PT-2012-50: Multiple vulnerabilities in Siemens SIMATIC S7-1200 Web interface

(PT-2012-50) Positive Technologies Security Advisory
Multiple vulnerabilities in Siemens SIMATIC S7-1200 Web interface

Vulnerable product

Siemens SIMATIC S7-1200
Version: 2.x, 3.0.0, 3.0.1

Link:
http://www.siemens.com

Severity level

Severity level: High
Impact: Cross-Site Scripting
Access Vector: Remote

CVSS v2:
Base Score: 8.3
Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:C)

CVE: not assigned

Product description

SIMATIC S7-1200 controllers are new modular miniature controllers. Due to the compact modular design with a high performance at the same time, the SIMATIC S7-1200 is suitable for a wide variety of automation applications. Its range of use extends from the replacement of relays and contactors up to complex automation tasks in networks and within distributed structures.

Vulnerability description

The specialists of the Positive Research center have detected multiple vulnerabilities in Siemens SIMATIC S7-1200.

If a user is enticed to activate a malicious URL directed at the S7-1200 web server IP address, the Cross-Site Scripting vulnerability could be exploited. If the attack is successful, the attacker could manipulate what the browser displays when viewing the S7-1200’s web pages, steal session cookies, or redirect the user’s browser to a malicious web site. In addition, it may be possible for attackers to issue commands to the S7-1200 web server at the user’s privilege level.

How to fix

Siemens provides a firmware update for versions 3.0.0 and 3.0.1 of the SIMATIC S7-1200 PLC, which should be applied as soon as possible in cases where the embedded web server is utilized as it fixes the XSS vulnerability. Additionally, a HTTP PUT command is supported by the web server which does not impact security. As it is unnecessary for normal use of the S7-1200 web server, it will be removed starting with version 3.0.2.

Workaround

  • Disable JavaScript within the web browser used to access the S7-1200 web server

  • Utilize a modern web browser with integrated XSS filtering mechanisms

  • Deactivate the S7-1200 web server wherever possible

Advisory status

08.08.2012 - Vendor is notified
08.08.2012 - Vendor gets vulnerability details
08.10.2012 - Vendor releases fixed version and details
11.10.2012 - Public disclosure

Credits

The vulnerabilities was discovered by Dmitry Serebryannikov, Artem Chaikin, Yury Goltsev, Timur Yunusov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2012-50
http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-279823.pdf

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

About Positive Technologies

Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. Our solutions work seamlessly across your entire business: securing applications in development; assessing your network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks.  Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, and distinction as the #1 fastest growing Security and Vulnerability Management firm in 2012, as shown in an IDC report*. To learn more about Positive Technologies please visit www.ptsecurity.com

*Source: IDC Worldwide Security and Vulnerability Management 2013-2017 Forecast and 2012 Vendor Shares, doc #242465, August 2013. Based on year-over-year revenue growth in 2012 for vendors with revenues of $20M+

Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability

A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software an...

30 september, 2013

Cisco IOS Software Internet Key Exchange Memory Leak Vulnerability

A vulnerability in the Internet Key Exchange (IKE) protocol of Cisco IOS Software and Cisco ...

30 september, 2013

Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability

A vulnerability in the implementation of the Network Time Protocol (NTP) feature in Cisco IO...

30 september, 2013

MS14-020: Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (2950145)

This security update resolves a privately reported vulnerability in Microsoft Office.

08 april, 2014

MS14-019: Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229)

This security update resolves a publicly disclosed vulnerability in Microsoft Windows.

08 april, 2014

MS14-018: Cumulative Security Update for Internet Explorer (2950467)

This security update resolves six privately reported vulnerabilities in Internet Explorer.

08 april, 2014

This Alert covers CVE-2010-0896 for the mail component of the Sun Convergence product

This Sun Alert covers CVE-2010-0896 for the mail component of the Sun Convergence product.

14 april, 2010

This Alert Covers CVE-2010-0893 for the Mail Component of the Sun Convergence Product

This Alert covers CVE-2010-0893 for the mail component of the Sun Convergence product.

14 april, 2010

SunOS 5.10_x86: ucode driver patch

6905530 processor microcode code can panic when retrieving microcode revision.

02 february, 2010