-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # SSA-675303: WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products Publication Date: 2021-07-13 Last Update: 2022-02-08 Current Version: 1.3 CVSS v3.1 Base Score: 9.1 SUMMARY ======= WIBU Systems published information about two vulnerabilities and an associated fix release version of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens products for license management. The vulnerabilities are described in the section "Vulnerability Classification" below and got assigned the CVE IDs CVE-2021-20093 and CVE-2021-20094. Successful exploitation of these vulnerabilities could allow an attacker to read data from the heap of the CodeMeter Runtime network server, or crash the CodeMeter Runtime Server (i.e., CodeMeter.exe). Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not, or not yet available. AFFECTED PRODUCTS AND SOLUTION ============================== * PSS(R)CAPE - Affected versions: CAPE 14 installations installed from material dated earlier than 2021-06-16 - Remediation: CAPE 14 installations installed from material dated 2021-06-16 or later are not affected, as they contain a fixed version of CodeMeter Runtime. If CAPE 14 was initially installed using earlier material, install WIBU Systems CodeMeter Runtime V7.21a or V7.30a manually to fix the issue: Download the package from https://www.psscape.com/codemeter and install it the same way as documented for previous versions in the PSS CAPE 14 Installation Manual. Contact PSS(R)CAPE Support at psscape.support.energy@siemens.com if you need assistance with patching affected systems. Installations of PSS(R)CAPE are only affected if network access to CodeMeter Runtime is enabled. This is not the default configuration and is not necessary for any functionality in PSS(R)CAPE. * SICAM 230 - Affected versions: All versions - Remediation: Currently no remediation is planned Update SICAM 230 to V8.00 or later version. Then update CodeMeter Runtime to V7.21a or V7.30a: Download the package from: https://www.wibu.com/us/support/user/downloads-user-software.html. Install it on SICAM 230 systems according to the procedure documented in chapter 9.2 of the COPA-DATA Security Vulnerability Announcement 2021_1: https://www.copadata.com/fileadmin/user_upload/faq/files/CD_SVA_2021_1.pdf. * SIMATIC Information Server - Affected versions: All versions >= 2019 SP1 < 2020 Upd1 - Affected by vulnerabilities: - CVE-2021-20093 - Remediation: Update SIMATIC PCS neo to V3.1 or later version Limit remote access to port 22350/tcp on systems where the Codemeter runtime network server is running. - Download: To obtain SIMATIC PCS neo V3.1 contact your local support. * SIMATIC PCS neo - Affected versions: All versions < V3.1 - Affected by vulnerabilities: - CVE-2021-20093 - Remediation: Update to V3.1 or later version Limit remote access to port 22350/tcp on systems where the Codemeter runtime network server is running. - Download: To obtain SIMATIC PCS neo V3.1 contact your local support. * SIMATIC Process Historian (incl. Process Historian OPC UA Server) - Affected versions: All versions >= 2019 < 2020 Upd1 - Affected by vulnerabilities: - CVE-2021-20093 - Remediation: Update SIMATIC PCS neo to V3.1 or later version Limit remote access to port 22350/tcp on systems where the Codemeter runtime network server is running. - Download: To obtain SIMATIC PCS neo V3.1 contact your local support. * SIMATIC WinCC OA V3.17 - Affected versions: All versions < V3.17 P013 - Affected by vulnerabilities: - CVE-2021-20093 - Remediation: Update to V3.17 P013 or later version Limit remote access to port 22350/tcp on systems where the Codemeter runtime network server is running (for details refer to the updated security manual of WinCC OA). - Download: https://www.winccoa.com/downloads/category/versions-patches.html * SIMATIC WinCC OA V3.18 - Affected versions: All versions < V3.18 P002 - Affected by vulnerabilities: - CVE-2021-20093 - Remediation: Update to V3.18 P002 or later version Limit remote access to port 22350/tcp on systems where the Codemeter runtime network server is running (for details refer to the updated security manual of WinCC OA). - Download: https://www.winccoa.com/downloads/category/versions-patches.html * SIMIT Simulation Platform - Affected versions: All versions >= V10.0 < V10.3 Upd 1 - Affected by vulnerabilities: - CVE-2021-20093 - Remediation: Update to V10.3 Upd1 or later version Alternatively, install WIBU Systems CodeMeter Runtime V7.21a or V7.30a manually to fix the issue: Download the package from https://www.wibu.com/us/support/user/downloads-user-software.html and follow the installation instructions from WIBU Systems. - Download: https://support.industry.siemens.com/cs/ww/en/view/109800638/ * SINEC INS - Affected versions: All versions < V1.0.1 Update 1 - Affected by vulnerabilities: - CVE-2021-20093 - Remediation: Update to V1.0.1 Update 1 or later version Alternatively, update CodeMeter Runtime to V7.21a: Download the package "CodeMeter User Runtime for Linux, version 7.21a, Driver-only" from the WIBU Systems User Software website. Install it on the system which runs SINEC INS by executing the following command: "sudo dpkg --force-depends --force-confnew -i codemeter-7.21.4611.501_amd64.deb" Limit remote access to port 22350/tcp on systems where the Codemeter runtime network server is running. Note that this is the default configuration, which therefore limits the exploitability to local attacks only. - Download: https://support.industry.siemens.com/cs/ww/en/view/109806100/ * SINEMA Remote Connect Server - Affected versions: All versions < V3.0 SP2 - Affected by vulnerabilities: - CVE-2021-20093 - Remediation: Update to V3.0 SP2 or later version Limit remote access to port 22350/tcp on systems where the Codemeter runtime network server is running. Note that this is the default configuration, which therefore limits the exploitability to local attacks only. - Download: https://support.industry.siemens.com/cs/ww/en/view/109793790/ WORKAROUNDS AND MITIGATIONS =========================== Siemens has not identified any additional specific workarounds or mitigations. Please follow the "General Security Recommendations". Product specific mitigations can be found in the section "Affected Products and Solution". GENERAL SECURITY RECOMMENDATIONS ================================ As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity PRODUCT DESCRIPTION =================== PSS(R)CAPE is a highly detailed protection simulation software for transmission and distribution networks. It supports the system protection function within electric power utilities. SICAM 230 is a scalable process control system for a broad range of applications and can be used from an integrated energy system for utility companies to a monitoring system for smart grid applications. SIMATIC Information Server is used to report and visualize process data stored in the SIMATIC Process Historian. SIMATIC PCS neo is a distributed control system (DCS). SIMATIC Process Historian is the long term archive system for SIMATIC PCS 7, SIMATIC WinCC and SIMATIC PCS neo. It stores process values, alarms and batch data of production plants in its database and offers historical process data to reporting and visualization applications. SIMATIC WinCC Open Architecture (OA) is part of the SIMATIC HMI family. It is designed for use in applications requiring a high degree of customer-specific adaptability, large or complex applications and projects that impose specific system requirements or functions. SIMIT Simluation Platform allows the simulation of plant setups in order to anticipate faults in the early planning phase. SINEC INS (Infrastructure Network Services) is a web-based application that combines various network services in one tool. This simplifies installation and administration of all network services relevant for industrial networks. SINEMA Remote Connect is a management platform for remote networks that enables the simple management of tunnel connections (VPN) between headquarters, service technicians, and installed machines or plants. It provides both the Remote Connect Server, which is the server application, and the Remote Connect Client, which is an OpenVPN client for optimal connection to SINEMA Remote Connect Server. VULNERABILITY CLASSIFICATION ============================ The vulnerability classification has been performed by using the CVSS scoring system in version 3.1 (CVSS v3.1) (https://www.first.org/cvss/). The CVSS environmental score is specific to the customer's environment and will impact the overall CVSS score. The environmental score should therefore be individually defined by the customer to accomplish final scoring. An additional classification has been performed using the CWE classification, a community-developed list of common software security weaknesses. This serves as a common language and as a baseline for weakness identification, mitigation, and prevention efforts. A detailed list of CWE classes can be found at: https://cwe.mitre.org/. * Vulnerability CVE-2021-20093 A buffer over-read vulnerability in the CodeMeter Runtime network server could cause the server to return packets containing data from the heap. An unauthenticated remote attacker could exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server (i.e., CodeMeter.exe). CVSS v3.1 Base Score: 9.1 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C CWE: CWE-126: Buffer Over-read * Vulnerability CVE-2021-20094 A buffer over-read vulnerability in the HTTP(S) service of the CodeMeter Runtime CmWAN server could cause the server to crash. An unauthenticated remote attacker with access to the CmWAN port could exploit this issue to crash the CodeMeter Runtime Server (i.e., CodeMeter.exe). CVSS v3.1 Base Score: 7.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C CWE: CWE-126: Buffer Over-read ADDITIONAL INFORMATION ====================== For more details regarding the vulnerabilities in CodeMeter Runtime refer to: - - WIBU Systems Security Advisories: https://www.wibu.com/support/security-advisories.html - - WIBU Systems User Software: https://www.wibu.com/support/user/user-software.html For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories HISTORY DATA ============ V1.0 (2021-07-13): Publication Date V1.1 (2021-09-14): Added solution for SIMATIC PCS neo, SIMATIC Information Server, SIMATIC Process Historian, SIMIT Simulation Platform, and SINEMA Remote Connect Server V1.2 (2021-11-09): For PSS(R)CAPE, SICAM 230, SIMIT: Added information that the latest version of CodeMeter (V7.30a) can also be used V1.3 (2022-02-08): Added solution for SINEC INS TERMS OF USE ============ Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use. -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEHyx/myPwjH9jB9tDlm7gTEmyujQFAmIBsoAACgkQlm7gTEmy ujQ4Kw//ddYTX/sQpgMw9B2jURU+UaRCpnM1ojsCfNAdFpcTOuBjxFjipitWcD15 365PtbPMXO4zfxAv4sOB+/yFViCjEQc74L/3ijMLv0HBgj3hPdLsH6zgD59Y2+hC 9I+gkOvg493MmV8G5ecDsSjxBeww/VBknOgPTU6BvM9VsHynlvG0QvkK5udrN0/w ZP2yaKc1FmSmJbSmESbNay6d8JWEmyODfCfwJQckfc7XHGbmi308ZWtK1iX5bH6b r7fd5Dxz1TfeLoWk3duve/cdRYa1YjUpEWyb+k2GxPZYo2G7nY5nZ/gfUK0rs+Rq LtMBLL0moLwcCV4+gHLt3oUHPtygH2Zta2yr2uv5R+xSULbP4yh0Ag/JmrG8+UGN zKGKYIvWzFdCxFbtn6ZJckOAYugwJxk/IjB56FZWUIz4fRDAVkb2GFxbUDDs6oYt 3OjqhLISwc1J5XGdZ+67NkeS02Rsy0vPItTUjWLOEtCPSIGNV3jrdjKLTmMLCOvi s0IkBw6BqBFdZ1+ohKJoeeHhJtRuDCMS+fP2AsQptvAFwgvnlB7R/4F5hJtZOYT9 zMNZ7B51FYAPwwK1mhl95kqgJsSQV35c8TT7yqD3RdzZr8FGUL1W5kpqZznLJhFd xLZL1nx+WEQoYLNmMgRGtW9hUgLEBWG0WgLKjO3S+9n6JP5kxAM= =ankO -----END PGP SIGNATURE-----