SB2019081348 - Multiple vulnerabilites in Siemens SIMATIC S7-1200 and SIMATIC S7-1500 CPU families
Published: August 13, 2019 Updated: October 21, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2019-10943)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker with network access to port 102/tcp can modify the user program stored on the affected devices such that the source code differs from the actual running code and gain unauthorized access to the application.
This vulnerability affects the following products:
- SIMATIC ET 200SP Open Controller CPU 1515SP PC (All versions)
- SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (All versions)
- SIMATIC S7-1200 CPU family (All versions >= V4.0)
- SIMATIC S7-1500 CPU family (All versions)
- SIMATIC S7-1500 Software Controller (All versions)
- SIMATIC S7-PLCSIM Advanced (All versions)
2) Man-in-the-Middle (MitM) attack (CVE-ID: CVE-2019-10929)
The vulnerability allows a remote attacker to perform man-in-the-middle (MitM) attack.
The vulnerability exists due to certain properties in the calculation used for integrity protection. A remote attacker in a Man-in-the-Middle position can modify network traffic exchanged on 102/tcp port.
This vulnerability affects the following products:
- SIMATIC ET 200SP Open Controller CPU 1515SP PC (All versions)
- SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (All versions)
- SIMATIC S7-1200 CPU family (All versions >= V4.0)
- SIMATIC S7-1500 CPU family (All versions)
- SIMATIC S7-1500 Software Controller (All versions)
- SIMATIC S7-PLCSIM Advanced (All versions)
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.