Serious Flaw Found in Many Siemens Industrial Products

Several product lines from Siemens are affected by a serious vulnerability that can be exploited by a remote attacker to cause systems to enter a denial-of-service (DoS) condition.
The flaw, tracked as CVE-2017-12741 and rated “high severity,” was reported to Siemens by George Lashenko of industrial cybersecurity firm CyberX.
According to Siemens, the list of affected products includes SIMATIC S7-200 Smart micro-PLCs for small automation applications, some SIMATIC S7 CPUs, SIMATIC WinAC RTX software controllers, SIMATIC ET 200 PROFINET interface modules, SIMATIC PN/PN couplers, SIMATIC Compact field units, development kits for PROFINET IO, SIMOTION motion control systems, SINAMICS converters, SINUMERIK CNC automation solutions, SIMOCODE motor management systems, and SIRIUS 3RW motor soft starters.
An attacker can cause affected systems to malfunction by sending them specially crafted packets via UDP port 161, which is used for the simple network management protocol (SNMP). In order to recover from the DoS condition, the devices must be manually restarted.
密码的安全和管理是令我们头疼,通过密码策略我们可以防止用户使用简单的密码,但是要防止将密码写下来或者通过其它渠道造成密码的分享或泄露,则不能全信赖技术控管,我们通过信息安全意识教育课程来完善密码安全的管理。
The mitigating factors section of Siemens’ advisory lists the requirement that the attacker must have network access for exploitation, and the fact that it advises organizations to operate these devices only in trusted environments.
However, CyberX told SecurityWeek that there are roughly 2,000 Siemens devices accessible from the Internet, including approximately 400 that have an open SNMP port, which could make them vulnerable to the company’s exploit.
“DoS vulnerabilities shouldn’t be taken lightly,” CyberX said. “The December 2016 attack on the Ukrainian electrical grid used this type of exploit to disable protection relays and make it more difficult for operators to recover.”

The security firm said Siemens was very responsive to its vulnerability report. The vendor has released firmware updates that patch the flaw in some SIMATIC S7, EK-ERTEC, SIMOTION and SINAMICS products.
Until fixes become available for the other affected products, Siemens recommends disabling SNMP, which fully mitigates the vulnerability, protecting network access to port 161, applying defense-in-depth and cell protection concepts, and using VPNs.
Related: Moxa NPort Devices Vulnerable to Remote Attacks
Related: Exploited Windows Flaws Affect Siemens Medical Imaging Products
信息安全知识评测
Related: Serious Flaw Exposes Siemens Industrial Switches to Attacks
Related: Flaw in Siemens RTU Allows Remote Code Execution
信息安全审计主要内容覆盖了信息系统和业务系统在运行过程中所面临的各种潜在的风险以及面对的风险所能够去处理的这些对策,包括信息系统的基础设施的安全的风险,还有一些可靠性的风险和合规性的风险,以及在业务的过程中一些操作风险和合规性的风险。

猜您喜欢

信息安全意识培训游戏之安全防御战
包含消防预案与演练的在线EHS动画培训课程
网络安全法学习课堂
全明星Solo赛程已出 Uzi首战遇越南神僧
MATRIMONIALLINK BUSWATCHES
NBC.com被黑事件让哪些安全技术蒙羞?