ICSA-22-223-06

Vulnerability from csaf_cisa - Published: 2022-08-11 00:00 - Updated: 2022-08-11 00:00
Summary
Siemens SICAM TOOLBOX II
Notes
CISA Disclaimer: This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice: All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation:  Successful exploitation of this vulnerability results in full access to the database.
Critical infrastructure sectors: Multiple
Countries/areas deployed: Worldwide
Company headquarters location: Germany
Recommended Practices: CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
Recommended Practices: CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices: Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Additional Resources: For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Exploitability: No known public exploits specifically target this vulnerability.
CWE-798 - Use of Hard-coded Credentials
Mitigation Alternatively, restrict port 1522/tcp access to localhost or specific ip<br/> addresses only, as documented in the updated security manual (chapter 3.6.7) [1], which is also included in the SICAM TOOLBOX II, V07.01 package [2] [1] https://support.industry.siemens.com/cs/ww/en/view/109757707 [2] https://support.industry.siemens.com/cs/ww/en/view/109805672
Mitigation Install hotfix V7.01 HF01 [3]. Among other things, this update will disable the port 1522 in the ORACLE configuration file LISTENER.ORA by default. The currently installed and/or from customer modified configuration file LISTENER.ORA is backed up. See the release notes for more information. [3] https://support.industry.siemens.com/cs/ww/en/view/109811251
No Fix Planned Currently no fix is planned
Mitigation Operators of critical power systems (e.g. TSOs or DSOs) worldwide are usually required by regulations to build resilience into the power grids by applying multi-level redundant secondary protection schemes. It is therefore recommended that the operators check whether appropriate resilient protection measures are in place. The risk of cyber incidents impacting the grid's reliability can thus be minimized by virtue of the grid design. Siemens strongly recommends applying the provided security updates using the corresponding tooling and documented procedures made available with the product. If supported by the product, an automated means to apply the security updates across multiple product instances may be used. Siemens strongly recommends prior validation of any security update before being applied, and supervision by trained staff of the update process in the target environment. As a general security measure Siemens strongly recommends to protect network access with appropriate mechanisms (e.g. firewalls, segmentation, VPN). It is advised to configure the environment according to our operational guidelines in order to run the devices in a protected IT environment. Recommended security guidelines can be found at: https://www.siemens.com/gridsecurity
Acknowledgments
Siemens Thomas Riedmaier
OTORIO Matan Dobrushin Eran Jacob

{
  "document": {
    "acknowledgments": [
      {
        "names": [
          "Thomas Riedmaier"
        ],
        "organization": "Siemens",
        "summary": "reporting this vulnerability to Siemens"
      },
      {
        "names": [
          "Matan Dobrushin",
          "Eran Jacob"
        ],
        "organization": "OTORIO",
        "summary": "reporting this vulnerability to Siemens"
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
        "title": "CISA Disclaimer"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "summary",
        "text": "\u202fSuccessful exploitation of this vulnerability results in full access to the database.",
        "title": "Risk evaluation"
      },
      {
        "category": "other",
        "text": "Multiple",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "other",
        "text": "No known public exploits specifically target this vulnerability.",
        "title": "Exploitability"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SSA-669737: Improper Access Control Vulnerability in SICAM TOOLBOX II - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-669737.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-223-06 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-223-06.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-22-223-06 Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-223-06"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      },
      {
        "category": "external",
        "summary": "SSA-669737: Improper Access Control Vulnerability in SICAM TOOLBOX II - PDF Version",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669737.pdf"
      },
      {
        "category": "external",
        "summary": "SSA-669737: Improper Access Control Vulnerability in SICAM TOOLBOX II - TXT Version",
        "url": "https://cert-portal.siemens.com/productcert/txt/ssa-669737.txt"
      }
    ],
    "title": "Siemens SICAM TOOLBOX II",
    "tracking": {
      "current_release_date": "2022-08-11T00:00:00.000000Z",
      "generator": {
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-22-223-06",
      "initial_release_date": "2022-08-11T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2022-08-11T00:00:00.000000Z",
          "legacy_version": "Initial",
          "number": "1",
          "summary": "Publication Date"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:all/*",
                "product": {
                  "name": "SICAM TOOLBOX II",
                  "product_id": "CSAFPID-0001"
                }
              }
            ],
            "category": "product_name",
            "name": "SICAM TOOLBOX II"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-45106",
      "cwe": {
        "id": "CWE-798",
        "name": "Use of Hard-coded Credentials"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Affected applications use a circumventable access control within a database service. This could allow an attacker to access the database.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "nvd.nist.gov",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45106"
        },
        {
          "category": "external",
          "summary": "www.first.org",
          "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
        }
      ],
      "remediations": [
        {
          "category": "mitigation",
          "details": "Alternatively, restrict port 1522/tcp access to localhost or specific\nip\u003cbr/\u003e addresses only, as documented in the updated security manual\n(chapter 3.6.7) [1], which is also included in the SICAM TOOLBOX II,\nV07.01 package [2]   [1]\nhttps://support.industry.siemens.com/cs/ww/en/view/109757707   [2]\nhttps://support.industry.siemens.com/cs/ww/en/view/109805672",
          "product_ids": [
            "CSAFPID-0001"
          ]
        },
        {
          "category": "mitigation",
          "details": "Install hotfix V7.01 HF01 [3]. Among other things, this update will\ndisable the port 1522 in the ORACLE configuration file LISTENER.ORA by\ndefault. The currently installed and/or from customer modified\nconfiguration file LISTENER.ORA is backed up. See the release notes\nfor more information.   [3]\nhttps://support.industry.siemens.com/cs/ww/en/view/109811251",
          "product_ids": [
            "CSAFPID-0001"
          ]
        },
        {
          "category": "no_fix_planned",
          "details": "Currently no fix is planned",
          "product_ids": [
            "CSAFPID-0001"
          ]
        },
        {
          "category": "mitigation",
          "details": "Operators of critical power systems (e.g. TSOs or DSOs) worldwide are\nusually required by regulations to build resilience into the power\ngrids by applying multi-level redundant secondary protection schemes.\nIt is therefore recommended that the operators check whether\nappropriate resilient protection measures are in place. The risk of\ncyber incidents impacting the grid\u0027s reliability can thus be minimized\nby virtue of the grid design.\n\nSiemens strongly recommends applying the provided security updates\nusing the corresponding tooling and documented procedures made\navailable with the product. If supported by the product, an automated\nmeans to apply the security updates across multiple product instances\nmay be used. Siemens strongly recommends prior validation of any\nsecurity update before being applied, and supervision by trained staff\nof the update process in the target environment.\n\nAs a general security measure Siemens strongly recommends to protect\nnetwork access with appropriate mechanisms (e.g. firewalls,\nsegmentation, VPN). It is advised to configure the environment\naccording to our operational guidelines in order to run the devices in\na protected IT environment.\n\nRecommended security guidelines can be found at:\n\nhttps://www.siemens.com/gridsecurity",
          "product_ids": [
            "CSAFPID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:T/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001"
          ]
        }
      ],
      "title": "CVE-2021-45106"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…