Siemens SCALANCE OpenSSL NULL Pointer Dereference (CVE-2023-0401)

high Tenable OT Security Plugin ID 501876

Synopsis

The remote OT asset is affected by a vulnerability.

Description

A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash. The unavailability of an algorithm can be caused by using FIPS enabled configuration of providers or more commonly by not loading the legacy provider. PKCS7 data is processed by the SMIME library calls and also by the time stamp (TS) library calls. The TLS implementation in OpenSSL does not call these functions however third party applications would be affected if they call these functions to verify signatures on untrusted data.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://www.openssl.org/news/secadv/20230207.txt

http://www.nessus.org/u?11e6a733

https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf

Plugin Details

Severity: High

ID: 501876

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 1/11/2024

Updated: 1/15/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2023-0401

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:siemens:scalance_xb205-3_firmware:-, cpe:/o:siemens:scalance_xb205-3ld_firmware:-, cpe:/o:siemens:scalance_xb208_firmware:-, cpe:/o:siemens:scalance_xb213-3_firmware:-, cpe:/o:siemens:scalance_xb213-3ld_firmware:-, cpe:/o:siemens:scalance_xb216_firmware:-, cpe:/o:siemens:scalance_xc206-2_firmware:-, cpe:/o:siemens:scalance_xc206-2g_poe_firmware:-, cpe:/o:siemens:scalance_xc206-2g_poe_eec_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_eec_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_g_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_g_eec_firmware:-, cpe:/o:siemens:scalance_xc208_firmware:-, cpe:/o:siemens:scalance_xc208eec_firmware:-, cpe:/o:siemens:scalance_xc208g_firmware:-, cpe:/o:siemens:scalance_xc208g_eec_firmware:-, cpe:/o:siemens:scalance_xc208g_poe_firmware:-, cpe:/o:siemens:scalance_xc216_firmware:-, cpe:/o:siemens:scalance_xc216_3g_poe_firmware:-, cpe:/o:siemens:scalance_xc216_4c_firmware:-, cpe:/o:siemens:scalance_xc216_4c_g_firmware:-, cpe:/o:siemens:scalance_xc216_4c_g_eec_firmware:-, cpe:/o:siemens:scalance_xc216eec_firmware:-, cpe:/o:siemens:scalance_xc224_firmware:-, cpe:/o:siemens:scalance_xc224_4c_g_firmware:-, cpe:/o:siemens:scalance_xc224_4c_g_eec_firmware:-, cpe:/o:siemens:scalance_xf204_dna_firmware:-, cpe:/o:siemens:scalance_xf204_2ba_firmware:-, cpe:/o:siemens:scalance_xf204_2ba_dna_firmware:-, cpe:/o:siemens:scalance_xp208_firmware:-, cpe:/o:siemens:scalance_xp208eec_firmware:-, cpe:/o:siemens:scalance_xp208poe_eec_firmware:-, cpe:/o:siemens:scalance_xp216_firmware:-, cpe:/o:siemens:scalance_xp216eec_firmware:-, cpe:/o:siemens:scalance_xp216poe_eec_firmware:-, cpe:/o:siemens:scalance_xr324wg_firmware:-, cpe:/o:siemens:scalance_xr326-2c_poe_wg_firmware:-, cpe:/o:siemens:scalance_xr328-4c_wg_firmware:-, cpe:/o:siemens:siplus_net_scalance_xc206-2_firmware:-, cpe:/o:siemens:siplus_net_scalance_xc206-2sfp_firmware:-, cpe:/o:siemens:siplus_net_scalance_xc208_firmware:-, cpe:/o:siemens:siplus_net_scalance_xc216-4c_firmware:-

Required KB Items: Tenable.ot/Siemens

Exploit Ease: No known exploits are available

Patch Publication Date: 2/8/2023

Vulnerability Publication Date: 2/8/2023

Reference Information

CVE: CVE-2023-0401

CWE: 476