Siemens SCALANCE Use of Weak Hash (CVE-2023-44319)

medium Tenable OT Security Plugin ID 501869

Synopsis

The remote OT asset is affected by a vulnerability.

Description

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL- Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected devices use a weak checksum algorithm to protect the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that tricks a legitimate administrator to upload a modified configuration file to change the configuration of an affected device.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf

Plugin Details

Severity: Medium

ID: 501869

Version: 1.3

Type: remote

Family: Tenable.ot

Published: 1/8/2024

Updated: 3/21/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:L/Au:M/C:N/I:C/A:N

CVSS Score Source: CVE-2023-44319

CVSS v3

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:siemens:scalance_m804pb_firmware, cpe:/o:siemens:scalance_xb205-3_firmware:-, cpe:/o:siemens:scalance_xb205-3ld_firmware:-, cpe:/o:siemens:scalance_xb208_firmware:-, cpe:/o:siemens:scalance_xb213-3_firmware:-, cpe:/o:siemens:scalance_xb213-3ld_firmware:-, cpe:/o:siemens:scalance_xb216_firmware:-, cpe:/o:siemens:scalance_xc206-2_firmware:-, cpe:/o:siemens:scalance_xc206-2g_poe_eec_firmware:-, cpe:/o:siemens:scalance_xc206-2g_poe_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_eec_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_g_eec_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_g_firmware:-, cpe:/o:siemens:scalance_xc208_firmware:-, cpe:/o:siemens:scalance_xc216_firmware:-, cpe:/o:siemens:scalance_xc216eec_firmware:-, cpe:/o:siemens:scalance_xc224_firmware:-, cpe:/o:siemens:scalance_xf204_dna_firmware:-, cpe:/o:siemens:scalance_xp208_firmware:-, cpe:/o:siemens:scalance_xp208eec_firmware:-, cpe:/o:siemens:scalance_xp208poe_eec_firmware:-, cpe:/o:siemens:scalance_xp216_firmware:-, cpe:/o:siemens:scalance_xp216eec_firmware:-, cpe:/o:siemens:scalance_xp216poe_eec_firmware:-, cpe:/o:siemens:scalance_xr324wg_firmware:-, cpe:/o:siemens:scalance_xr328-4c_wg_firmware:-, cpe:/o:siemens:siplus_net_scalance_xc206-2_firmware:-, cpe:/o:siemens:siplus_net_scalance_xc206-2sfp_firmware:-, cpe:/o:siemens:siplus_net_scalance_xc208_firmware:-, cpe:/o:siemens:siplus_net_scalance_xc216-4c_firmware:-, cpe:/o:siemens:scalance_xc208eec_firmware:-, cpe:/o:siemens:scalance_xc208g_eec_firmware:-, cpe:/o:siemens:scalance_xc208g_firmware:-, cpe:/o:siemens:scalance_xc208g_poe_firmware:-, cpe:/o:siemens:scalance_xr326-2c_poe_wg_firmware:-, cpe:/o:siemens:scalance_xc216_3g_poe_firmware:-, cpe:/o:siemens:scalance_xc216_4c_firmware:-, cpe:/o:siemens:scalance_xc216_4c_g_firmware:-, cpe:/o:siemens:scalance_xc216_4c_g_eec_firmware:-, cpe:/o:siemens:scalance_xc224_4c_g_firmware:-, cpe:/o:siemens:scalance_xc224_4c_g_eec_firmware:-, cpe:/o:siemens:scalance_xf204_2ba_firmware:-, cpe:/o:siemens:scalance_xf204_2ba_dna_firmware:-

Required KB Items: Tenable.ot/Siemens

Exploit Ease: No known exploits are available

Patch Publication Date: 11/14/2023

Vulnerability Publication Date: 11/14/2023

Reference Information

CVE: CVE-2023-44319

CWE: 328