Tuesday, April 12, 2016

ICS-CERT Publishes 4 Advisories

This afternoon the DHS ICS-CERT published four control system advisories for products from Honeywell (1) and Siemens (3). The Honeywell advisory had been previously released on the US CERT Secure Portal. Siemens had announced all three of these advisories last Friday on TWITTER.

Honeywell Advisory


This advisory describes a stack-based buffer overflow vulnerability in the Honeywell Uniformance Process History Database (PHD). The vulnerability was self-identified. Honeywell has produced a patch to mitigate the vulnerability.

ICS-CERT reports that a relatively unskilled attacker could remotely exploit this vulnerability to execute a denial of service attack.

This vulnerability was originally reported on the US CERT Secure Portal on March 10th, 2016. If you were keeping up with ICS-CERT activity on the Secure Portal you would already have had more than a month to figure out how to deal with this advisory.

Siemens Industrial Products Advisory


This advisory describes a DROWN vulnerability in a number of Siemens SCALANCE and ROX products. Patches are still in development. In the meantime, Siemens has provided a series of countermeasures to reduce the risk of this vulnerability.

ICS-CERT reports that it would be difficult to use one of the publicly available exloits to remotely exploit this vulnerability to decrypt intercepted TLS sessions.

NOTE: The initial DROWN vulnerability paper was published on March 1st, 2016.

NOTE: I have not seen any other ICS vendors reporting DROWN vulnerabilities. Nor has ICS-CERT issued anything on it to-date. It is highly unlikely that Siemens is the only vendor with vulnerable systems.

Siemens SCALANCE Advisory


This advisory describes a resource exhaustion vulnerability in the Siemens SCALANCE S613 firewall device. The vulnerability was apparently self-identified. Siemens will provide user specific mitigation measures for this vulnerability. There is no indication in either the ICS-CERT Advisory or the Siemens ProductCERT advisory that patches are forth coming for this vulnerability.

ICS-CERT reports that a relatively low skilled attacker could remotely exploit this vulnerability to execute a denial of service attack on the web server on the device.

Siemens glibc Library Advisory


This advisory describes a buffer overflow vulnerability in the glibc library of a number of Siemens products. Siemens has produced updates to mitigate this vulnerability in their ROX II and APE devices. Pending updates for other affected devices, Siemens provides suggested mitigation measures.

ICS-CERT reports that this vulnerability is remotely exploitable and exploits are publicly available, but crafting a working exploit would be difficult. A successful exploit could result in a denial of service condition. The Siemens ProductCERT advisory suggests that execution of arbitrary code could result from a successful exploit; noting that:

“In order to exploit the vulnerability, the attacker must be able to either trick a targeted host to resolve attacker-controlled domain names, to use attacker-controlled DNS servers for resolution, or to gain a privileged network position allowing him to capture and modify the affected device’s network communication.”


NOTE: This is another library based vulnerability that may be expected to affect products from other vendors as well.

No comments:

 
/* Use this with templates/template-twocol.html */