You can only simulate cpus of the s7-1200 series with firmware version 4.0 or higher
1. EXECUTIVE SUMMARY
2. RISK EVALUATIONSuccessful exploitation of this vulnerability could expose confidential configuration data. Show 3. TECHNICAL DETAILS3.1 AFFECTED PRODUCTSSiemens reports this vulnerability affects the SIMATIC S7-1200 and S7-1500 CPU product families:
3.2 VULNERABILITY OVERVIEW3.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522Affected Siemens SIMATIC S7-1200 and S7-1500 CPU Families protect the built-in global private key with insufficient key protection. This could allow attackers to discover the private key of a CPU product family by an offline attack against a single CPU of the family. Attackers could then use this knowledge to extract confidential configuration data from projects that are protected by that key or to perform attacks against legacy PG/PC and human machine interface (HMI) communication. CVE-2022-38465 has been assigned to this vulnerability. A CVSS v3 base score of 9.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). 3.3 BACKGROUND
3.4 RESEARCHERTal Keren from Claroty reported this vulnerability to Siemens. 4. MITIGATIONSSiemens has identified the following specific workarounds and mitigations that users can apply to reduce the risk:
Siemens has identified additional workarounds and mitigations users can apply to reduce risk:
As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens’ operational guidelines for industrial security, and following the recommendations in the product manuals. Siemens has provided additional information on industrial security. For more information, see Siemens Security Advisory SSA-568427 in HTML or CSAF. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploits specifically target this vulnerability. This vulnerability is not exploitable remotely. Contact InformationFor industrial control systems cybersecurity information: https://us-cert.cisa.gov/ics CISA continuously strives to improve its products and services. You can help by choosing one of the links below to provide feedback about this product. |