-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # SSA-450613: Insyde BIOS Vulnerabilities in RUGGEDCOM APE1808 Product Family Publication Date: 2023-02-14 Last Update: 2023-09-12 Current Version: 1.1 CVSS v3.1 Base Score: 7.0 SUMMARY ======= Insyde has published information on vulnerabilities in Insyde BIOS on November 8th 2022. These vulnerabilities also affect the RUGGEDCOM APE1808 product family. Siemens has released updates for the affected products and recommends to update to the latest versions. AFFECTED PRODUCTS AND SOLUTION ============================== * RUGGEDCOM APE1808 ADM (6GK6015-0AL20-0GL0) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808 ADM CC (6GK6015-0AL20-0GL1) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808 CKP (6GK6015-0AL20-0GK0) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808 CKP CC (6GK6015-0AL20-0GK1) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808 CLOUDCONNECT (6GK6015-0AL20-0GM0) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808 CLOUDCONNECT CC (6GK6015-0AL20-0GM1) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808 ELAN (6GK6015-0AL20-0GP0) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808 ELAN CC (6GK6015-0AL20-0GP1) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808 SAM-L (6GK6015-0AL20-0GN0) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808 SAM-L CC (6GK6015-0AL20-0GN1) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808CLA-P (6GK6015-0AL20-1AA0) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808CLA-P CC (6GK6015-0AL20-1AA1) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808CLA-S1 (6GK6015-0AL20-1AB0) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808CLA-S1 CC (6GK6015-0AL20-1AB1) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808CLA-S3 (6GK6015-0AL20-1AD0) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808CLA-S3 CC (6GK6015-0AL20-1AD1) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808CLA-S5 (6GK6015-0AL20-1AF0) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808CLA-S5 CC (6GK6015-0AL20-1AF1) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808LNX (6GK6015-0AL20-0GH0) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808LNX CC (6GK6015-0AL20-0GH1) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808W10 (6GK6015-0AL20-0GJ0) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 * RUGGEDCOM APE1808W10 CC (6GK6015-0AL20-0GJ1) - Affected versions: All BIOS versions < V1.0.212N - Remediation: Update BIOS to V1.0.212N or later version - Download: https://support.industry.siemens.com/cs/in/en/view/109814796 WORKAROUNDS AND MITIGATIONS =========================== Product-specific remediations or mitigations can be found in the section "Affected Products and Solution". Please follow the "General Security Recommendations". GENERAL SECURITY RECOMMENDATIONS ================================ As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial- security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity PRODUCT DESCRIPTION =================== The RUGGEDCOM APE1808 is a powerful utility-grade application hosting platform that lets you deploy a range of commercially available applications for edge computing and cybersecurity in harsh, industrial environments. VULNERABILITY CLASSIFICATION ============================ The vulnerability classification has been performed by using the CVSS scoring system in version 3.1 (CVSS v3.1) (https://www.first.org/cvss/). The CVSS environmental score is specific to the customer's environment and will impact the overall CVSS score. The environmental score should therefore be individually defined by the customer to accomplish final scoring. An additional classification has been performed using the CWE classification, a community-developed list of common software security weaknesses. This serves as a common language and as a baseline for weakness identification, mitigation, and prevention efforts. A detailed list of CWE classes can be found at: https://cwe.mitre.org/. * Vulnerability CVE-2022-30774 DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack). This issue was discovered by Insyde engineering during a security review. https://www.insyde.com/security-pledge/SA-2022043 CVSS v3.1 Base Score: 6.4 CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C CWE: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition * Vulnerability CVE-2022-31243 Update description and links DMA transactions which are targeted at input buffers used for the software SMI handler used by the FvbServicesRuntimeDxe driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. https://www.insyde.com/security-pledge/SA-2022044 CVSS v3.1 Base Score: 6.4 CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C CWE: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition * Vulnerability CVE-2022-33906 DMA transactions which are targeted at input buffers used for the FwBlockServiceSmm software SMI handler could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. https://www.insyde.com/security-pledge/SA-2022048 CVSS v3.1 Base Score: 6.4 CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C CWE: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition * Vulnerability CVE-2022-33908 DMA transactions which are targeted at input buffers used for the SdHostDriver software SMI handler could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. https://www.insyde.com/security-pledge/SA-2022050 CVSS v3.1 Base Score: 7.0 CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C CWE: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition * Vulnerability CVE-2022-33982 DMA attacks on the parameter buffer used by the Int15ServiceSmm software SMI handler could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. CVSS v3.1 Base Score: 6.4 CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C CWE: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition * Vulnerability CVE-2022-33984 DMA transactions which are targeted at input buffers used for the SdMmcDevice software SMI handler could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. https://www.insyde.com/security-pledge/SA-2022054 CVSS v3.1 Base Score: 7.0 CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C CWE: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition ADDITIONAL INFORMATION ====================== For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories HISTORY DATA ============ V1.0 (2023-02-14): Publication Date V1.1 (2023-09-12): Added remediation for affected products and removed CVE-2022-33907 as the products are not affected TERMS OF USE ============ Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use. Copyright: Siemens 2023 -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEHyx/myPwjH9jB9tDlm7gTEmyujQFAmT/qgAACgkQlm7gTEmy ujRH+hAAzlqUWoqt+cQgngL21zpA1ComAhkDVieO9mptxINxAJJh3+2xbMqW/X3e Zp7nuqXiWRDVIUjJZJ1NqAsmukLUrDH6KJophM7mEZTqnMdO2In4MjbBZIIJ/nlV BxSnL2VKSQpD+aWsBbkXouBbnQetBKeT3vqE2/KdLz1Zj0+eWQ3R9KFfd/mNMvWO P1uOxLykBRVkW6Y7LT22TgRxnaTZoHJhPr50l3+P2lop8/rnqFVFnjrbEaRLLtMt wAnJCpPyAiMdKS7W1Epue7YNEXCQgaNoz43468lU64StATK6x8CnkoaNI5LiLRCk 9T9rfOapWa1xHHiaGUIyWnbwEJdSJT8+AeehMcUexM9+sNNJwSREevRfWu+OzF33 Ac84ifJOjyP8T49/vCnmC/mD2aGpuR50geqrnlyPguWB55QdSoaAHi83ClC8oiJn FCOboPIu5M7GhAYlcODmjO9UcdH5vFkYv3a2e8+dr4CU5PnB26S2ntiAzXpkv1Wk upEUDhf1+Ae7ivxO4MnEgSkAMRI9RWdzaeH9aLrHKFCk0nO5YxkSkc15xjLONUHu 117IikLDvKuMzNgzjAd9pYy8EAy5vGNMJ6Vu8ufHU9n3tGN1pVoKGQz0nNG8CQNI 4akfE8MxzLHMCME6WiXIBnvekf66gOjvc430r16zJ2d/tDZm1uk= =k9mG -----END PGP SIGNATURE-----