|2017-06-22||Other||Siemens||Siemens reported this vulnerability.
# Siemens SIMATIC CP 44x-1 Redundant Network Access Modules
### VULNERABLE VENDOR
### VULNERABLE PRODUCT
SIMATIC CP 44x-1 Redundant Network Access (RNA) modules
Siemens reported this vulnerability.
### AFFECTED PRODUCTS
The following versions of the SIMATIC CP 44x-1 RNA, which connect SIMATIC S7-400 CPUs to Industrial Ethernet, are affected:
SIMATIC CP 44x-1 RNA, all versions prior to Versions 1.4.1.
Successful exploitation of this vulnerability may allow an unauthenticated remote attacker to perform administrative actions under certain conditions.
### VULNERABILITY OVERVIEW
IMPROPER AUTHENTICATION CWE-287
An unauthenticated remote attacker may be able to perform administrative actions on the Communication Process (CP) of the RNA series module, if network access to Port 102/TCP is available and the configuration file for the CP is stored on the RNA’s CPU.
CVE-2017-6868 has been assigned to this vulnerability.
A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Critical Infrastructure Sector(s): Chemical, Critical Manufacturing, and Food and Agriculture
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Munich, Germany
Siemens has released firmware update, Version 1.4.1, for the SIMATIC CP 44x-1 RNA modules that fixes the vulnerability and is available at the following location:
Siemens recommends that users apply the firmware update.
Siemens recommends that users apply the following mitigations until the firmware update can be applied:
Apply cell protection concept, described in the following:
Use VPN for protecting network communication between cells
Apply Defense-in-Depth, which is described in the following: