Critical Siemens SIPORT Vulnerability: CVE-2024-47783 Advisory

  • Thread Author
As of January 10, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) announced a significant change in its approach towards updating security advisories regarding vulnerabilities related to Siemens products. The latest information can now be found directly on Siemens' ProductCERT Security Advisories.

Executive Summary​

Recent advisories reveal a critical vulnerability impacting Siemens SIPORT systems, specifically versions prior to V3.4.0. This vulnerability is categorized under the Common Vulnerability Scoring System (CVSS) with an impressive score of 8.5 (CVSS v4). The nature of the vulnerability, identified as "Incorrect Permission Assignment for Critical Resource," poses a serious risk under circumstances of low attack complexity.

Key Details:​

  • CVSS v4 Score: 8.5
  • Vendor: Siemens
  • Affected Equipment: SIPORT (versions < V3.4.0)
  • Vulnerability Type: Incorrect Permission Assignment

Risk Evaluation​

Attackers with local but unprivileged accounts could exploit this vulnerability, permitting them to override or modify service executables. This could lead to elevated privileges, allowing malicious parties to execute unauthorized actions within the systems.

Technical Details​

Affected Products​

  • Siemens SIPORT: Versions earlier than V3.4.0 are notably vulnerable.

Vulnerability Overview​

The vulnerability revolves around a critical weakness characterized by improper assignment of file permissions to installation folders. As described in CWE-732, this flaw permits local attackers to manipulate service executables, resulting in a potential escalation of privileges.
The vulnerability has been tracked as CVE-2024-47783, with CVSS v3 assigning a base score of 7.8 and a vector string of CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H.

Background​

  • Critical Infrastructure Sectors: Commercial Facilities
  • Global Deployment: Siemens products are used worldwide, with headquarters in Germany.
  • Researcher: The vulnerability was reported to CISA by Siemens.

Mitigations​

To assuage the associated risks, Siemens outlines several recommendations:
  • Permissions: Remove write permissions for non-administrative users on files and folders associated with the installation path.
  • Update Required: Users are urged to upgrade their systems to V3.4.0 or later.
Moreover, to enhance network security, Siemens suggests that organizations:

CISA Guidance​

CISA provides comprehensive defensive strategies, including:
  • Minimizing the external exposure of control system devices.
  • Utilizing firewalls to isolate control networks from business networks.
  • Secure remote access via updated VPNs, recognizing that VPNs may contain vulnerabilities themselves.
While there are no known public exploits targeting this vulnerability at present, organizations are encouraged to perform thorough impact analyses and assessments prior to implementing defensive measures.

Conclusion​

While Siemens continues to manage risks associated with this vulnerability, users of SIPORT systems are strongly advised to proactively address these concerns. Following the outlined measures will help mitigate risks and fortify defenses against potential exploitation. As always, the best defense is an informed and proactive approach to cybersecurity.
For further information, users can find more details in the Siemens security advisory SSA-064257.
Stay alert, stay secure, and don’t forget to keep your systems updated!

Source: CISA Siemens SIPORT