CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:P/I:P/A:C
AI Score
Confidence
Low
EPSS
Percentile
53.5%
This updated advisory is a follow-up to the original advisory titled ICSA-13-149-01 Siemens SCALANCE Privilege Escalation Vulnerabilities that was published May 29, 2013, on the ICS webpage on us-cert.gov.
Successful exploitation of these vulnerabilities could allow an attacker to escalate his privileges within the web interface. Users with administrator privileges can change configuration of the switches.
--------- Begin Update A Part 1 of 2 ---------
Siemens reports the vulnerabilities affect the following versions of SCALANCE:
--------- End Update A Part 1 of 2 ---------
The user privileges for the web interface are enforced on the client side and not properly verified on the server side. Therefore, an attacker may be able to execute privileged commands using an unprivileged account.
CVE-2013-3633 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H).
The implementation of SNMPv3 does not sufficiently check user credentials. Therefore, an attacker may be able to execute SNMP commands without correct credentials.
CVE-2013-3634 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
Hay Mizrachi from OTORIO and Artem Zinenko from Kaspersky reported these vulnerabilities to Siemens.
--------- Begin Update A Part 2 of 2 ---------
Siemens recommends updating these products:
SCALANCE X-200 switch family: [Update to v5.0.0 (released in 2013), or any later version (currently v5.2.4](<https://support.industry.siemens.com/cs/ document/109767965>))
SCALANCE X-200IRT switch family: [Update to v5.1.0 (released in 2013), or any later version (currently v5.4.2)](<https://support.industry.siemens.com/cs/ document/109763309>)
--------- End Update A Part 2 of 2 ---------
If it is not possible to install the firmware update, mitigate the SNMP vulnerability by either disabling SNMP or completely disabling read-write access.
As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemensβ
Operational Guidelines for Industrial Security and to follow the recommendations in the product manuals.
Additional information on industrial security by Siemens can be found at:
<https://www.siemens.com/industrialsecurity>
For more information on this vulnerability and more detailed mitigation instructions, please see Siemens security advisory SSA-170686 at the following location:
<http://www.siemens.com/cert/advisories>
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on us-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01BβTargeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
No known public exploits specifically target these vulnerabilities.
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3633
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-3634
www.siemens.com/cert/advisories
cisasurvey.gov1.qualtrics.com/jfe/form/SV_9n4TtB8uttUPaM6?product=https://www.cisa.gov/news-events/ics-advisories/icsa-13-149-01
cwe.mitre.org/data/definitions/264.html
cwe.mitre.org/data/definitions/287.html
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
support.industry.siemens.com/cs/ document/109763309
support.industry.siemens.com/cs/ document/109767965
twitter.com/CISAgov
twitter.com/intent/tweet?text=Siemens%20SCALANCE%20Privilege%20Escalation%20Vulnerabilities%20%20%28Update%20A%29+https://www.cisa.gov/news-events/ics-advisories/icsa-13-149-01
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-13-149-01&title=Siemens%20SCALANCE%20Privilege%20Escalation%20Vulnerabilities%20%20%28Update%20A%29
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-13-149-01
www.oig.dhs.gov/
www.siemens.com/industrialsecurity
www.us-cert.gov/ics
www.us-cert.gov/ics
www.us-cert.gov/ics/alerts/ICS-ALERT-10-301-01
www.us-cert.gov/ics/recommended-practices
www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B
www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=Siemens%20SCALANCE%20Privilege%20Escalation%20Vulnerabilities%20%20%28Update%20A%29&body=www.cisa.gov/news-events/ics-advisories/icsa-13-149-01