# ICS Advisory (ICSA-18-088-03)
## Siemens SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime Professional,
and SIMATIC NET PC Software (Update G)
Original release date: March 29, 2018 | Last revised: March 12, 2019
[Print Document](javascript:window.print\(\);)
[Tweet](https://twitter.com/share?url=https%3A%2F%2Fus-
cert.cisa.gov%2Fics%2Fadvisories%2FICSA-18-088-03)
[Like Me](https://www.facebook.com/sharer.php?u=https%3A%2F%2Fus-
cert.cisa.gov%2Fics%2Fadvisories%2FICSA-18-088-03)
[Share](http://www.addthis.com/bookmark.php?url=https%3A%2F%2Fus-
cert.cisa.gov%2Fics%2Fadvisories%2FICSA-18-088-03)
### Legal Notice
All information products included in [https://us-cert.gov/ics](/ics) are
provided "as is" for informational purposes only. The Department of Homeland
Security (DHS) does not provide any warranties of any kind regarding any
information contained within. DHS does not endorse any commercial product or
service, referenced in this product or otherwise. Further dissemination of
this product is governed by the Traffic Light Protocol (TLP) marking in the
header. For more information about TLP, see [https://www.us-
cert.gov/tlp/](/tlp/).
* * *
## 1\. EXECUTIVE SUMMARY
* **CVSS v3 7.5**
* **ATTENTION** : Exploitable remotely/low skill level to exploit.
* **Vendor** : Siemens
* **Equipment** : SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime Professional, and SIMATIC NET PC Software
* **Vulnerability** : Improper Input Validation
## 2\. UPDATE INFORMATION
This updated advisory is a follow-up to the updated advisory titled
ICSA-18-088-03 Siemens SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime
Professional, and SIMATIC NET PC Software (Update F) that was published
February 5, 2019, on the NCCIC/ICS-CERT website.
## 3\. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to cause
a denial-of-service condition on the remote and local communication
functionality of the affected products. A system reboot is required to
recover.
## 4\. TECHNICAL DETAILS
### 4.1 AFFECTED PRODUCTS
Siemens reports that the vulnerability affects the following SIMATIC products:
* OpenPCS 7 v7.1 and earlier,
* OpenPCS 7 v8.0: All versions prior to 8.2 SP1,
* OpenPCS 7 v8.1: All versions prior to v8.1 Upd5,
* OpenPCS 7 v8.2: All versions,
* OpenPCS 7 v9.0: All versions prior to v9.0 Upd1,
* SIMATIC BATCH v7.1 and earlier,
* SIMATIC BATCH v8.0: All versions prior to v8.0 SP1 Upd21,
* SIMATIC BATCH v8.1: All versions prior to v8.1 SP1 Upd16,
* SIMATIC BATCH v8.2: All versions prior to v8.2 Upd10,
* SIMATIC BATCH v9.0: All versions prior to v9.0 SP1,
* SIMATIC NET PC-Software: All versions prior to v15 SP1,
* SIMATIC PCS 7 v7.1 and earlier,
* SIMATIC PCS 7 v8.0: All versions,
* SIMATIC PCS 7 v8.1: All versions,
* SIMATIC PCS 7 v9.0: All versions prior to v9.0 SP1,
* SIMATIC Route Control v7.1 and earlier,
* SIMATIC Route Control v8.0: All versions,
* SIMATIC Route Control v8.1: All versions,
* SIMATIC PCS 7 v8.2: All versions prior to v8.2 SP1,
* SIMATIC Route Control v8.2: All versions,
* SIMATIC Route Control v9.0: All versions prior to v9.0 Upd1,
* SIMATIC WinCC Runtime Professional v13: All versions prior to v13 SP2 Upd2
* SIMATIC WinCC Runtime Professional v14: All versions prior to v14 SP1 Upd5,
* SIMATIC WinCC 7.2 and earlier: All versions prior to WinCC 7.2 Upd 15,
* SIMATIC WinCC 7.3: All versions prior to WinCC 7.3 Upd16, and
**\--------- Begin Update G Part 1 of 2 ---------**
* SIMATIC WinCC 7.4: All versions prior to v7.4 SP1 Upd 4.
**\--------- End Update G Part 1 of 2 ---------**
### 4.2 VULNERABILITY OVERVIEW
### 4.2.1 [IMPROPER INPUT VALIDATION
CWE-20](https://cwe.mitre.org/data/definitions/20.html)
Specially crafted messages sent to the RPC service of the affected products
could cause a denial-of-service condition on the remote and local
communication functionality of the affected products. A reboot of the system
is required to recover the remote and local communication functionality.
[CVE-2018-4832](http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-4832)
has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been
calculated; the CVSS vector string is
([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)).
### 4.3 BACKGROUND
* **Critical Infrastructure Sectors:** Chemical, Energy, Food and Agriculture, Water and Wastewater Systems.
* **Countries/Areas Deployed:** Worldwide
* **Company Headquarters Location:** Germany
### 4.4 RESEARCHER
Vladimir Dashchenko from Kaspersky Lab and independent researcher cdev1
reported this vulnerability to Siemens.
## 5\. MITIGATIONS
Siemens has released updates for several affected products and recommends
users update to the new version. Siemens is preparing further updates and
recommends specific countermeasures until patches are available:
* OpenPCS 7 v8.1: Update to OpenPCS 7 v8.1 Upd 5
<https://support.industry.siemens.com/cs/ww/en/view/109761055>
* SIMATIC BATCH v8.0: Install SIMATIC Batch v8.0 SP1 Upd21:
<https://support.industry.siemens.com/cs/ww/en/view/109756847>
* SIMATIC BATCH v8.1: Install SIMATIC Batch v8.1 SP1 Upd16:
<https://support.industry.siemens.com/cs/ww/en/view/109756846>
* SIMATIC BATCH v8.2: Update to SIMATIC Batch v8.2 Upd10:
<https://support.industry.siemens.com/cs/ww/en/view/109757796>
* SIMATIC NET PC-Software: Update to v15 SP1
[https://support.industry.siemens.com/cs/ww/de/view/109762690
](https://support.industry.siemens.com/cs/ww/de/view/109762690)
* SIMATIC PCS 7 v8.2: Install v8.2 SP1:
To obtain SIMATIC PCS 7 v8.2 SP1 contact local support.
* SIMATIC PCS 7 v9.0: Install v9.0 SP1:
To obtain SIMATIC PCS 7 v9.0 SP1 contact local support.
* SIMATIC Route Control v8.2:
To obtain SIMATIC PCS 7 v8.2 SP1 contact local support.
* SIMATIC WinCC Runtime Professional v13: Update to v13 SP2 Upd2
<https://support.industry.siemens.com/cs/ww/en/view/109759753>
* SIMATIC WinCC Runtime Professional v14: Update to v14 SP1 Upd5:
<https://support.industry.siemens.com/cs/ww/en/view/109747394>
* SIMATIC WinCC v7.2 and earlier: Update to WinCC 7.2 Upd15:
<https://support.industry.siemens.com/cs/ww/de/view/109762887>[
](https://support.industry.siemens.com/cs/ww/de/view/109762887)
* SIMATIC WinCC v7.3: Update to WinCC 7.3 Upd16:
<https://support.industry.siemens.com/cs/ww/en/view/109756123>[
](https://support.industry.siemens.com/cs/ww/en/view/109756123)
**\--------- Begin Update G Part 2 of 2 --------- **
* SIMATIC WinCC v7.4: Update to v7.4 SP1 Upd4
<https://support.industry.siemens.com/cs/ww/en/view/109753031>
**\--------- End Update G Part 2 of 2 --------- **
Siemens has identified the following specific workarounds and mitigations
users can apply to reduce the risk:
* Upgrade to a newer PCS 7 version.
* Ensure that SIMATIC WinCC, SIMATIC WinCC Runtime Professional and SIMATIC PCS 7 stations communicate via encrypted channels (i.e., activate feature "Encrypted Communication" in SIMATIC WinCC v7.3 or newer and SIMATIC PCS 7 v8.1 or newer). Enabling "Encrypted Communication" completely mitigates the vulnerability.
* Apply cell protection concept.
* Use VPN for protecting network communication between cells.
* Apply Defense-in-Depth.
As a general security measure, Siemens strongly recommends protecting network
access to devices with appropriate mechanisms. In order to run the devices in
a protected IT environment, Siemens particularly recommends that users
configure the environment according to Siemens' [Operational Guidelines for
Industrial Security](https://www.siemens.com/content/dam/webassetpool/mam/tag-
siemens-com/smdb/digital-factory/industrial-
security/online/documents/whitepapers/en/operational-guidelines-industrial-
security-en.pdf) and follow the recommendations in the product manuals.
Additional information on industrial security by Siemens can be found at:
<https://www.siemens.com/industrialsecurity>
For more information on this vulnerability and associated software updates,
please see Siemens security advisory SSA-348629 on their website:
<https://www.siemens.com/cert/advisories>
NCCIC reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.
NCCIC also provides a section for [control systems security recommended
practices](/ics/content/recommended-practices) on the ICS-CERT web page.
Several recommended practices are available for reading and download,
including[ Improving Industrial Control Systems Cybersecurity with Defense-in-
Depth Strategies](/sites/default/files/recommended_practices/NCCIC_ICS-
CERT_Defense_in_Depth_2016_S508C.pdf).
Additional mitigation guidance and recommended practices are publicly
available in the ICS-CERT Technical Information Paper, [ICS-TIP-12-146-01B--
Targeted Cyber Intrusion Detection and Mitigation Strategies](/ics/tips/ICS-
TIP-12-146-01B), that is available for download from the [ICS-CERT
website.](/ics/)
Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to NCCIC for
tracking and correlation against other incidents.
No known public exploits specifically target this vulnerability.
暂无评论