FANUC Robot Controllers Integer Coercion Error (CVE-2021-32996)

high Tenable OT Security Plugin ID 501066

Synopsis

The remote OT asset is affected by a vulnerability.

Description

The FANUC R-30iA and R-30iB series controllers are vulnerable to integer coercion errors, which cause the device to crash. A restart is required.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

FANUC is recommending the following, both of which are documented in FANUC’s Internet Setup and Operations Manual:

- FANUC Server Access Control (FSAC): Users can configure access to the FANUC webserver based on IP address.
- Network Protocol Access Level: Users can configure which protocols are usable on the controller by creating a firewall where users can close unwanted ports based on the chosen access level.

FANUC users can also find any additional information by visiting the FANUC website or contacting FANUC.

See Also

https://www.cisa.gov/uscert/ics/advisories/icsa-21-243-02

Plugin Details

Severity: High

ID: 501066

Version: 1.4

Type: remote

Family: Tenable.ot

Published: 4/13/2023

Updated: 3/4/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2021-32996

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:fanuc:r-30ia_firmware:7.20, cpe:/o:fanuc:r-30ib_mate_plus_firmware:9.13, cpe:/o:fanuc:r-30ib_mate_plus_firmware:9.16, cpe:/o:fanuc:r-30ib_mate_plus_firmware:9.30, cpe:/o:fanuc:r-30ib_mate_plus_firmware:9.36, cpe:/o:fanuc:r-30ib_mate_plus_firmware:9.40, cpe:/o:fanuc:r-30ib_mini_plus_firmware:9.10, cpe:/o:fanuc:r-30ib_mini_plus_firmware:9.13, cpe:/o:fanuc:r-30ib_mini_plus_firmware:9.16, cpe:/o:fanuc:r-30ib_mini_plus_firmware:9.30, cpe:/o:fanuc:r-30ib_mini_plus_firmware:9.36, cpe:/o:fanuc:r-30ib_mini_plus_firmware:9.40, cpe:/o:fanuc:r-30ib_plus_firmware:9.10, cpe:/o:fanuc:r-30ib_plus_firmware:9.13, cpe:/o:fanuc:r-30ib_plus_firmware:9.16, cpe:/o:fanuc:r-30ib_plus_firmware:9.30, cpe:/o:fanuc:r-30ia_firmware:7.30, cpe:/o:fanuc:r-30ia_firmware:7.40, cpe:/o:fanuc:r-30ia_firmware:7.43, cpe:/o:fanuc:r-30ia_firmware:7.50, cpe:/o:fanuc:r-30ia_firmware:7.63, cpe:/o:fanuc:r-30ia_firmware:7.70, cpe:/o:fanuc:r-30ia_mate_firmware:7.20, cpe:/o:fanuc:r-30ia_mate_firmware:7.30, cpe:/o:fanuc:r-30ia_mate_firmware:7.40, cpe:/o:fanuc:r-30ia_mate_firmware:7.43, cpe:/o:fanuc:r-30ia_mate_firmware:7.50, cpe:/o:fanuc:r-30ia_mate_firmware:7.63, cpe:/o:fanuc:r-30ia_mate_firmware:7.70, cpe:/o:fanuc:r-30ib_compact_plus_firmware:9.10, cpe:/o:fanuc:r-30ib_compact_plus_firmware:9.13, cpe:/o:fanuc:r-30ib_compact_plus_firmware:9.16, cpe:/o:fanuc:r-30ib_compact_plus_firmware:9.30, cpe:/o:fanuc:r-30ib_compact_plus_firmware:9.36, cpe:/o:fanuc:r-30ib_compact_plus_firmware:9.40, cpe:/o:fanuc:r-30ib_firmware:8.10, cpe:/o:fanuc:r-30ib_firmware:8.13, cpe:/o:fanuc:r-30ib_firmware:8.20, cpe:/o:fanuc:r-30ib_firmware:8.23, cpe:/o:fanuc:r-30ib_firmware:8.26, cpe:/o:fanuc:r-30ib_firmware:8.30, cpe:/o:fanuc:r-30ib_plus_firmware:9.36, cpe:/o:fanuc:r-30ib_plus_firmware:9.40, cpe:/o:fanuc:r-30ib_firmware:8.33, cpe:/o:fanuc:r-30ib_firmware:8.36, cpe:/o:fanuc:r-30ib_mate_firmware:8.10, cpe:/o:fanuc:r-30ib_mate_firmware:8.13, cpe:/o:fanuc:r-30ib_mate_firmware:8.20, cpe:/o:fanuc:r-30ib_mate_firmware:8.23, cpe:/o:fanuc:r-30ib_mate_firmware:8.26, cpe:/o:fanuc:r-30ib_mate_firmware:8.30, cpe:/o:fanuc:r-30ib_mate_firmware:8.33, cpe:/o:fanuc:r-30ib_mate_firmware:8.36, cpe:/o:fanuc:r-30ib_mate_plus_firmware:9.10

Required KB Items: Tenable.ot/FanucRobotics

Exploit Ease: No known exploits are available

Patch Publication Date: 1/10/2022

Vulnerability Publication Date: 1/10/2022

Reference Information

CVE: CVE-2021-32996

CWE: 681