-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # SSA-914168: Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products Publication Date: 2022-02-08 Last Update: 2022-08-09 Current Version: 1.3 CVSS v3.1 Base Score: 6.3 SUMMARY ======= Multiple vulnerabilities were found in SIMATIC WinCC that ultimately could allow attackers to retrieve and brute force password hashes and access other systems. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens is preparing further updates and recommends specific countermeasures for products where updates are not, or not yet available. AFFECTED PRODUCTS AND SOLUTION ============================== * SIMATIC PCS 7 V8.2 - Affected versions: All versions - Remediation: Install SIMATIC WinCC V7.4 SP1 Update 19 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109806846/ * SIMATIC PCS 7 V9.0 - Affected versions: All versions - Remediation: Update to V9.0 SP3 UpdateCollection04 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109780528/ * SIMATIC PCS 7 V9.1 - Affected versions: All versions < V9.1 SP1 - Remediation: Update to V9.1 SP1 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109805073/ * SIMATIC WinCC V7.4 - Affected versions: All versions < V7.4 SP1 Update 19 - Remediation: Update to V7.4 SP1 Update 19 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109806846/ * SIMATIC WinCC V7.5 - Affected versions: All versions < V7.5 SP2 Update 6 - Remediation: Update to V7.5 SP2 Update 6 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109793460/ * SIMATIC WinCC V15 and earlier - Affected versions: All versions < V15 SP1 Update 7 - Remediation: Update to V15 SP1 Update 7 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/us/en/view/109763890/ * SIMATIC WinCC V16 - Affected versions: All versions < V16 Update 5 - Remediation: Update to V16 Update 5 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109776017/ * SIMATIC WinCC V17 - Affected versions: All versions < V17 Update 2 - Remediation: Update to V17 Update 2 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109784441/ * SIMATIC WinCC V17 - Affected versions: All versions >= V17 Update 2 < V17 Update 4 - Affected by vulnerabilities: - CVE-2021-40363 - Remediation: Update to V17 Update 4 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109784441/ WORKAROUNDS AND MITIGATIONS =========================== Siemens has identified the following specific workarounds and mitigations that customers can apply to reduce the risk: * CVE-2021-40363: Harden the application's host to prevent local access by untrusted personnel Product specific remediations or mitigations can be found in the section "Affected Products and Solution". Please follow the "General Security Recommendations". GENERAL SECURITY RECOMMENDATIONS ================================ As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial- security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity PRODUCT DESCRIPTION =================== SIMATIC PCS 7 is a distributed control system (DCS) integrating SIMATIC WinCC, SIMATIC Batch, SIMATIC Route Control, OpenPCS7 and other components. SIMATIC WinCC is a supervisory control and data acquisition (SCADA) system. VULNERABILITY CLASSIFICATION ============================ The vulnerability classification has been performed by using the CVSS scoring system in version 3.1 (CVSS v3.1) (https://www.first.org/cvss/). The CVSS environmental score is specific to the customer's environment and will impact the overall CVSS score. The environmental score should therefore be individually defined by the customer to accomplish final scoring. An additional classification has been performed using the CWE classification, a community-developed list of common software security weaknesses. This serves as a common language and as a baseline for weakness identification, mitigation, and prevention efforts. A detailed list of CWE classes can be found at: https://cwe.mitre.org/. * Vulnerability CVE-2021-40360 The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server. CVSS v3.1 Base Score: 6.3 CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C CWE: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor * Vulnerability CVE-2021-40363 The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system. CVSS v3.1 Base Score: 5.5 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C CWE: CWE-538: Insertion of Sensitive Information into Externally- Accessible File or Directory ADDITIONAL INFORMATION ====================== For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories HISTORY DATA ============ V1.0 (2022-02-08): Publication Date V1.1 (2022-04-12): Added solution for SIMATIC WinCC V7.4, SIMATIC PCS 7 V8.2 and SIMATIC PCS 7 V9.0 V1.2 (2022-05-10): Added solution for SIMATIC WinCC V15 V1.3 (2022-08-09): Added solution to SIMATIC WinCC V17 (for CVE-2021-40363) TERMS OF USE ============ Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use. Copyright: Siemens 2022 -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEHyx/myPwjH9jB9tDlm7gTEmyujQFAmLxo4AACgkQlm7gTEmy ujT+6RAAg1aG5iN1tQPn37D6WIxXocA99O11FH90Dxo1l3f7/DzBjdBtcw7DhTEp s6B0ZZHjCZb2IW5sFS1Mzj4DMDpCJeQSP4ZjOecv1SCFBOptJCWs3usD+8X4AJru k2ylliHavyVmvfILojtLstsP2QqZiIaljR+pfrikdmfAh4cS398a4G2pz+iQluDC 6lvz37MY9Cdqulr9r6ITh2mN1JrnNreUDmjwLT0NFUokXjYuIWyMfB5mnhhTS5K1 ImUiIg52vrAl58bHpM7x+pVDI6oHrCsy1jR0/Tga+O8ukweN4hCz9Bll1bv9ErBs AlS9oZv/xls2VJ4tn/MvYpq2MRCwErjf2bbTO0GWBFY48Tu4GhRjsad8b86O10xB 9988UYXiOGFzJ51MPosczdS1dPTTNpLL3OvYUmLeaHs8GS5Ae1GTtTcgoFs3xaR6 ye7K05oFo6GQbYJPoqy/rjzII2JlQeUkTaS2OrbDKNMzsouEVTBuOD9pg9TwDGLu gKa71vUaTbHZbL6fVlHP+SL2aTj8gjn8TxKLyNO3Dw/gQaE7WhsxL4WVjpd4/6k8 jIxjt7zwI772BtkgiCd6LhaRUTGka8XXtlxIfVNrgKoO+qRCBtiAhHhal/6S4oZW 7yRIqXAcCvgMTvqeSafPdCpQS87Aoh86e61JPFNu8rNTjL9PHck= =2I4s -----END PGP SIGNATURE-----