SSA-979775

Vulnerability from csaf_siemens - Published: 2021-03-09 00:00 - Updated: 2021-04-13 00:00
Summary
SSA-979775: Stack Overflow Vulnerability in SCALANCE and RUGGEDCOM Devices

Notes

Summary
Several firmware versions of the SCALANCE and RUGGEDCOM devices listed below are affected by a vulnerability in the passive listening feature that could allow an attacker to cause a reboot or, under specific circumstances, attain remote code execution of the affected devices. Siemens has released updates for the affected products and recommends to update to the latest versions.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.

{
  "document": {
    "category": "Siemens Security Advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited.",
      "tlp": {
        "label": "WHITE"
      }
    },
    "notes": [
      {
        "category": "summary",
        "text": "Several firmware versions of the SCALANCE and RUGGEDCOM devices listed below are affected by a vulnerability in the passive listening feature that could allow an attacker to cause a reboot or, under specific circumstances, attain remote code execution of the affected devices.\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "productcert@siemens.com",
      "name": "Siemens ProductCERT",
      "namespace": "https://www.siemens.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-979775: Stack Overflow Vulnerability in SCALANCE and RUGGEDCOM Devices - PDF Version",
        "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-979775.pdf"
      },
      {
        "category": "self",
        "summary": "SSA-979775: Stack Overflow Vulnerability in SCALANCE and RUGGEDCOM Devices - TXT Version",
        "url": "https://cert-portal.siemens.com/productcert/txt/ssa-979775.txt"
      },
      {
        "category": "self",
        "summary": "SSA-979775: Stack Overflow Vulnerability in SCALANCE and RUGGEDCOM Devices - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-979775.json"
      }
    ],
    "title": "SSA-979775: Stack Overflow Vulnerability in SCALANCE and RUGGEDCOM Devices",
    "tracking": {
      "current_release_date": "2021-04-13T00:00:00Z",
      "generator": {
        "engine": {
          "name": "Siemens ProductCERT CSAF Generator",
          "version": "1"
        }
      },
      "id": "SSA-979775",
      "initial_release_date": "2021-03-09T00:00:00Z",
      "revision_history": [
        {
          "date": "2021-03-09T00:00:00Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2021-04-13T00:00:00Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added solution for SCALANCE M-800/S615 and RUGGEDCOM RM1224; updated solution for SCALANCE XR-300WG"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003e= V4.3 and \u003c V6.4",
                "product": {
                  "name": "RUGGEDCOM RM1224",
                  "product_id": "1"
                }
              }
            ],
            "category": "product_name",
            "name": "RUGGEDCOM RM1224"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003e= V4.3 and \u003c V6.4",
                "product": {
                  "name": "SCALANCE M-800",
                  "product_id": "2"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE M-800"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003e= V4.3 and \u003c V6.4",
                "product": {
                  "name": "SCALANCE S615",
                  "product_id": "3"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE S615"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003e= V2.0 and \u003c V2.1.3",
                "product": {
                  "name": "SCALANCE SC-600 Family",
                  "product_id": "4"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE SC-600 Family"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V4.1",
                "product": {
                  "name": "SCALANCE XB-200",
                  "product_id": "5"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XB-200"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V4.1",
                "product": {
                  "name": "SCALANCE XC-200",
                  "product_id": "6"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XC-200"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V4.1",
                "product": {
                  "name": "SCALANCE XF-200BA",
                  "product_id": "7"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XF-200BA"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V6.2",
                "product": {
                  "name": "SCALANCE XM400",
                  "product_id": "8"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XM400"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V4.1",
                "product": {
                  "name": "SCALANCE XP-200",
                  "product_id": "9"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XP-200"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V6.2",
                "product": {
                  "name": "SCALANCE XR500",
                  "product_id": "10"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR500"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c V4.1",
                "product": {
                  "name": "SCALANCE XR-300WG",
                  "product_id": "11"
                }
              }
            ],
            "category": "product_name",
            "name": "SCALANCE XR-300WG"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-25667",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution.\n\nSuccessful exploitation requires the passive listening feature of the device to be active.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6",
          "7",
          "8",
          "9",
          "10",
          "11"
        ]
      },
      "references": [
        {
          "summary": "CVE-2021-25667 - RUGGEDCOM RM1224",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/"
        },
        {
          "summary": "CVE-2021-25667 - SCALANCE M-800",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/"
        },
        {
          "summary": "CVE-2021-25667 - SCALANCE S615",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/"
        },
        {
          "summary": "CVE-2021-25667 - SCALANCE SC-600 Family",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109793041/"
        },
        {
          "summary": "CVE-2021-25667 - SCALANCE XB-200",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109762982/"
        },
        {
          "summary": "CVE-2021-25667 - SCALANCE XC-200",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109762982/"
        },
        {
          "summary": "CVE-2021-25667 - SCALANCE XF-200BA",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109762982/"
        },
        {
          "summary": "CVE-2021-25667 - SCALANCE XM400",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109764409/"
        },
        {
          "summary": "CVE-2021-25667 - SCALANCE XP-200",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109762982/"
        },
        {
          "summary": "CVE-2021-25667 - SCALANCE XR500",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109761425/"
        },
        {
          "summary": "CVE-2021-25667 - SCALANCE XR-300WG",
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109762982/"
        },
        {
          "summary": "CVE-2021-25667 Mitre 5.0 json",
          "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25667.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update to V6.4 or later version",
          "product_ids": [
            "1",
            "2",
            "3"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109794349/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V2.1.3 or later version",
          "product_ids": [
            "4"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109793041/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V4.1 or later version",
          "product_ids": [
            "5",
            "6",
            "7",
            "9",
            "11"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109762982/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V6.2 or later version",
          "product_ids": [
            "8"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109764409/"
        },
        {
          "category": "vendor_fix",
          "details": "Update to V6.2 or later version",
          "product_ids": [
            "10"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109761425/"
        },
        {
          "category": "mitigation",
          "details": "Deactivate the STP passive listening feature of the vulnerable devices",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6",
            "7",
            "8",
            "9",
            "10",
            "11"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6",
            "7",
            "8",
            "9",
            "10",
            "11"
          ]
        }
      ],
      "title": "CVE-2021-25667"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…