational guidelines in order to run the devices in a protected manner.

https://www.siemens.com/cert/operational-guidelines-industrial-security


For more information on these vulnerabilities and more detailed mitigation instructions, please see Siemens Security Advisory SSA-856721 at the following location:

http://www.siemens.com/cert/en/cert-security-advisories.htm