# ICS Advisory (ICSA-20-105-07)
## Siemens SCALANCE & SIMATIC (Update B)
Original release date: September 08, 2020
[Print Document](javascript:window.print\(\);)
[Tweet](https://twitter.com/share?url=https%3A%2F%2Fus-
cert.cisa.gov%2Fics%2Fadvisories%2Ficsa-20-105-07)
[Like Me](https://www.facebook.com/sharer.php?u=https%3A%2F%2Fus-
cert.cisa.gov%2Fics%2Fadvisories%2Ficsa-20-105-07)
[Share](http://www.addthis.com/bookmark.php?url=https%3A%2F%2Fus-
cert.cisa.gov%2Fics%2Fadvisories%2Ficsa-20-105-07)
### Legal Notice
All information products included in [https://us-cert.gov/ics](/ics) are
provided "as is" for informational purposes only. The Department of Homeland
Security (DHS) does not provide any warranties of any kind regarding any
information contained within. DHS does not endorse any commercial product or
service, referenced in this product or otherwise. Further dissemination of
this product is governed by the Traffic Light Protocol (TLP) marking in the
header. For more information about TLP, see [https://www.us-
cert.gov/tlp/](/tlp/).
* * *
## 1\. EXECUTIVE SUMMARY
* **CVSS v3 7.5**
* **ATTENTION:** Exploitable remotely/low skill level to exploit
* **Vendor:** Siemens
* **Equipment:** SCALANCE, SIMATIC
* **Vulnerability:** Resource Exhaustion
## 2\. UPDATE INFORMATION
This updated advisory is a follow-up to the advisory update titled
ICSA-20-105-07 Siemens SCALANCE & SIMATIC (Update A) that was published August
11, 2020, to the ICS webpage on us-cert.gov.
## 3\. RISK EVALUATION
Successful exploitation of this vulnerability can result in a denial-of-
service condition.
## 4\. TECHNICAL DETAILS
### 4.1 AFFECTED PRODUCTS
The following versions of SCALANCE are affected:
* SCALANCE X-200 switch family (incl. SIPLUS NET variants): all versions
* SCALANCE X-200IRT switch family (incl. SIPLUS NET variants): all versions
* SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants): all versions
* SCALANCE S602: all versions
* SCALANCE S612: all versions
* SCALANCE S623: all versions
* SCALANCE S627-2M: all versions
The following versions of SIMATIC are affected:
* SIMATIC CP 443-1 (incl. SIPLUS NET variants): all versions
* SIMATIC CP 443-1 Advanced (incl. SIPLUS NET variants): all versions
* SIMATIC RF180C: all versions
* SIMATIC RF182C: all versions
### 4.2 VULNERABILITY OVERVIEW
#### 4.2.1 [UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION')
CWE-400](https://cwe.mitre.org/data/definitions/400.html)
The VxWorks-based Profinet TCP stack can be forced to make resource-intense
calls for every incoming packet, which can lead to a denial-of-service
condition.
[CVE-2019-19301](http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19301)
has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been
calculated; the CVSS vector string is
([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)).
### 4.3 BACKGROUND
* **CRITICAL INFRASTRUCTURE SECTORS:** Critical Manufacturing
* **COUNTRIES/AREAS DEPLOYED:** Worldwide
* **COMPANY HEADQUARTERS LOCATION:** Germany
### 4.4 RESEARCHER
## 5\. MITIGATIONS
Siemens has identified the following specific workarounds and mitigations that
customers can apply to reduce the risk:
* For SCALANCE S-600 family (S602, S612, S623, S627-2M): migrate to a successor product within [the SCALANCE SC-600 family, v2.1 ](https://support.industry.siemens.com/cs/ww/en/view/109780500)or later version. For details refer to [the notice of discontinuation](https://support.industry.siemens.com/cs/ww/en/view/109756957).
**\--------- End Update B Part 1 of 1 ---------**
* For SIMATIC RF180C and RF182C: migrate to a successor product within the [SIMATIC RF18xC/CI family v1.3](https://support.industry.siemens.com/cs/ww/en/view/109781665) or later version.
For details refer to [the notice of
discontinuation](https://support.industry.siemens.com/cs/ww/en/view/109770532).
**\--------- End Update B Part 1 of 1 ---------**
* In all other cases please follow the General Security Recommendations.
Additional information on industrial security by Siemens can be found at:
<https://www.siemens.com/industrialsecurity>
For further inquiries on security vulnerabilities in Siemens products and
solutions, please contact [Siemens
ProductCERT](https://www.siemens.com/cert/advisories).
For more information on this vulnerability, please see Siemens security
advisory [SSA-102233](https://cert-
portal.siemens.com/productcert/pdf/ssa-102233.pdf)
CISA recommends users take defensive measures to minimize the risk of
exploitation of this vulnerability. Specifically, users should:
* Minimize network exposure for all control system devices and/or systems, and ensure that they are [not accessible from the Internet](https://www.us-cert.gov/ics/alerts/ICS-ALERT-10-301-01).
* Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
* When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.
CISA reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.
CISA also provides a section for [control systems security recommended
practices](https://www.us-cert.gov/ics/recommended-practices) on the ICS
webpage on [us-cert.gov](https://www.us-cert.gov/ics). Several recommended
practices are available for reading and download, including [Improving
Industrial Control Systems Cybersecurity with Defense-in-Depth
Strategies](https://www.us-
cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-
CERT_Defense_in_Depth_2016_S508C.pdf).
Additional mitigation guidance and recommended practices are publicly
available on the [ICS webpage on us-cert.gov](https://www.us-cert.gov/ics) in
the Technical Information Paper, [ICS-TIP-12-146-01B--Targeted Cyber Intrusion
Detection and Mitigation Strategies](https://www.us-cert.gov/ics/tips/ICS-
TIP-12-146-01B).
Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to CISA for tracking
and correlation against other incidents.
No known public exploits specifically target this vulnerability.
暂无评论