Lucene search

K
nessusThis script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_SIEMENS_CVE-2012-3037.NASL
HistoryFeb 07, 2022 - 12:00 a.m.

Siemens SIMATIC Improper Certificate Validation (CVE-2012-3037)

2022-02-0700:00:00
This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
8
siemens
simatic
s7-1200
plc
improper certificate validation
tenable.ot
vulnerability
remote
ot asset
private key
certification authority
remote attackers
forged certificate

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

AI Score

6.6

Confidence

Low

EPSS

0.002

Percentile

55.1%

The Siemens SIMATIC S7-1200 2.x PLC does not properly protect the private key of the SIMATIC CONTROLLER Certification Authority certificate, which allows remote attackers to spoof the S7-1200 web server by using this key to create a forged certificate.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(500030);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/04");

  script_cve_id("CVE-2012-3037");
  script_xref(name:"ICSA", value:"12-263-01");

  script_name(english:"Siemens SIMATIC Improper Certificate Validation (CVE-2012-3037)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"The Siemens SIMATIC S7-1200 2.x PLC does not properly protect the
private key of the SIMATIC CONTROLLER Certification Authority
certificate, which allows remote attackers to spoof the S7-1200 web
server by using this key to create a forged certificate.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"http://www.us-cert.gov/control_systems/pdf/ICSA-12-263-01.pdf");
  script_set_attribute(attribute:"see_also", value:"http://en.securitylab.ru/lab/PT-2012-48");
  # http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-240718.pdf
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6993cc94");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-3037");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(295);

  script_set_attribute(attribute:"vuln_publication_date", value:"2012/09/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/09/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2022/02/07");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:simatic_s7-1200_cpu_1211c_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:simatic_s7-1200_cpu_1212c_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:simatic_s7-1200_cpu_1212fc_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:simatic_s7-1200_cpu_1214_fc_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:simatic_s7-1200_cpu_1214c_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:simatic_s7-1200_cpu_1215_fc_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:simatic_s7-1200_cpu_1215c_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:simatic_s7-1200_cpu_1217c_firmware");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:siemens:simatic_s7-1200_firmware");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Siemens");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Siemens');

var asset = tenable_ot::assets::get(vendor:'Siemens');

var vuln_cpes = {
    "cpe:/o:siemens:simatic_s7-1200_firmware" :
        {"versionEndExcluding" : "3.0.0", "versionStartIncluding" : "2.0.0", "family" : "S71200"},
    "cpe:/o:siemens:simatic_s7-1200_cpu_1211c_firmware" :
        {"versionEndExcluding" : "3.0.0", "versionStartIncluding" : "2.0.0", "family" : "S71200"},
    "cpe:/o:siemens:simatic_s7-1200_cpu_1212c_firmware" :
        {"versionEndExcluding" : "3.0.0", "versionStartIncluding" : "2.0.0", "family" : "S71200"},
    "cpe:/o:siemens:simatic_s7-1200_cpu_1212fc_firmware" :
        {"versionEndExcluding" : "3.0.0", "versionStartIncluding" : "2.0.0", "family" : "S71200"},
    "cpe:/o:siemens:simatic_s7-1200_cpu_1214_fc_firmware" :
        {"versionEndExcluding" : "3.0.0", "versionStartIncluding" : "2.0.0", "family" : "S71200"},
    "cpe:/o:siemens:simatic_s7-1200_cpu_1214c_firmware" :
        {"versionEndExcluding" : "3.0.0", "versionStartIncluding" : "2.0.0", "family" : "S71200"},
    "cpe:/o:siemens:simatic_s7-1200_cpu_1215_fc_firmware" :
        {"versionEndExcluding" : "3.0.0", "versionStartIncluding" : "2.0.0", "family" : "S71200"},
    "cpe:/o:siemens:simatic_s7-1200_cpu_1215c_firmware" :
        {"versionEndExcluding" : "3.0.0", "versionStartIncluding" : "2.0.0", "family" : "S71200"},
    "cpe:/o:siemens:simatic_s7-1200_cpu_1217c_firmware" :
        {"versionEndExcluding" : "3.0.0", "versionStartIncluding" : "2.0.0", "family" : "S71200"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

AI Score

6.6

Confidence

Low

EPSS

0.002

Percentile

55.1%

Related for TENABLE_OT_SIEMENS_CVE-2012-3037.NASL