Siemens SCALANCE S612 Firewall > 2.1 and < 2.3.0.3 Multiple Vulnerabilities (SSA-268149)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote Siemens SCALANCE S612 firewall is affected by multiple
vulnerabilities.

Description :

The Siemens SCALANCE S612 firewall device has a firmware version that
is greater than 2.1 and prior to 2.3.0.3. It is, therefore, affected
by the following vulnerabilities :

- A brute-force weakness exists due to a failure to
enforce time delays between failed login attempts. This
allows a remote attacker to perform rapid, multiple
authentication attempts within a short time frame.
(CVE-2012-1799)

- A stack-based buffer overflow vulnerability exists in
the Profinet DCP protocol implementation due to a
failure to correctly handle unexpected input. A remote
attacker, using a specially crafted DCP frame, can crash
the DCP protocol stack, resulting in a denial of service
condition or possible arbitrary code execution.
(CVE-2012-1800)

See also :

http://www.nessus.org/u?edd13351
http://www.nessus.org/u?3dcad6f0
https://ics-cert.us-cert.gov/advisories/ICSA-12-102-05

Solution :

Upgrade to firmware release 2.3.0.3 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: SCADA

Nessus Plugin ID: 83263 ()

Bugtraq ID: 52923

CVE ID: CVE-2012-1799
CVE-2012-1800

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now