-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # SSA-838121: Multiple Denial of Service Vulnerabilities in Industrial Products Publication Date: 2022-02-08 Last Update: 2023-04-11 Current Version: 1.3 CVSS v3.1 Base Score: 7.5 SUMMARY ======= Affected SIMATIC firmware contains three vulnerabilities that could allow an unauthenticated attacker to perform a denial of service attack under certain conditions. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends countermeasures for products where updates are not, or not yet available. AFFECTED PRODUCTS AND SOLUTION ============================== * SIMATIC Drive Controller family - Affected versions: All versions < V2.9.2 - Affected by vulnerabilities: - CVE-2021-37204 - Remediation: Update to V2.9.4 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109773914/ * SIMATIC Drive Controller family - Affected versions: All versions >= V2.9.2 < V2.9.4 - Remediation: Update to V2.9.4 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109773914/ * SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) - Affected versions: All versions < V21.9 - Affected by vulnerabilities: - CVE-2021-37204 - Remediation: Update to V21.9.4 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109759122/ * SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) - Affected versions: All versions >= V21.9 < V21.9.4 - Remediation: Update to V21.9.4 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109759122/ * SIMATIC ET 200SP Open Controller CPU 1515SP PC2 Ready4Linux - Affected versions: All versions - Affected by vulnerabilities: - CVE-2021-37204 - Remediation: Currently no fix is planned * SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) - Affected versions: All versions - Affected by vulnerabilities: - CVE-2021-37204 - Remediation: Currently no fix is planned * SIMATIC S7-1200 CPU family (incl. SIPLUS variants) - Affected versions: All versions < V4.5.0 - Affected by vulnerabilities: - CVE-2021-37204 - Remediation: Update to V4.5.2 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109793280/ * SIMATIC S7-1200 CPU family (incl. SIPLUS variants) - Affected versions: All versions >= V4.5.0 < V4.5.2 - Remediation: Update to V4.5.2 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109793280/ * SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) - Affected versions: All versions < V2.9.2 - Affected by vulnerabilities: - CVE-2021-37204 - Remediation: Update to V2.9.4 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109478459/ * SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) - Affected versions: All versions >= V2.9.2 < V2.9.4 - Remediation: Update to V2.9.4 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109478459/ * SIMATIC S7-1500 Software Controller - Affected versions: All versions < V21.9 - Affected by vulnerabilities: - CVE-2021-37204 - Remediation: Update to V21.9.4 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109478528/ * SIMATIC S7-1500 Software Controller - Affected versions: All versions >= V21.9 < V21.9.4 - Remediation: Update to V21.9.4 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109478528/ * SIMATIC S7-PLCSIM Advanced - Affected versions: All versions < V4.0 - Affected by vulnerabilities: - CVE-2021-37204 - Remediation: Update to V4.0 SP1 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109805271/ * SIMATIC S7-PLCSIM Advanced - Affected versions: All versions >= V4.0 < V4.0 SP1 - Remediation: Update to V4.0 SP1 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109805271/ * SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) - Affected versions: All versions < V2.3.6 - Remediation: Update to V2.3.6 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109817397/ * TIM 1531 IRC (6GK7543-1MX00-0XE0) - Affected versions: All versions < V2.3.6 - Remediation: Update to V2.3.6 or later version - Download: https://support.industry.siemens.com/cs/ww/en/view/109817397/ WORKAROUNDS AND MITIGATIONS =========================== Product-specific remediations or mitigations can be found in the section "Affected Products and Solution". Please follow the "General Security Recommendations". GENERAL SECURITY RECOMMENDATIONS ================================ As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial- security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity PRODUCT DESCRIPTION =================== SIMATIC Drive Controllers have been designed for the automation of production machines, combining the functionality of a SIMATIC S7-1500 CPU and a SINAMICS S120 drive control. SIMATIC ET 200SP Open Controller is a PC-based version of the SIMATIC S7-1500 Controller including optional visualization in combination with central I/Os in a compact device. SIMATIC S7-1200 CPU products have been designed for discrete and continuous control in industrial environments such as manufacturing, food and beverages, and chemical industries worldwide. SIMATIC S7-1500 CPU products have been designed for discrete and continuous control in industrial environments such as manufacturing, food and beverages, and chemical industries worldwide. SIMATIC S7-1500 Software Controller is a SIMATIC software controller for PC-based automation solutions. SIMATIC S7-PLCSIM Advanced simulates S7-1200, S7-1500 and a few other PLC derivatives. Includes full network access to simulate the PLCs, even in virtualized environments. SIPLUS extreme products are designed for reliable operation under extreme conditions and are based on SIMATIC, LOGO!, SITOP, SINAMICS, SIMOTION, SCALANCE or other devices. SIPLUS devices use the same firmware as the product they are based on. TIM 1531 IRC is a communication module for SIMATIC S7-1500, S7-400, S7-300 with SINAUT ST7, DNP3 and IEC 60870-5-101/104 with three RJ45 interfaces for communication via IP-based networks (WAN / LAN) and a RS 232/RS 485 interface for communication via classic WAN networks. VULNERABILITY CLASSIFICATION ============================ The vulnerability classification has been performed by using the CVSS scoring system in version 3.1 (CVSS v3.1) (https://www.first.org/cvss/). The CVSS environmental score is specific to the customer's environment and will impact the overall CVSS score. The environmental score should therefore be individually defined by the customer to accomplish final scoring. An additional classification has been performed using the CWE classification, a community-developed list of common software security weaknesses. This serves as a common language and as a baseline for weakness identification, mitigation, and prevention efforts. A detailed list of CWE classes can be found at: https://cwe.mitre.org/. * Vulnerability CVE-2021-37185 An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over port 102/tcp. A restart of the affected device is needed to restore normal operations. CVSS v3.1 Base Score: 7.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C CWE: CWE-672: Operation on a Resource after Expiration or Release * Vulnerability CVE-2021-37204 An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packet over port 102/tcp. A restart of the affected device is needed to restore normal operations. CVSS v3.1 Base Score: 7.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C CWE: CWE-672: Operation on a Resource after Expiration or Release * Vulnerability CVE-2021-37205 An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over port 102/tcp. A restart of the affected device is needed to restore normal operations. CVSS v3.1 Base Score: 7.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C CWE: CWE-401: Missing Release of Memory after Effective Lifetime ACKNOWLEDGMENTS =============== Siemens thanks the following party for its efforts: * Gao Jian for coordinated disclosure ADDITIONAL INFORMATION ====================== For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories HISTORY DATA ============ V1.0 (2022-02-08): Publication Date V1.1 (2022-03-08): Added solution for SIMATIC S7-PLCSIM Advanced V1.2 (2022-07-12): Added fix for SIMATIC ET 200SP Open Controller CPU 1515SP PC2 and SIMATIC S7-1500 Software Controller, clarify that CVE-2021-37204 is also affecting devices without TLS and added SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) and SIMATIC ET 200SP Open Controller CPU 1515SP PC2 'Ready4Linux' as affected by CVE-2021-37204 V1.3 (2023-04-11): Added fix for TIM 1531 IRC TERMS OF USE ============ Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use. Copyright: Siemens 2023 -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEHyx/myPwjH9jB9tDlm7gTEmyujQFAmQ0owAACgkQlm7gTEmy ujQ7phAAxHvhVq0LtHa/iA+t6Ks4mNmMi6X20Zuy/k7qt9t/rYbcDwpMUdrIlMzZ +zUHjt8KNdwY+8ADGkqVzmp0gqaXZtY7HH/3G/DnMCyVmkN/oLQnNDrrRIVBO9BX VVP08L/1IGj6roP/IjO75MAn7gKrqNkY6i8oae1tc+KAlUn/h99cxtMsZL5M6p4a adbzwcGIuZotldkVgfk8MlqPUaGI0gd5HCCkAoybP0QqWwnGxFgG8FgFy8a6KCWT hsBrg8palk5INQSiqwiKjTIq3Rej1GToPhB1EeRH2iv/mLLIS3P9rWNZiAEJ+Q1P kY4Fm540wm/PzzgWyl1YJG+YDcGdjQXekGhCF8BQGloXVbOFnTYs4bDC1OQSGmvH oaXDQ34vX/8+eEl9nci9gkJLVCahPpDobQqQzFD/sOt6CLN7yIDlrpehX7uWQ+NY Dk8uPOFjVESqvAijmAatEH9+0UiKHfWx8jUMDWjF2ad57v0hAxh/qIrhBKNIFLDP qQcSyCoDh4cXIs0rC/QAFbArk7AaOdsCLdIMuftQjdHw9VxK12Hdb2+yj7pPjveb dsPOMZW1zjOXD3JHSqNeHWwSBLSiv9Ju4Mpy3g5ZgCt7zCHWS9XAXAXnd1lBg1qm XyteEI8DojhbFUK5JmAE8PKnCyQcWOARkEknvSva+JAFY2w+3EU= =0lt5 -----END PGP SIGNATURE-----