|2017-11-16||Other||Siemens||SEC Consult Vulnerability Lab reported these vulnerabilities directly to Siemens.||N/A||CVE-2017-1273 CVE-2017-1273 CVE-2017-1273 ||N/A||N/A||N/A|
# Siemens SICAM
### VULNERABLE VENDOR
### VULNERABLE PRODUCT
SEC Consult Vulnerability Lab reported these vulnerabilities directly to Siemens.
### AFFECTED PRODUCTS
Siemens reports that the vulnerabilities affect the following SICAM products:
SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, DNPi00: All versions
Successful exploitation of these vulnerabilities could allow an unauthenticated remote attacker to execute arbitrary code.
### VULNERABILITY OVERVIEW
MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306
The integrated web server (Port 80/TCP) of the affected devices could allow unauthenticated remote attackers to obtain sensitive device information over the network.
CVE-2017-12737 has been assigned to this vulnerability.
A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79
The integrated web server (Port 80/TCP) of the affected devices could allow cross-site scripting (XSS) attacks if unsuspecting users are tricked into clicking on a malicious link.
CVE-2017-12738 has been assigned to this vulnerability.
A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
IMPROPER CONTROL OF GENERATION OF CODE ('CODE INJECTION') CWE-94
The integrated web server (Port 80/TCP) of the affected devices could allow unauthenticated remote attackers to execute arbitrary code on the affected device.
CVE-2017-12739 has been assigned to this vulnerability.
A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Critical Infrastructure Sectors: Energy
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Germany
As the web server is for diagnostics only and not required for normal operation, Siemens recommends disabling the web server after commissioning.
For users who are currently using the discontinued ETA2 (IEC 60870-5-104), MODi00 (Modbus/TCP slave) or DNPi00 (DNP3/TCP slave) firmware, Siemens recommends users upgrade to ETA4 (IEC 60870-5-104), MBSiA0 (Modbus/TCP slave) or DNPiA1 (DNP3/ TCP slave) firmware, respectively, on the SM-2558 COM Module, which is the successor to the SM-2556 Module. The upgrades are available at:
Siemens recommends users protect network access with appropriate mechanisms. Siemens also advises that users configure the operational environment according to Siemens’ Operational Guidelines for Industrial Security:
For more information on these vulnerabilities and more detailed mitigation instructions, please see Siemens Security Advisory SSA-164516 at the following location: