Siemens SIMATIC S7-1200
Version: 2.x
Link:
http://www.siemens.com
Severity level: High
Impact: Spoofing
Access Vector: Remote
CVSS v2:
Base Score: 9.3
Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVE: CVE-2012-3037
Product description
SIMATIC S7-1200 controllers are new modular miniature controllers. Due to the compact modular design with a high performance at the same time, the SIMATIC S7-1200 is suitable for a wide variety of automation applications. Its range of use extends from the replacement of relays and contactors up to complex automation tasks in networks and within distributed structures.
The specialists of the Positive Research center have detected βSpoofingβ vulnerability in Siemens SIMATIC S7-1200.
The private key for the CA βSIMATIC CONTROLLERβ in the S7-1200 V2.x has been compromised. This could allow an attacker to perform man-in-the-middle attacks or to deploy malicious but trusted web sites.
Siemens strongly recommends the user uninstall the CA keys from the browserβs certificate store. Once this is performed, warning messages will occur when attempting to connect to an S7-1200 PLC. The user can manually confirm the identity of the PLC and its certificate and accept it via the browser. This has to be done once for each S7-1200 PLC on the network.
The compromised key is not shared by the S7-1200 V3.x version of PLCs.
29.08.2012 - Vendor is notified
29.08.2012 - Vendor gets vulnerability details
13.09.2012 - Vendor has issued temporary workarounds
26.09.2012 - Public disclosure
The vulnerability has discovered by Dmitry Sklyarov, Positive Research Center (Positive Technologies Company)
<http://en.securitylab.ru/lab/PT-2012-48>
<http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-240718.pdf>
Reports on the vulnerabilities previously discovered by Positive Research:
<http://ptsecurity.com/research/advisory/>
<http://en.securitylab.ru/lab/>