SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-461279133] Siemens SIMATIC CP 44x-1 Redundant Network Access Modules

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2017-06-22OtherSiemensSiemens reported this vulnerability. N/ACVE-2017-6868 N/AN/AN/A

Source

						
							
								
#
# Siemens SIMATIC CP 44x-1 Redundant Network Access Modules
#


### VULNERABLE VENDOR
Siemens


### VULNERABLE PRODUCT
SIMATIC CP 44x-1 Redundant Network Access (RNA) modules



### RESEARCHER
Siemens reported this vulnerability.



### AFFECTED PRODUCTS

The following versions of the SIMATIC CP 44x-1 RNA, which connect SIMATIC S7-400 CPUs to Industrial Ethernet, are affected:

SIMATIC CP 44x-1 RNA, all versions prior to Versions 1.4.1.



### IMPACT

Successful exploitation of this vulnerability may allow an unauthenticated remote attacker to perform administrative actions under certain conditions.



### VULNERABILITY OVERVIEW

IMPROPER AUTHENTICATION CWE-287
An unauthenticated remote attacker may be able to perform administrative actions on the Communication Process (CP) of the RNA series module, if network access to Port 102/TCP is available and the configuration file for the CP is stored on the RNA's CPU.
CVE-2017-6868 has been assigned to this vulnerability.
A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)





### BACKGROUND

Critical Infrastructure Sector(s): Chemical, Critical Manufacturing, and Food and Agriculture
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Munich, Germany




### MITIGATION

Siemens has released firmware update, Version 1.4.1, for the SIMATIC CP 44x-1 RNA modules that fixes the vulnerability and is available at the following location:

https://support.industry.siemens.com/cs/ww/en/view/109748227


.

Siemens recommends that users apply the firmware update.

Siemens recommends that users apply the following mitigations until the firmware update can be applied:

Apply cell protection concept, described in the following:

https://www.siemens.com/cert/operational-guidelines-industrial-security


Use VPN for protecting network communication between cells
Apply Defense-in-Depth, which is described in the following:

https://www.siemens.com/industrialsecurity