9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.974 High
EPSS
Percentile
99.9%
**ATTENTION:**Remotely exploitable/low skill level to exploit.
Vendor: Siemens
Equipment: SIMATIC Industrial PCs, SINUMERIK Panel Control Unit (PCU), SIMOTION P320
Vulnerability: Permissions, Privileges, and Access Controls
This updated advisory is a follow-up to the original advisory titled ICSA-17-180-01 Siemens Industrial Products using Intel Processors that was published June 29, 2017, on the NCCIC/ICS-CERT web site.
Siemens reports that the vulnerability affects Siemens Industrial products which use Intel processors (Intel Core i5, Intel Core i7 and Intel XEON):
Please see Siemens Security Advisory SSA-874235 for the full list of affected versions.
A remote attacker can gain system privileges by exploiting this vulnerability.
--------- Begin Update A Part 1 of 1 --------
Siemens has provided firmware updates for the affected industrial PCs to address this vulnerability. These updates can be found on their web site at the following location:
<https://support.industry.siemens.com/cs/ww/en/view/109747626>
--------- End Update A Part 1 of 1 ----------
Siemens strongly recommends users protect network access to the non-perimeter industrial products with appropriate mechanisms. Siemens also advises that users configure the operational environment according to Siemensโ Operational Guidelines for Industrial Security:
<https://www.siemens.com/cert/operational-guidelines-industrial-security>
For more a specific list of affected products and more detailed mitigation instructions, please see Siemens Security Advisory SSA-874235 at the following location:
<http://www.siemens.com/cert/advisories>
For more information about this vulnerability, please see Intel Security Advisory โ INTEL-SA-00075 at the following location:
<https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA->00075&languageid=en-fr
NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available in the ICSโCERT Technical Information Paper, ICS-TIP-12-146-01BโTargeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.
No known public exploits specifically target this vulnerability.
Unprivileged local or remote attackers can gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM) and Intel Small Business Technology (SBT).
CVE-2017-5689 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Maksim Malyutin from Embedi reported this issue to Intel.
Critical Infrastructure Sectors: Chemical, Commercial Facilities, Critical Manufacturing, Energy, Food and Agriculture, Water and Wastewater Systems
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Germany
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5689
www.siemens.com/cert/advisories
cwe.mitre.org/data/definitions/264.html
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
security-center.intel.com/advisory.aspx?intelid=INTEL-SA-
support.industry.siemens.com/cs/ww/en/view/109747626
twitter.com/CISAgov
twitter.com/intent/tweet?text=Siemens%20SIMATIC%20Industrial%20PCs%2C%20SINUMERIK%20Panel%20Control%20Unit%2C%20and%20SIMOTION%20P320%20%28Update%20A%29+https://www.cisa.gov/news-events/ics-advisories/icsa-17-180-01a
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-17-180-01a&title=Siemens%20SIMATIC%20Industrial%20PCs%2C%20SINUMERIK%20Panel%20Control%20Unit%2C%20and%20SIMOTION%20P320%20%28Update%20A%29
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-17-180-01a
www.oig.dhs.gov/
www.siemens.com/cert/operational-guidelines-industrial-security
www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-874235.pdf
www.surveymonkey.com/r/CISA-cyber-survey?product=https://www.cisa.gov/news-events/ics-advisories/icsa-17-180-01a
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=Siemens%20SIMATIC%20Industrial%20PCs%2C%20SINUMERIK%20Panel%20Control%20Unit%2C%20and%20SIMOTION%20P320%20%28Update%20A%29&body=www.cisa.gov/news-events/ics-advisories/icsa-17-180-01a
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.974 High
EPSS
Percentile
99.9%