Tuesday, December 22, 2015

ICS-CERT Updates Two Advisories and Publishes New Siemens Advisory

This afternoon the DHS ICS-CERT published two updates to previously issued control system security advisories for products from Siemens and Infinite Automation. They also published a new advisory for a Siemens product.

Please note that neither update was identified on the ICS-CERT landing page. You would only have been notified of them by seeing them on TWITTER (Siemens here and Infinite Automation here). If you had signed up for ICS-CERT update emails you will likely receive them tomorrow. All of the ones that I have received to-date have come in the next day.

Siemens Update  

This update establishes the version numbers of the affected ROX II based products affected by the TLS POODLE vulnerability and announces that the firmware update for the ROX II devices is now available. All Siemens products affected by the vulnerability now have updates available.

The Siemens CERT announced their update last Friday morning on TWITTER.

Infinite Automation Update

This update announces the availability of a new version that mitigates all of the identified vulnerabilities, including the cross-site scripting vulnerability that the previous update did not address. The advisory reports that the researchers who identified the vulnerabilities have verified the efficacy of the fix.

Version notes for the latest version (2.7.0) are not yet available on the Infinite Automation web site.

Siemens Advisory

This advisory describes four new vulnerabilities related to the NTP daemon in the Siemens RUGGEDCOM ROX-based devices. The vulnerabilities were apparently self-identified. Siemens has produced firmware updates to mitigate the vulnerabilities.

The vulnerabilities are:

• Authentication bypass issues - CVE-2015-7871; and
• Three input validation vulnerabilities - CVE-2015-7855, CVE-2015-7704, and CVE-2015-5300.
ICS-CERT reports that a relatively unskilled attacker could remotely exploit these vulnerabilities to affect the ability of the devices to properly update time.

These new NTP vulnerabilities do not appear to be directly related to the general NTP vulnerability issues that ICS-CERT addressed last year. What is not clear from this advisory is whether the vulnerabilities are found in just the RUGGEDCOM implementation of NTP or if this is also a problem that may affect devices from multiple manufacturers. I suspect that the vendors identified in the previous NTP advisory should probably check their implementations to see if their devices might also be affected.

The Siemens CERT announced their advisory last Friday morning on TWITTER.

No comments:

/* Use this with templates/template-twocol.html */