U.S. Flag Official website of the Department of Homeland Security
U.S. Department of Homeland Security Seal. ICS-CERT. Industrial Control Systems Cyber Emergency Response Team.
TLP:WHITE

Alert (ICS-ALERT-11-186-01)

Siemens SIMATIC Controllers Password Protection Vulnerability

Original release date: July 05, 2011 | Last revised: August 23, 2018

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see http://www.us-cert.gov/tlp/.



SUMMARY

ICS-CERT is continuing to coordinate with Siemens concerning vulnerabilities affecting Siemens SIMATIC Programmable Logic Controllers (PLCs). In May of 2011, security researcher Dillon Beresford of NSS Labs1 reported multiple vulnerabilities to ICS-CERT that affect the Siemens Simatic S7-1200 micro PLC as reported in ICS-ALERT-11-161-01. The replay attack vulnerabilities affecting the S7-1200 also are verified to affect the SIMATIC S7-200, S7-300, and S7-400 PLCs. Siemens PLCs configured with password protection are still susceptible to a replay attack.

Commands between the affected PLCs and other devices are transmitted using the International Organization for Standardization Transport Service Access Point (ISO-TSAP) protocol. According to ICS-CERT analysis, the ISO-TSAP protocol is functioning to specifications; however, authentication is not performed nor are payloads encrypted or obfuscated. Like ISO-TSAP, many protocols used in industrial control systems were intentionally designed to be open and without security features.

ICS-CERT will publish additional information as it becomes available.

IMPACT

An attacker with access to the PLC or the automation network could intercept the PLC password and make unauthorized changes to the PLC operation.

The full impact to individual organizations is dependent on multiple factors unique to each organization. The ICS-CERT recommends that organizations evaluate the impact of these vulnerabilities based on their environment, architecture, and operational product implementation.

MITIGATION

ICS-CERT continues to work with Siemens to develop specific mitigations for the reported vulnerabilities.

The following mitigations can be implemented to reduce the risk of impact by the reported vulnerabilities:

  • ICS-CERT and Siemens recommend that asset owners/operators apply a properly configured strong password to each PLC. Changing this password frequently and using unique passwords, when possible, will reduce exposure to this vulnerability.
  • Defense-in-depth strategies for both enterprise and control system networks; see the ICS-CERT Recommended Practice document, Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies and Siemens’ Industrial Security website  for more information on how to apply these measures.
  • Siemens recommends that concerned customers block all traffic to the PROFIBUS, MPI, and PROFINET protocol-based devices from outside the Manufacturing Zone by restricting or blocking Ethernet access to 102/TCP and 102/UDP, using appropriate security technology.
  • Restrict remote access to enterprise and control system networks and diligently monitor any remote connections allowed; employ Virtual Private Network for any remote system connections.

Siemens has published a document regarding the vulnerability affecting the SIMATIC S7-200, S7-300, S7-400, and S7-1200 products.2

ICS-CERT will release information concerning additional mitigations as they become available.

FOLLOW-UP

ICS-CERT published a follow-up advisory titled ICSA-11-223-01 - Siemens SIMATIC PLCs Reported Issues Summary on the ICS-CERT Web page on August 21, 2011.


Contact Information

For any questions related to this report, please contact the NCCIC at:

Email: NCCICCUSTOMERSERVICE@hq.dhs.gov
Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information:  http://ics-cert.us-cert.gov 
or incident reporting:  https://ics-cert.us-cert.gov/Report-Incident?

The NCCIC continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product.

Was this document helpful?  Yes  |  Somewhat  |  No

Back to Top