ESB-2017.3112.2 - UPDATE [Appliance] Siemens Industrial Products: Denial of service - Remote/unauthenticated 2017-12-19

Printable version
PGP/GPG verifiable version

Hash: SHA256

             AUSCERT External Security Bulletin Redistribution

 Advisory (ICSA-17-339-01A) Siemens Industrial Products: Denial of Service
                             19 December 2017


        AusCERT Security Bulletin Summary

Product:           Siemens Industrial Products
Publisher:         ICS-CERT
Operating System:  Network Appliance
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-12741  

Original Bulletin:

Revision History:  December 19 2017: Updates in source text
                   December  6 2017: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Advisory (ICSA-17-339-01A)

Siemens Industrial Products

Original release date: December 05, 2017 | Last revised: December 18, 2017

ATTENTION: Remotely exploitable/low skill level to exploit.

Vendor: Siemens

Equipment: Industrial products

Vulnerability: Improper Input Validation


- --------- Begin Update A Part 1 of 2 --------

Siemens reports the vulnerability affects the following industrial products:

  * SIMATIC S7-200 Smart: All versions prior to V2.03.01,
  * SIMATIC S7-400 PN V6: All versions prior to V6.0.6,
  * SIMATIC S7-400 H V6: All versions prior to V6.0.8,
  * SIMATIC S7-400 PN/DP V7: All versions,
  * SIMATIC S7-410 V8: All versions,
  * SIMATIC S7-300: All versions,
  * SIMATIC S7-1200: All versions,
  * SIMATIC S7-1500: All versions prior to V2.0,
  * SIMATIC S7-1500 Software Controller: All versions prior to V2.0,
  * SIMATIC WinAC RTX 2010 incl. F: All versions,
  * SIMATIC ET 200 Interface modules for PROFINET IO:
      + SIMATIC ET 200AL: All versions,
      + SIMATIC ET 200ecoPN: All versions,
      + SIMATIC ET 200M: All versions,
      + SIMATIC ET 200MP: All versions,
      + SIMATIC ET 200pro: All versions,
      + SIMATIC ET 200S: All versions, and
      + SIMATIC ET 200SP: All versions.
  * Development/Evaluation Kits for PROFINET IO:
      + DK Standard Ethernet Controller: All versions,
      + EK-ERTEC 200P: All versions prior to V4.5, and
      + EK-ERTEC 200 PN IO: All versions.
  * SIMOTION Firmware:
      + SIMOTION D: All versions prior to V5.1 HF1,
      + SIMOTION C: All versions prior to V5.1 HF1, and
      + SIMOTION P: All versions prior to V5.1 HF1.
      + SINAMICS DCM: All versions,
      + SINAMICS DCP: All versions,
      + SINAMICS G110M / G120(C/P/D) w. PN: All versions prior to V4.7 SP9 HF1,
      + SINAMICS G130 and G150: All versions,
      + SINAMICS S110 w. PN: All versions,
      + SINAMICS S120: All versions,
      + SINAMICS S150:
          o V4.7: All versions, and
          o V4.8: All versions.
      + SINAMICS V90 w. PN: All versions.
  * SINUMERIK 840D sl: All versions,
  * SIMATIC Compact Field Unit: All versions,
  * SIMATIC PN/PN Coupler: All versions,
  * SIMOCODE pro V PROFINET: All versions, and
  * SIRIUS Soft starter 3RW44 PN: All versions.

- --------- End Update A Part 1 of 2 --------


Successful exploitation of this vulnerability may allow a remote attacker to
conduct a denial-of-service (DoS) attack.


- --------- Begin Update A Part 2 of 2 --------

Siemens has provided firmware updates for the following products to fix the

  * SIMATIC S7-200 Smart: Update to V2.03.01:

  * SIMATIC S7-400 PN V6: Update to V6.0.6:

  * EK-ERTEC 200P: Update to V4.5:

  * SIMOTION D: Update to V5.1 HF1:

  * SIMOTION C: Update to V5.1 HF1:

  * SIMOTION P320-4: Update to V5.1 HF1:

Please contact a Siemens representative for information on how to obtain the

  * SINAMICS G110M / G120(C/P/D): Update to V4.7 SP9 HF1:

  * SIMATIC S7-1500: V2.0 and newer:

  * SIMATIC S7-1500 Software Controller: V2.0 and newer:

  * SIMATIC S7-400 H V6: Update V6.0.8:

- --------- End Update A Part 2 of 2 --------

Siemens is preparing further updates and recommends the following mitigations
until patches are available:

  * Disable SNMP if this is supported by the product (refer to the product
    documentation). Disabling SNMP fully mitigates the vulnerability
  * Protect network access to Port 161/UDP of affected devices
  * Apply cell protection concept
  * Use VPN for protecting network communication between cells
  * Apply Defense-in-Depth

Siemens recommends users configure the operational environment according to
Siemens? Operational Guidelines for Industrial Security:

For more information on the vulnerability and more detailed mitigation
instructions, please see Siemens Security Advisory SSA-346262 at the following

NCCIC/ICS-CERT recommends that users take defensive measures to minimize the
risk of exploitation of this vulnerability. ICS-CERT reminds organizations to
perform proper impact analysis and risk assessment prior to deploying defensive

ICS-CERT also provides a section for control systems security recommended
practices on the ICS-CERT web page. Several recommended practices are available
for reading and download, including Improving Industrial Control Systems
Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available
in the ICS?CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber
Intrusion Detection and Mitigation Strategies, that is available for download
from the ICS-CERT web site.

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to ICS-CERT for
tracking and correlation against other incidents.

No known public exploits specifically target this vulnerability.



Specially crafted packets sent to Port 161/UDP could cause a denial-of-service
condition. The affected devices must be restarted manually.

CVE-2017-12741 has been assigned to this vulnerability. A CVSS v3 base score of
7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/


George Lashenko of CyberX reported the vulnerability to Siemens.


Critical Infrastructure Sectors: Commercial Facilities, Critical Manufacturing,
Energy, Food and Agriculture, Water and Wastewater Systems

Countries/Areas Deployed: Worldwide

Company Headquarters Location: Germany

Contact Information

For any questions related to this report, please contact the NCCIC at:

Toll Free: 1-888-282-0870

For industrial control systems cybersecurity information: 
or incident reporting:

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email:
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.


« Back to bulletins