SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-632649219] Siemens SINEMA Server Privilege Escalation Vulnerability

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2016-08-02OTHERSiemens SINEMArgodN/A2016-6486N/AN/AN/A

Source

						
							
								
#
# Siemens SINEMA Server Privilege Escalation Vulnerability
#


### OVERVIEW

Security researcher rgod working with Trend Micro's Zero Day Initiative has identified a privilege escalation vulnerability in the Siemens SINEMA Server. Siemens has produced a temporary fix to mitigate this vulnerability.



### AFFECTED PRODUCTS

Siemens reports that the vulnerability affects the following products:
SINEMA Server: All versions.





### IMPACT

Successful exploitation of this vulnerability could allow users, authenticated via the operating system, to escalate their privileges under certain conditions.

Impact to individual organizations depends on many factors that are unique to each organization. NCCIC/ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.






### BACKGROUND

Siemens is a multinational company headquartered in Munich, Germany.

The affected product, SINEMA, is a network management appliance for industrial applications and allows network monitoring as well as diagnostics and reporting functions integrated into SCADA systems such as WinCC. According to Siemens, the SINEMA product is deployed across several sectors including Chemical, Commercial Facilities, Critical Manufacturing, Energy, Government Facilities, Water and Wastewater Systems, and others. Siemens estimates that this product is used worldwide.





### VULNERABILITY CHARACTERIZATION


# VULNERABILITY OVERVIEW

IMPROPER ACCESS CONTROL

The file permissions set for the SINEMA Server application folder could allow users, authenticated via the operating system, to escalate their privileges.
CVE-2016-6486 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).





### VULNERABILITY DETAILS


# EXPLOITABILITY

This vulnerability is not exploitable remotely and cannot be exploited without user interaction.


# EXISTENCE OF EXPLOIT

No known public exploits specifically target this vulnerability. 


# DIFFICULTY

An attacker with a low skill would be able to exploit this vulnerability.





### MITIGATION

Siemens has a temporary fix for existing installations. For detailed information on how-to correct the file permissions please call your local service organization. If you require assistance in identifying your local service organization, please call a local Siemens hotline center:
https://w3.siemens.com/aspa_app/

Siemens is working on a new SINEMA Server version to resolve the vulnerability and the advisory will be updated as soon as new information becomes available.

As a general security measure, Siemens strongly recommends protecting network access to SINEMA Server systems with appropriate mechanisms. It is advised to configure the environment according to Siemens operational guidelines in order to run the devices in a protected IT environment.

For more information on this vulnerability, please see Siemens Security Advisory SSA-321174 at the following location:
http://www.siemens.com/cert/advisories