Siemens SCALANCE S612 Firewall > 2.1 and < 2.3.0.3 Multiple Vulnerabilities (SSA-268149)

critical Nessus Plugin ID 83263

Synopsis

The remote Siemens SCALANCE S612 firewall is affected by multiple vulnerabilities.

Description

The Siemens SCALANCE S612 firewall device has a firmware version that is greater than 2.1 and prior to 2.3.0.3. It is, therefore, affected by the following vulnerabilities :

- A brute-force weakness exists due to a failure to enforce time delays between failed login attempts. This allows a remote attacker to perform rapid, multiple authentication attempts within a short time frame.
(CVE-2012-1799)
- A stack-based buffer overflow vulnerability exists in the Profinet DCP protocol implementation due to a failure to correctly handle unexpected input. A remote attacker, using a specially crafted DCP frame, can crash the DCP protocol stack, resulting in a denial of service condition or possible arbitrary code execution.
(CVE-2012-1800)

Solution

Upgrade to firmware release 2.3.0.3 or later.

See Also

http://www.nessus.org/u?754db467

http://www.nessus.org/u?7589cf1c

https://ics-cert.us-cert.gov/advisories/ICSA-12-102-05

Plugin Details

Severity: Critical

ID: 83263

File Name: scada_siemens_scalance_s612_SSA-268149.nbin

Version: 1.86

Type: remote

Family: SCADA

Published: 5/6/2015

Updated: 3/19/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/h:siemens:scalance_s612, cpe:/a:siemens:scalance_s_firmware

Required KB Items: SCADA/Siemens SCALANCE S612 Web Server

Exploit Ease: No known exploits are available

Patch Publication Date: 4/5/2012

Vulnerability Publication Date: 4/5/2012

Reference Information

CVE: CVE-2012-1799, CVE-2012-1800

BID: 52923

ICSA: 12-102-05