Tuesday, October 9, 2012

ICS-CERT Publishes WellinTech and Siemens Advisories

Yesterday ICS-CERT published two ICS advisories; a follow-up to an earlier alert concerning a vulnerability in WellinTech KingView application and a Siemens S7-1200 PLC vulnerability.

WellinTech Advisory

The WellinTech advisory is an update of an earlier alert on an uncoordinated disclosure made by Dr. Wesley McGrew of Mississippi State University. Dr. McGrew reported at DEFCON 20 that user credentials were not securely hashed, allowing usernames and passwords to decrypted using a simple mathematical algorithm.

This advisory reports that a relatively low skilled attacker with access to the publicly available exploit can obtain usernames and passwords to gain access to systems. WellinTech has created a patch that increases the complexity of the password encryption algorithm. The advisory does not report that ICS-CERT or Dr. McGrew has confirmed the efficacy of the patch.

Siemens Advisory

Monday Siemens published an advisory based upon a coordinated disclosure by Positive Technologies of a cross-site scripting vulnerability in the S7-1200 Web Application Module; today ICS-CERT published their advisory based upon the Siemens report.

According to Siemens the S7-1200 PLCs have an embedded web server that can be enabled by the user. If a social engineering attack convinces a user to access a malicious web site the attacker “could manipulate what the browser displays when viewing the S7-1200’s web pages, steal session cookies, or redirect the user’s browser to a malicious web site”.

Siemens has developed a firmware update that is available through their regional Technical Support Centers. The ICS-CERT advisory does not confirm that the update mitigates the vulnerability.

Another Siemens Vulnerability

The Siemens security website lists another vulnerability published yesterday. It refers to a buffer overflow vulnerability in the SiPass integrated access control system. I would suppose the reason that this was not reported by ICS-CERT is that the system is not a ‘real’ control system in that it doesn’t control any industrial processes. Owners of such systems would, however, certainly be interested in a vulnerability that would allow an attacker to conduct a denial of service attack on a security system. Siemens has produced a hot fix for this vulnerability that is available through customer service.

No comments:

/* Use this with templates/template-twocol.html */