-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 # SSA-941426: Multiple LLDP Vulnerabilities in Industrial Products Publication Date: 2021-07-13 Last Update: 2023-03-14 Current Version: 1.4 CVSS v3.1 Base Score: 9.8 SUMMARY ======= There are multiple vulnerabilities in an underlying Link Layer Discovery Protocol (LLDP) third party library. Siemens has released updates for the affected products and recommends to update to the latest versions. AFFECTED PRODUCTS AND SOLUTION ============================== * SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) - Affected versions: All versions < V3.3.46 - Remediation: Update to V3.3.46 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109812218 * SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) - Affected versions: All versions < V3.3.46 - Remediation: Update to V3.3.46 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109812218 * SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) - Affected versions: All versions < V2.2.28 - Remediation: Update to V2.2.28 or later version See recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109817067/ * SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) - Affected versions: All versions < V2.2.28 - Remediation: Update to V2.2.28 or later version See recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109817067/ * SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0) - Affected versions: All versions < V3.0 - Remediation: Update to V3.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109800773/ * SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) - Affected versions: All versions < V2.2.28 - Remediation: Update to V2.2.28 or later version See recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109817067/ * SIMATIC CP 1545-1 (6GK7545-1GX00-0XE0) - Affected versions: All versions < V1.1 - Remediation: Update to V1.1 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109811116/ * SIMATIC HMI Unified Comfort Panels - Affected versions: All versions < V17 - Remediation: Update to V17 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109746530 * SINUMERIK ONE MCP - Affected versions: All versions < V2.0.1 - Remediation: Update to V2.0.1 or later version See further recommendations from section "Workarounds and Mitigations" - Download: Please contact your Siemens representative for information on how to obtain the update. * SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) - Affected versions: All versions < V2.2.28 - Remediation: Update to V2.2.28 or later version See recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109817067/ * SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) - Affected versions: All versions < V2.2.28 - Remediation: Update to V2.2.28 or later version See recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109817067/ * SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) - Affected versions: All versions < V2.2.28 - Remediation: Update to V2.2.28 or later version See recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109817067/ * SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0) - Affected versions: All versions < V3.0 - Remediation: Update to V3.0 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109800773/ * SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) - Affected versions: All versions < V3.3.46 - Remediation: Update to V3.3.46 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109812218 * SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) - Affected versions: All versions < V3.3.46 - Remediation: Update to V3.3.46 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109812218 * SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) - Affected versions: All versions < V2.2 - Remediation: Update to V2.2 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109798331/ * TIM 1531 IRC (6GK7543-1MX00-0XE0) - Affected versions: All versions < V2.2 - Remediation: Update to V2.2 or later version See further recommendations from section "Workarounds and Mitigations" - Download: https://support.industry.siemens.com/cs/ww/en/view/109798331/ WORKAROUNDS AND MITIGATIONS =========================== Siemens has identified the following specific workarounds and mitigations that customers can apply to reduce the risk: * Disable LLDP protocol support on Ethernet port. This will potentially disrupt the network visibility. Product-specific remediations or mitigations can be found in the section "Affected Products and Solution". Please follow the "General Security Recommendations". GENERAL SECURITY RECOMMENDATIONS ================================ As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial- security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity PRODUCT DESCRIPTION =================== SIMATIC CP 1243-8 IRC communications processors connect SIMATIC S7-1200 controllers via the SINAUT ST7 telecontrol protocol to a control center or master ST7 stations. The SIMATIC CP 1543-1 and SIMATIC CP 1545-1 communication processor connects the S7-1500 controller to Ethernet networks. It provides integrated security functions such as firewall, Virtual Private Networks (VPN) and support of other protocols with data encryption. The communication processor protects S7-1500 stations against unauthorized access, as well as integrity and confidentiality of transmitted data. SIMATIC CP 1243-1 communications processors connect S7-1200 controllers to Ethernet networks. They provide integrated security functions such as firewall, Virtual Private Networks (VPN) and support of other protocols with data encryption. The SIMATIC CP 1543SP-1, CP 1542SP-1 and CP 1542SP-1 IRC communication processors connect the S7-1500 controller to Ethernet networks. It provides integrated security functions such as firewall, Virtual Private Networks (VPN) and support of other protocols with data encryption. SIMATIC HMI Panels are used for operator control and monitoring of machines and plants. The machine control panel SINUMERIK ONE MCP permits user-friendly operation of the machine functions at complex machining stations. It is suitable for machine-level operation of milling, turning, grinding and special machines. SIPLUS extreme products are designed for reliable operation under extreme conditions and are based on SIMATIC, LOGO!, SITOP, SINAMICS, SIMOTION, SCALANCE or other devices. SIPLUS devices use the same firmware as the product they are based on. TIM 1531 IRC is a communication module for SIMATIC S7-1500, S7-400, S7-300 with SINAUT ST7, DNP3 and IEC 60870-5-101/104 with three RJ45 interfaces for communication via IP-based networks (WAN / LAN) and a RS 232/RS 485 interface for communication via classic WAN networks. VULNERABILITY CLASSIFICATION ============================ The vulnerability classification has been performed by using the CVSS scoring system in version 3.1 (CVSS v3.1) (https://www.first.org/cvss/). The CVSS environmental score is specific to the customer's environment and will impact the overall CVSS score. The environmental score should therefore be individually defined by the customer to accomplish final scoring. An additional classification has been performed using the CWE classification, a community-developed list of common software security weaknesses. This serves as a common language and as a baseline for weakness identification, mitigation, and prevention efforts. A detailed list of CWE classes can be found at: https://cwe.mitre.org/. * Vulnerability CVE-2015-8011 Buffer overflow in the lldp_decode function in daemon/protocols/lldp.c in lldpd before 0.8.0 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via vectors involving large management addresses and TLV boundaries. CVSS v3.1 Base Score: 9.8 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C CWE: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') * Vulnerability CVE-2020-27827 Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. CVSS v3.1 Base Score: 7.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C CWE: CWE-400: Uncontrolled Resource Consumption ADDITIONAL INFORMATION ====================== For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories HISTORY DATA ============ V1.0 (2021-07-13): Publication Date V1.1 (2021-08-10): Added solution for SINUMERIK ONE MCP and SIMATIC NET CP 1543-1 V1.2 (2022-06-14): Added fix for SIMATIC CP 1545-1 V1.3 (2022-08-09): Added fix for SIMATIC CP 1243-1 and CP 1243-8 IRC V1.4 (2023-03-14): Added fix for SIMATIC CP 1542SP-1, SIMATIC CP 1542SP-1 IRC, and SIMATIC CP 1543SP-1 TERMS OF USE ============ Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use. Copyright: Siemens 2023 -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEHyx/myPwjH9jB9tDlm7gTEmyujQFAmQPuQAACgkQlm7gTEmy ujQDsQ//deSmM2ATkUzRsAMIlA0OzLHvKeg5Bhpn/orGBxicwP+yApzIBl6Mf3Oz N21t5AfJKJTCgf7gePTvApQTiMOR+KnU3lAwn4txL3YhO7oEXwdCdxzV0rwgspQh niQQrPY6hih6Exjmb2I7DIytve2blMevv0BtQ/s/EX4xq6ppgBHchhfbPFe4uUWr S03Qx9dAR1WJdvF36v1xfFkajFjejBsDgN+mNFXZGlApzjWS8c7LWz04bqICjCp2 HRgg0reaEZqxoDAaX6O9QgkogYaGK5e2fs81z+nmCYysqstY1k88tY7+al48I0OM B4DmjEarQW5xPdH6mM8B3ixoFegFq/HjWwVswY3ZsZ7KE63iMRIMryM9Cmt0yAqE OWKg1vd8XtpvZVYA2WmM+Ibh+XpQkqXrOsVIY1OdmH6OGKDWyvBVJiKESXKN4muP LwM9/MiLtMJv8uCoUFtvwaCe8652daiYOJ5WnXjyRWt7rDyV2sK577jIQpkc+qXS kYvtTygfVszlQpaJp/xp5+PI6A3ZpGUrW9R+bvYVCCN4OBuNwxr+AJRCv2/hA8oU 0UU2stbjLrY7tPEDxI35LpYpAcoV87zdnba4DukfL3or3JO68U01wzA2nc6/QJxt RConxjIPxvJsvN/sTo+XgNNd+2jDebC4qwYBtMy8fc71jo8QmxM= =94F3 -----END PGP SIGNATURE-----