|2017-09-28||Other||Siemens||Siemens reported this vulnerability to ICS-CERT.
# Siemens Ruggedcom ROS, SCALANCE
### VULNERABLE VENDOR
### VULNERABLE PRODUCT
Ruggedcom ROS, SCALANCE
Siemens reported this vulnerability to ICS-CERT.
### AFFECTED PRODUCTS
Siemens reports that the vulnerability affects the following devices which use the Ruggedcom Discovery Protocol (RCDP):
RUGGEDCOM ROS for RSL910 devices: All versions prior to ROS v5.0.1
RUGGEDCOM ROS for all other devices: All versions prior to ROS v4.3.4
SCALANCE XB-200/XC-200/XP-200/XR300-WG: All versions newer than v3.0
SCALANCE XR-500/XM-400: All versions newer than v6.1
Successful exploitation of this vulnerability could allow users of networks adjacent to the targeted device to perform unauthorized administrative actions.
### VULNERABILITY OVERVIEW
IMPROPER ACCESS CONTROL CWE-284
After initial configuration, the RCDP is still able to write to the device under certain conditions, potentially allowing users located in the adjacent network of the targeted device to perform unauthorized administrative actions.
CVE-2017-12736 has been assigned to this vulnerability.
A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Critical Infrastructure Sectors: Energy, Healthcare and Public Health, and Transportation Systems
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Germany
Siemens provides Ruggedcom ROS firmware Version v4.3.4, v5.0.1 and Ruggedcom Explorer v1.5.2 which fixes the vulnerability and recommends users update to the newest version. The firmware updates for the Ruggedcom ROS-based devices can be obtained for free by contacting the Ruggedcom support team at email@example.com
Siemens is preparing updates for the remaining affected products and recommends that users manually deactivate RCDP according to the instructions in the user guide. The user guide can be found on the Siemens web site at the following location:
As a general security measure, Siemens advises configuring the IT environment according to Siemens operational guidelines in order to run the devices in a protected manner.
For more information on these vulnerabilities and more detailed mitigation instructions, please see Siemens Security Advisory SSA-856721 at the following location: