SiemensTCP事件服务悬浮和RUGEDCOM设备不适当输入验证(CVE-2022-31766)

高位可租OT安全插件ID 500884

简表

远程OT资产受脆弱性影响

描述性

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V7.1.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V7.1.2), SCALANCE M804PB (All versions < V7.1.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V7.1.2), SCALANCE M812-1 ADSL- Router (Annex B) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V7.1.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V7.1.2), SCALANCE M826-2 SHDSL-Router (All versions < V7.1.2), SCALANCE M874-2 (All versions < V7.1.2), SCALANCE M874-3 (All versions < V7.1.2), SCALANCE M876-3 (EVDO) (All versions < V7.1.2), SCALANCE M876-3 (ROK) (All versions < V7.1.2), SCALANCE M876-4 (All versions < V7.1.2), SCALANCE M876-4 (EU) (All versions < V7.1.2), SCALANCE M876-4 (NAM) (All versions < V7.1.2), SCALANCE MUM853-1 (EU) (All versions < V7.1.2), SCALANCE MUM856-1 (EU) (All versions < V7.1.2), SCALANCE MUM856-1 (RoW) (All versions < V7.1.2), SCALANCE S615 (All versions < V7.1.2), SCALANCE S615 EEC (All versions < V7.1.2), SCALANCE WAM763-1 (All versions >= V1.1.0 < V2.0), SCALANCE WAM766-1 (EU) (All versions >= V1.1.0 < V2.0), SCALANCE WAM766-1 (US) (All versions >= V1.1.0 < V2.0), SCALANCE WAM766-1 EEC (EU) (All versions >= V1.1.0 < V2.0), SCALANCE WAM766-1 EEC (US) (All versions >= V1.1.0 < V2.0), SCALANCE WUM763-1 (All versions >= V1.1.0 < V2.0), SCALANCE WUM763-1 (All versions >= V1.1.0 < V2.0), SCALANCE WUM766-1 (EU) (All versions >= V1.1.0 < V2.0), SCALANCE WUM766-1 (US) (All versions >= V1.1.0 < V2.0).受TCP事件服务激活的设备处理错误包不妥这可能允许非认证远程攻击者拒绝服务条件并重开设备,从而可能影响网络资源

插件只对Tenable.ot工作
网站s/www.yyueer.com/products/tenable-ot获取更多信息

求解

下文原由网络安全基础设施安全局创建原创可见于CISA.gov

西门子发布数种受影响产品更新建议更新最新版本西门子正在准备进一步更新,

RUGGEDCOM RM1224LTE4GEU (6GK6108-4AM00-2BA2):更新至v7.1.2
RUGGEDCOM RM1224LTE4GNT (6GK6108-4AM00-2DA2):更新至v7.1.2
SCACESM804PB (6GK5804-0AP00-2A2):更新至v7.1.2
SCACES M812-1ADSL-Router(附件A)(6GK5812-1AA00-2A2):更新至v7.1.2
SCACES M812-1ADSL-Router(附件B)(6GK5812-1BA00-2A2):更新至v7.1.2或以后
SCACE M816-1ADSL-Router(附件A)(6GK5816-1AA00-2A2):更新至v7.1.2
SCACE M816-1ADSL-Router(附件B)(6GK5816-1BA00-2A2):更新至v7.1.2
scance M826-2SHDSSL-Router (6GK5826-2AB00-2AB2):更新至v7.1.2
SCACES M874-2 (6GK5874-2A00-2A2):更新至v7.1.2
SCACESM874-3 (6GK5874-3A00-2A2):更新至v7.1.2
SCACEM876-3(EVDO)(6GK5876-3A02-2BA2):更新至v7.1.2
升空M876-3(ROK)(6GK5876-3A02-2EA2):更新至v7.1.2
升空M876-4(EU)(6GK5876-4AA00-2BA2):更新至v7.1.2
SCACESM876-4(NAM)(6GK5876-4A00-2DA2):更新至v7.1.2或后
SCACESMUM853-1(EU)(6GK5853-2EA00-2DA1):更新至v7.1.2
SCACES MUM856-1(EU)(6GK5856-2EA00-3DA1):更新至v7.1.2
SCACES MUM856-1(ROW)(6GK5856-2EA00-3AA1):更新至v7.1.2
s615s6GK5615-0A00-2A2更新

西门子识别出客户可应用以减少风险的具体变通办法和缓冲办法如下:

TCP事件特征失效,默认不活动
TCP事件服务端口限制访问(defat26864/TCP)仅限信任网络和客户IP地址

西门子建议保护网络访问带适当机制的设备西门子建议环境配置, 依据西门子工业安全操作指南 并遵循产品手册中的建议

西门子工业安全网页上有西门子工业安全补充信息

详情见HTML或CSAF中的Siemens安全咨询SA-697140

并见

https://cert-portal.siemens.com/productcert/pdf/ssa-697140.pdf

https://www.cisa.gov/news-events/ics-advisories/icsa-22-286-08

插件细节

严重性 :高位

身份证 :500884

版本化 :1.2

类型 :远程

家庭问题 :可调用.ot

发布 :3/2023

更新 :7/24/2023

风险信息

VPR

风险因子 :中度

分数 :4.4

CVSS v2

风险因子 :高位

基础评分 :7.8

时间评分 :5.8

向量 :CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS评分源 :CVE2022-31766

CVSSv3

风险因子 :高位

基础评分 :8.6

时间评分 :7.5

向量 :CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

时间向量 :CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE系统 :cpe:/o:siemens:scalance_m804pb_firmware,cpe:/o:siemens:scalance_m812-1_firmware,cpe:/o:siemens:scalance_m816-1_firmware,cpe:/o:siemens:scalance_m826-2_firmware,cpe:/o:siemens:scalance_m874-2_firmware,cpe:/o:siemens:scalance_m874-3_firmware,cpe:/o:siemens:scalance_m876-3_firmware,cpe:/o:siemens:scalance_m876-4_firmware,cpe:/o:siemens:scalance_mum853-1_firmware,cpe:/o:siemens:scalance_mum856-1_firmware,cpe:/o:siemens:scalance_s615_firmware,cpe:/o:siemens:scalance_wam763-1_firmware,cpe:/o:siemens:scalance_wam766-1_firmware,cpe:/o:siemens:scalance_wum763-1_firmware,cpe:/o:siemens:scalance_wum766-1_firmware

需要kb项 :Tenable.ot/Siemens

开发易斯 :无已知利用

补丁发布日期 :10/11/2022

漏洞发布日期 :10/11/2022

参考信息

CVE系统 :CVE2022-31766

CWE系统 :20码

Baidu
map