Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Siemens SIMATIC RTLS Gateways

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Siemens SIMATIC RTLS Gateways


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: cisa.gov

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory.โ€ฏFor the most up-to-date information on vulnerabilities in this advisory, please seeโ€ฏSiemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).ย 

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 7.7
  • ATTENTION: Exploitable from adjacent network
  • Vendor: Siemens
  • Equipment: SIMATIC RTLS Gateway RTLS4030G, SIMATIC RTLS Gateway RTLS4430G
  • Vulnerability: Improper Handling of Length Parameter Inconsistency

2. RISK EVALUATION

The Treck TCP/IP stack on affected devices improperly handles length parameter inconsistencies. Unauthenticated remote attackers may be able to send specially crafted IP packets which could lead to a denial of service condition or remote code execution.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following Siemens products are affected:

  • SIMATIC RTLS Gateway RTLS4030G, CMIIT (6GT2701-5DB23): All versions
  • SIMATIC RTLS Gateway RTLS4030G, ETSI (6GT2701-5DB03): All versions
  • SIMATIC RTLS Gateway RTLS4030G, FCC (6GT2701-5DB13): All versions
  • SIMATIC RTLS Gateway RTLS4030G, ISED (6GT2701-5DB33): All versions
  • SIMATIC RTLS Gateway RTLS4430G, Chirp, ETSI, FCC, ISED, IP65 (6GT2701-5CB03): All versions

3.2 Vulnerability Overview

3.2.1ย IMPROPER HANDLING OF LENGTH PARAMETER INCONSISTENCY CWE-130

The Treck TCP/IP stack on affected devices improperly handles length parameter inconsistencies. Unauthenticated remote attackers may be able to send specially crafted IP packets which could lead to a denial-of-service condition or remote code execution.

CVE-2020-11896ย has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated forย CVE-2020-11896. A base score of 7.7 has been assigned; the CVSS vector string is (CVSS4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS:ย Multiple Sectors
  • COUNTRIES/AREAS DEPLOYED:ย Worldwide
  • COMPANY HEADQUARTERS LOCATION:ย Germany

3.4 RESEARCHER

Siemens reported this vulnerability to CISA.

4. MITIGATIONS

Siemens has identified the following specific workarounds and mitigations users can apply to reduce risk:

  • SIMATIC RTLS Gateway RTLS4030G, CMIIT (6GT2701-5DB23), SIMATIC RTLS Gateway RTLS4030G, ETSI (6GT2701-5DB03), SIMATIC RTLS Gateway RTLS4030G, FCC (6GT2701-5DB13), SIMATIC RTLS Gateway RTLS4030G, ISED (6GT2701-5DB33), SIMATIC RTLS Gateway RTLS4430G, Chirp, ETSI, FCC, ISED, IP65 (6GT2701-5CB03): Currently no fix is planned. Implement Security recommendations according to the product manual

As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according toย Siemens' operational guidelines for industrial securityย and following recommendations in the product manuals.

Additional information on industrial security by Siemens can be found on theย Siemens industrial security webpage.

For more information see the associated Siemens security advisory SSA-647068 inย HTMLย andย CSAF.

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

  • Minimize network exposure for all control system devices and/or systems, ensuring they areย not accessible from the internet.
  • Locate control system networks and remote devices behind firewalls and isolating them from business networks.
  • When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section forย control systems security recommended practicesย on the ICS webpage onย cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, includingย Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies forย proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage atย cisa.govย in the technical information paper,ย ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability is not exploitable remotely. This vulnerability has a high attack complexity.

5. UPDATE HISTORY

  • February 15, 2024: Initial Publication
...



๐Ÿ“Œ Siemens SIMATIC RTLS Gateways


๐Ÿ“ˆ 66.08 Punkte

๐Ÿ“Œ Siemens SIMATIC ET/SIMATIC S7-1500/SIMATIC S7-1500 Network Stack Crafted Packet denial of service


๐Ÿ“ˆ 54.03 Punkte

๐Ÿ“Œ CVE-2022-41989 | Sewio RTLS Studio up to 2.6.2 RTLS Report out-of-bounds write (icsa-23-012-01)


๐Ÿ“ˆ 50.4 Punkte

๐Ÿ“Œ Siemens SIMATIC S7-300 PN/SIMATIC S7-400 PN 3.2.12 Denial of Service


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens OpenPCS/SIMATIC BATCH/SIMATIC NET PC-Software RPC Service denial of service


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC S7-400/SIMATIC S7-400H Restart denial of service


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC PCS 7/SIMATIC WinCC privilege escalation [CVE-2019-10922]


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC PCS 7/SIMATIC WinCC DCOM Interface privilege escalation


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC WinCC/SIMATIC PCS 7 ActiveX Component Pufferรผberlauf


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC S7-300 PN/SIMATIC S7-400 PN 3.2.12 Denial of Service


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC PCS 7/SIMATIC WinCC Project File denial of service


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC PCS 7/SIMATIC WinCC Project File privilege escalation


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC S7-300 PN/SIMATIC S7-400 PN Protection Level 2 Credentials Information Disclosure


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC Ident MV420/SIMATIC Ident MV440 weak encryption


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC Ident MV420/SIMATIC Ident MV440 Request privilege escalation


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC PCS 7/SIMATIC WinCC File Upload ASPX File Remote Code Execution


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC ET 200SP/SIMATIC S7-1500 20.8 Web Server denial of service


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC PCS 7/SIMATIC WinCC authentication bypass [CVE-2020-10048]


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ CVE-2016-9160 | Siemens SIMATIC WinCC/SIMATIC PCS 7 ActiveX Component 7pk security (ssa-693129 / BID-94825)


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC WinCC/SIMATIC PCS 7 ActiveX Component Pufferรผberlauf


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ CVE-2016-9159 | Siemens SIMATIC S7-300 PN/SIMATIC S7-400 PN Protection Level 2 Credentials information disclosure (ssa-731239 / BID-94820)


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ CVE-2016-9158 | Siemens SIMATIC S7-300 PN/SIMATIC S7-400 PN 3.2.12 input validation (ssa-731239 / BID-94820)


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC S7-300 PN/SIMATIC S7-400 PN Protection Level 2 Credentials Information Disclosure


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Siemens SIMATIC S7-400/SIMATIC S7-400H Restart Denial of Service


๐Ÿ“ˆ 39.12 Punkte

๐Ÿ“Œ Vuln: SIMATIC WinCC and SIMATIC PCS 7 CVE-2016-9160 ActiveX Control Security Bypass Vulnerability


๐Ÿ“ˆ 29.82 Punkte

๐Ÿ“Œ Vuln: SIMATIC WinCC and SIMATIC PCS 7 CVE-2016-9160 ActiveX Control Security Bypass Vulnerability


๐Ÿ“ˆ 29.82 Punkte

๐Ÿ“Œ Nach 27 Jahren: Geht RTLs grรถรŸtem TV-Dauerbrenner die Luft aus?


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ RTLs Streaming-Anbieter TV Now hat 1,3 Millionen zahlende Kunden


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ RTLS systems vulnerable to MiTM attacks, location manipulation


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ Researchers Discover Multiple Vulnerabilities Affecting Ultra-wideband RTLS


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ GZSZ-Quiz: Das groรŸe Quiz zu RTLs erfolgreicher Soap!


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ RTLS Systems Found Vulnerable to MiTM Attacks and Location Tampering


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ CVE-2022-43483 | Sewio RTLS Studio up to 2.6.2 Module Name os command injection (icsa-23-012-01)


๐Ÿ“ˆ 25.2 Punkte

๐Ÿ“Œ CVE-2022-45444 | Sewio RTLS Studio up to 2.6.2 hard-coded password (icsa-23-012-01)


๐Ÿ“ˆ 25.2 Punkte











matomo