17 April 2020

Dozens of Siemens industrial devices are affected by DoS vulnerabilities

Siemens has reported several DoS vulnerabilities affecting numerous industrial devices.

Over twenty Siements products are affected by SegmentSmack (CVE-2018-5390) and FragmentSmack (CVE-2018-5391) vulnerabilities. Vulnerable products include IE/PB-Link devices, RUGGEDCOM routers, SCALANCE firewalls, SIMATIC CP communications processors, the SINEMA Remote Connect Server, etc. The SegmentSmack and FragmentSmack vulnerabilities, both of which have been assigned the CVSS v.3.1 base score of 7.5, were identified back in 2018 and are due to flaws in the Linux kernel’s TCP stack.

The vendor recommends installing the relevant updates to address the vulnerabilities.

Tens of Siemens industrial products are affected by a SegmentSmack vulnerability (CVE-2019-19300) in the Interniche-based TCP stack, which could lead to denial-of-service conditions. A CVSS v.3.1 base score of 7.5 has been calculated for the vulnerability. It affects the SIDOOR automatic door management system, various types of SIMATIC devices, SINAMICS converters, and SIPLUS products. For some of the affected products, the vulnerability can be fixed by installing updates, but for most of the vulnerable solutions, the vendor has not yet identified any specific mitigation measures.

SCALANCE X and SIMATIC products, including SIPLUS devices, are also affected by a DoS vulnerability. CVE-2019-19301 is a flaw in VxWorks-based Profinet TCP Stack. The CVSS v.3.1 base score calculated for this vulnerability is 7.5. Siemens has not yet identified any mitigations or workarounds for this vulnerability.

Sources: ICS-CERT, Siemens