Hash: SHA256

             AUSCERT External Security Bulletin Redistribution

          Phoenix Contact ILC PLC Authentication Vulnerabilities
                             10 November 2016


        AusCERT Security Bulletin Summary

Product:           Phoenix Contact ILC PLC
Publisher:         ICS-CERT
Operating System:  Network Appliance
Impact/Access:     Unauthorised Access      -- Remote/Unauthenticated
                   Access Confidential Data -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-8380 CVE-2016-8371 CVE-2016-8366

Original Bulletin: 

- --------------------------BEGIN INCLUDED TEXT--------------------

Advisory (ICSA-16-313-01)

Phoenix Contact ILC PLC Authentication Vulnerabilities

Original release date: November 08, 2016

Legal Notice

All information products included in http://ics-cert.us-cert.gov are provided
"as is" for informational purposes only. The Department of Homeland Security
(DHS) does not provide any warranties of any kind regarding any information
contained within. DHS does not endorse any commercial product or service,
referenced in this product or otherwise. Further dissemination of this
product is governed by the Traffic Light Protocol (TLP) marking in the
header. For more information about TLP, see http://www.us-cert.gov/tlp/.


Matthias Niedermaier and Michael Kapfer of HSASec Hochschule Augsburg
have identified authentication vulnerabilities in Phoenix Contact's ILC
(inline controller) PLCs. Phoenix Contact GmbH & Co. KG has produced a
mitigation plan that includes an update and recommended security practices
to mitigate these vulnerabilities.

These vulnerabilities could be exploited remotely.


Phoenix Contact reports that these vulnerabilities affect the following
versions of ILC PLCs:

    All ILC 1xx PLCs.


The identified vulnerabilities could allow an unauthenticated user to
access human-machine interface (HMI) pages and to modify programmable
logic controller (PLC) variables.

Impact to individual organizations depends on many factors that are unique
to each organization. NCCIC/ICS-CERT recommends that organizations evaluate
the impact of these vulnerabilities based on their operational environment,
architecture, and product implementation.


Phoenix Contact GmbH & Co. KG is a German-based automation company.

The affected products, ILC 1xx PLCs, are inline controllers with an Ethernet
interface for coupling to other controllers and systems. According to
Phoenix Contact, ILC PLCs are deployed across several sectors including
Commercial Facilities, Critical Manufacturing, Energy, and Water and
Wastewater Systems. Phoenix Contact estimates that these products are used
primarily in Europe, North America, and Asia.




Webvisit offers a password macro to protect HMI pages on the PLC against
casual or coincidental opening of HMI pages by the user. The password macro
can be configured in a way that the password is stored and transferred in
clear text.

CVE-2016-8366[b] has been assigned to this vulnerability. A CVSS
v3 base score of 7.3 has been calculated; the CVSS vector string is


The web server can be accessed without authenticating even if the
authentication mechanism is enabled.

CVE-2016-8371[e] has been assigned to this vulnerability. A CVSS
v3 base score of 7.3 has been calculated; the CVSS vector string is


The web server allows access to read and write PLC variables without

CVE-2016-8380[h] has been assigned to this vulnerability. A CVSS
v3 base score of 7.3 has been calculated; the CVSS vector string is



These vulnerabilities could be exploited remotely.


No known public exploits specifically target these vulnerabilities.


An attacker with a low skill would be able to exploit these vulnerabilities.


Phoenix Contact has released an update for Webvisit to mitigate the plaintext
password storage issue. Users may obtain this update by contacting Phoenix
Contact customer support at automation-service@phoenixcontact.com, or +49
52 81/9 46 28 88 (Germany).

Connecting devices to a network via Ethernet always entails the risk of
unauthorized access to the network. Phoenix Contact recommends that users
implement an adequate defense-in-depth networking architecture (including
the following) for control systems where these devices are operating.

    Devices should not be exposed to public networks without the use of
    virtual private networks (VPNs) for remote access.
    Firewalls should be used for network segmentation or controller
    Available communication channels or ports not needed in the application
    should be turned off. Administrators and users should check whether
    the application offers any option of deactivating active communication
    channels (e.g., SNMP, FTP, BootP, DCP), or setting passwords to prevent
    third parties from unauthorized accessing the controller and modifying
    the system.
    Access to the devices should be limited to the fewest possible
    authorized personnel.
    Change standard or default passwords when first installing every
    component. Passwords should be changed in regular interval in order
    to reduce risks of becoming public. Passwords should have a maximum
    strength by the use of small and capital letters as well as numbers
    and special characters with a length of at least 10 characters.
    Conduct regular thread analyses to discover whether current measures
    meet the safety requirements.
    Install and maintain security software in order to defend new or
    recurring risks; such as viruses, Trojans, phishing attacks.
    Users may decide to use the ILC 1x1 PLCs with the latest Firmware 4.42,
    because it offers the HTTPS protocol and HTML5 for the web server-based
    HMI system.
    With regard to the controller's communication interfaces, Phoenix
    Contact recommends not to use the ILC 1xx controller in safety-critical
    applications unless using additional security devices.

For more information on this vulnerability and the associated update and
mitigation strategies, please email Phoenix Contact at the following address:


ICS-CERT reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.

ICS-CERT also provides a section for control systems
security recommended practices on the ICS-CERT web page at:
http://ics-cert.us-cert.gov/content/recommended-practices. Several
recommended practices are available for reading and download, including
Improving Industrial Control Systems Cybersecurity with Defense-in-Depth

Additional mitigation guidance and recommended practices are
publicly available in the ICS-CERT Technical Information Paper,
ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation
Strategies, that is available for download from the ICS-CERT web site

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to ICS-CERT for
tracking and correlation against other incidents.

    CWE-312: Cleartext Storage of Sensitive Information,
    http://cwe.mitre.org/data/definitions/312.html, web site last accessed
    November 08, 2016.
    NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8366,
    NIST uses this advisory to create the CVE web site report. This web
    site will be active sometime after publication of this advisory.
    CVSS Calculator,
    web site last accessed November 08, 2016.
    CWE-592: Authentication Bypass Issues,
    http://cwe.mitre.org/data/definitions/592.html, web site last accessed
    November 08, 2016.
    NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8371,
    NIST uses this advisory to create the CVE web site report. This web
    site will be active sometime after publication of this advisory.
    CVSS Calculator,
    web site last accessed November 08, 2016.
    CWE-767: Access to Critical Private Variable via Public Method,
    http://cwe.mitre.org/data/definitions/767.html, web site last accessed
    November 08, 2016.
    NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8380,
    NIST uses this advisory to create the CVE web site report. This web
    site will be active sometime after publication of this advisory.
    CVSS Calculator,
    web site last accessed November 08, 2016.

Contact Information

For any questions related to this report, please contact ICS-CERT at:

Email: ics-cert@hq.dhs.gov
Toll Free: 1-877-776-7585
International Callers: (208) 526-0900

For industrial control systems security information and incident reporting:

ICS-CERT continuously strives to improve its products and services. You
can help by choosing one of the links below to provide feedback about
this product.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967