SCADA Vulnerabilities & Exposures (SVE)

CRITIFENCE® SCADA Vulnerabilities and Exposures Database (SVE)

[SVE-547637370] Siemens TIM 1531 IRC

Date Type Platform Author EDB-ID CVE-ID OSVDB-ID Download App SIS Signature
2018-03-29OtherSiemensSiemens reported this vulnerability to NCCIC.N/ACVE-2018-4841 N/AN/AN/A

Source

						
							
								
#
# Siemens TIM 1531 IRC
#


### VULNERABLE VENDOR
Siemens


### VULNERABLE PRODUCT
TIM 1531 IRC 


### RESEARCHER
Siemens reported this vulnerability to NCCIC.


### AFFECTED PRODUCTS
Siemens reports that the vulnerability affects the following TIM 1531 IRC communications modules:

TIM 1531 IRC, all versions prior to v1.1



### IMPACT
Successful exploitation may cause the device to enter a denial-of-service condition, or allow the attacker to read and manipulate data and configuration settings of the affected device.


### VULNERABILITY OVERVIEW
INCORRECT IMPLEMENTATION OF AUTHENTICATION ALGORITHM CWE-303
A remote attacker with network access to Port 80/TCP or Port 443/TCP could perform administrative operations on the device without prior authentication.
CVE-2018-4841 has been assigned to this vulnerability.
A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)





### BACKGROUND
Critical Infrastructure Sectors: Chemical, Critical Manufacturing, and Food and Agriculture
Countries/Areas Deployed: Worldwide
Company Headquarters Location: Germany




### MITIGATION

Siemens recommends updating to version 1.1 as soon as possible. The update can be found at the following location on the Siemens website:

https://support.industry.siemens.com/cs/ww/en/view/109755374


Siemens has identified the following specific workaround and mitigation that users can apply to reduce the risk:

Users can limit access to Port 80/TCP and Port 443/TCP in their network infrastructure (e.g., cell protection firewall or corporate firewall) to reduce the risk.

Siemens recommends users protect network access with appropriate mechanisms. Siemens also advises that users follow recommendations in the product manuals and configure the operational environment according to Siemens’ Operational Guidelines for Industrial Security:

https://www.siemens.com/cert/operational-guidelines-industrial-security


 For more information on this vulnerability and more detailed mitigation instructions, please see Siemens Security Advisory SSA-110922 at the following location:

http://www.siemens.com/cert/advisories