U.S. Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. ICS-CERT. Industrial Control Systems Cyber Emergency Response Team.
TLP:WHITE

Advisory (ICSA-17-339-01)

Siemens Industrial Products (Update F)

Original release date: December 05, 2017 | Last revised: May 16, 2018

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.



1. EXECUTIVE SUMMARY

  • CVSS v3 7.5
  • ATTENTION: Remotely exploitable/low skill level to exploit.
  • Vendor: Siemens
  • Equipment: Industrial Products
  • Vulnerability: Improper Input Validation

2. UPDATE INFORMATION

This updated advisory is a follow-up to the updated advisory titled ICSA-17-339-01 Siemens Industrial Products (Update E) published May 3, 2018, on the NCCIC/ICS-CERT website.

3. RISK EVALUATION

Successful exploitation of this vulnerability may allow a remote attacker to conduct a denial-of-service attack.

4. TECHNICAL DETAILS

4.1 AFFECTED PRODUCTS

--------- Begin Update F Part 1 of 2 --------

Siemens reports the vulnerability affects the following industrial products:

  • SIMATIC S7-200 Smart: All versions prior to V2.03.01,
  • SIMATIC S7-400 PN V6: All versions prior to V6.0.6,
  • SIMATIC S7-400 H V6: All versions prior to V6.0.8,
  • SIMATIC S7-400 PN/DP V7: All versions prior to V7.0.2,
  • SIMATIC S7-410 V8: All versions,
  • SIMATIC S7-300: All versions,
  • SIMATIC S7-1200: All versions,
  • SIMATIC S7-1500: All versions prior to V2.0,
  • SIMATIC S7-1500 Software Controller: All versions prior to V2.0,
  • SIMATIC WinAC RTX 2010 incl. F: All versions,
  • SIMATIC ET 200 Interface modules for PROFINET IO:
    • SIMATIC ET 200AL: All versions,
    • SIMATIC ET 200ecoPN: All versions,
    • SIMATIC ET 200M: All versions,
    • SIMATIC ET 200MP IM155-5 PN BA: All versions prior to V4.0.2,
    • SIMATIC ET 200MP IM155-5 PN ST: All versions prior to V4.1,
    • SIMATIC ET 200MP (except IM155-5 PN BA and IM155-5 PN ST): All versions,
    • SIMATIC ET 200pro: All versions,
    • SIMATIC ET 200S: All versions, and
    • SIMATIC ET 200SP: All versions.
  • Development/Evaluation Kits for PROFINET IO:
    • DK Standard Ethernet Controller: All versions prior to V4.1.1 Patch 05,
    • EK-ERTEC 200P: All versions prior to V4.5, and
    • EK-ERTEC 200 PN IO: All versions prior to V4.5
  • SIMOTION Firmware:
    • SIMOTION D: All versions prior to V5.1 HF1,
    • SIMOTION C: All versions prior to V5.1 HF1,
    • SIMOTION P V4.4 and V4.5: All versions prior to V4.5 HF5, and
    • SIMOTION P V5: All versions prior to V5.1 HF1
  • SINAMICS:
    • SINAMICS DCM: All versions,
    • SINAMICS DCP: All versions,
    • SINAMICS G110M / G120(C/P/D) w. PN: All versions prior to V4.7 SP9 HF1,
    • SINAMICS G130 and G150 V4.7 w. PN: All versions,
    • SINAMICS G130 and G150 V4.8 w. PN: All versions prior to V4.8 HF4,
    • SINAMICS S110 w. PN: All versions prior to V4.4 SP3 HF6,
    • SINAMICS S120 w. PN V4.7: All versions,
    • SINAMICS S120 w. PN V4.8: All versions prior to V4.8 HF5,
    • SINAMICS S150 w. PN:
      • V4.7: All versions, and
      • V4.8: All versions prior to V4.8 HF4.
    • SINAMICS V90 w. PN: All versions prior to V1.02
  • SINUMERIK 840D sl: All versions,
  • SIMATIC Compact Field Unit: All versions,
  • SIMATIC PN/PN Coupler: All versions,
  • SIMOCODE pro V PROFINET: All versions, and
  • SIRIUS Soft starter 3RW44 PN: All versions.
--------- End Update F Part 1 of 2 ----------

4.2 VULNERABILITY OVERVIEW

4.2.1 IMPROPER INPUT VALIDATION CWE-20

Specially crafted packets sent to Port 161/UDP could cause a denial-of-service condition. The affected devices must be restarted manually.

CVE-2017-12741 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

4.3 BACKGROUND

  • Critical Infrastructure Sectors: Commercial Facilities, Critical Manufacturing, Energy, Food and Agriculture, Water and Wastewater Systems
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Germany

4.4 RESEARCHER

George Lashenko of CyberX reported the vulnerability to Siemens.

5. MITIGATIONS

--------- Begin Update F Part 2 of 2 --------

Siemens has provided firmware updates for the following products to fix the vulnerability:

  • SIMATIC S7-200 Smart: Update to V2.03.01

https://support.industry.siemens.com/cs/cn/en/view/109749409

  • SIMATIC S7-400 PN V6: Update to V6.0.6

https://support.industry.siemens.com/cs/de/en/view/109474874

  • EK-ERTEC 200P: Update to V4.5

https://support.industry.siemens.com/cs/ww/en/view/109750012

  • SIMOTION D: Update to V5.1 HF1

https://support.industry.siemens.com/cs/ww/en/view/31045047

  • SIMOTION C: Update to V5.1 HF1

https://support.industry.siemens.com/cs/ww/en/view/31263919

  • SIMOTION P V4.4 and 4.5: Update to V4.5 HF5

Please contact a Siemens representative for information on how to obtain the update.

  • SIMOTION P V5: Update to V5.1 HF1

Please contact a Siemens representative for information on how to obtain the update.

  • SINAMICS G110M / G120(C/P/D): Update to V4.7 SP9 HF1

https://support.industry.siemens.com/cs/ww/en/view/109750507

  • SIMATIC S7-1500: V2.0 and newer

https://support.industry.siemens.com/cs/us/en/ps/13717/dl

  • SIMATIC S7-1500 Software Controller: V2.0 and newer

https://support.industry.siemens.com/cs/us/en/view/109478528

  • SIMATIC S7-400 H V6: Update V6.0.8

https://support.industry.siemens.com/cs/ww/en/view/109474550

  • Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller: Update V4.1.1 Patch 05

https://support.industry.siemens.com/cs/ww/en/view/109755160

  • Development/Evaluation Kits for PROFINET IO EK-ERTEC 200P: Update V4.5

https://support.industry.siemens.com/cs/ww/en/view/109750012

  • Development/Evaluation Kits for PROFINET IO EK-ERTEC 200: Update V4.5

https://support.industry.siemens.com/cs/ww/en/view/109755151

  • SINAMICS S110: Update to V4.4 SP3 HF6

https://support.industry.siemens.com/cs/document/109474320

  • SINAMICS S120: Update to V4.8 SP3 HF5

https://support.industry.siemens.com/cs/document/109740193

  • SINAMICS V90: Update to V1.02

https://support.industry.siemens.com/cs/document/109746210

  • SINAMICS S7-400 PN/DP V7

https://support.industry.siemens.com/cs/document/109752685

  • SINAMICS ET 200MP IM155-5 PN BA: Update to V4.0.2

https://support.industry.siemens.com/cs/document/109754281

  • SINAMICS ET 200MP IM155-5 PN ST: Update to V4.1

https://support.industry.siemens.com/cs/document/78647504

  • SINAMICS G130 / G150 (V4.8 w.PN): Update to V4.8 HF4

https://support.industry.siemens.com/cs/ww/en/view/109742040

  • SINAMICS G130 / G150 (V4.7 w.PN): Update to V4.7 HF29

https://support.industry.siemens.com/cs/ww/en/view/103433117

  • SINAMICS S150 (V4.8 w.PN): Update to V4.8 HF4

https://support.industry.siemens.com/cs/ww/en/view/109742040

  • SINAMICS S150 (V4.7 w.PN): Update to V4.7 HF29

https://support.industry.siemens.com/cs/ww/en/view/103433117

  • SINAMICS S120 (V4.7 w.PN): Update to V4.7 HF29

https://support.industry.siemens.com/cs/ww/en/view/92522512

  • SINAMICS S120 (V4.8 w.PN): Update to V4.8 HF5

https://support.industry.siemens.com/cs/ww/en/view/109740193

--------- End Update F Part 2 of 2 ----------

Siemens is preparing further updates and recommends the following mitigations until patches are available:

  • Disable SNMP if this is supported by the product (refer to the product documentation). Disabling SNMP fully mitigates the vulnerability
  • Protect network access to Port 161/UDP of affected devices
  • Apply cell protection concept
  • Use VPN for protecting network communication between cells
  • Apply Defense-in-Depth

Siemens recommends users configure the operational environment according to Siemens’ Operational Guidelines for Industrial Security:

https://www.siemens.com/cert/operational-guidelines-industrial-security

For more information on the vulnerability and more detailed mitigation instructions, please see Siemens Security Advisory SSA-346262 at the following location:

http://www.siemens.com/cert/advisories

NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.

No known public exploits specifically target this vulnerability.

">


Contact Information

For any questions related to this report, please contact the NCCIC at:

Email: NCCICCUSTOMERSERVICE@hq.dhs.gov
Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information:  http://ics-cert.us-cert.gov 
or incident reporting:  https://ics-cert.us-cert.gov/Report-Incident?

The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top