A new vulnerability has been discovered in the Siemens Spectrum Power 4.7 family of power electronics systems. This vulnerability has been given a CVE-2019-6579. This vulnerability has a CVSS base score of 10.0. Siemens recommends that customers download bugfix bf-47456_PE_WOP_fix to address this vulnerability.
NVD Analysts has published a CVSS score for this CVE
The Common Vulnerability Scoring System (CVSS) is a standardized way to assign scores to vulnerabilities. It is used in vulnerability management programs to assess the seriousness of a security vulnerability. This system is also used in vulnerability scanning tools. The National Vulnerability Database (NVD) is the official source of CVSS scores. A CVE is a publicly disclosed vulnerability. It includes a CVE ID, description, dates, and comments. Although the CVE listing does not include a CVSS score, NVD provides an additional supplemental tool called the CVSS calculator for CVSS v2.
The CVSS score for a CVE is calculated by evaluating the vulnerability against a number of criterion. The CVSS is based on information from industry subject matter experts and is continually refined. It is designed to be applicable to new vulnerabilities and to be repeatable. It is also customizable, so you can tailor your security measures based on your risk tolerance and environment.
CVSS scores can be difficult to interpret. There are several different ways to calculate CVSS scores. Many reputable organizations use CVSS, including Red Hat, NVD, and the National Institute of Standards and Technology. While the NVD website does not provide a CVSS score for this CVE, NVD Analysts has published a CVSS score for it based on publicly available information.
As of September 10, 2019, NVD Analysts will officially begin supporting CVSS v3.1 guidance for new CVEs. In addition, they will stop publishing CVSS v3.0 and v3.1 vector strings for the same CVE. They will also stop publishing CVSS v1.0 vector strings for any CVE published before 12/20/2015.
Siemens recommends users install bugfix bf-47456_PE_WOP_fix
Siemens has released a bugfix to address a critical vulnerability in the PE Web Office Portal and OS. This vulnerability can allow a remote attacker to execute commands with administrative privileges on the targeted system. This vulnerability affects Siemens Spectrum Power 4.7 products. These products are used in critical manufacturing, energy, water and wastewater systems, and the chemical industry.
The vulnerability can result in a denial of service attack on Siemens products. A remote attacker could exploit the flaw by sending specially crafted packets to UDP port 161. The bug affects a range of Siemens products, including SIMATIC HMI Panels V14, SINAMICS V20 Smart Access Modules, and other products.
While no public exploits exist for this vulnerability, Siemens recommends users to apply this security update. Users should follow the company’s standard security practices for installing security updates. These include prior validation of security updates, supervision of the update process in the target environment, and following appropriate operating guidelines.
Siemens Spectrum Power 4.7 customers are vulnerable to CVE-2019-6579
A recent security advisory from Siemens warns of a vulnerability in its Spectrum Power 4.7 product. This vulnerability is a remote code execution vulnerability that affects certain products and services. Customers are advised to install security patches to address the problem. It’s also recommended to limit the affected products to the network only.
This vulnerability occurs when the Quagga BGP daemon processes an UPDATE message with unknown attributes or cluster lists. A successful attack can result in a denial of service or the execution of arbitrary code. To mitigate this vulnerability, Siemens is providing a patch for affected products.
The affected devices include SIPLUS NET, SIPLUS, and X408 models. Additionally, S7-400 PN/DP V6 and below, SIPLUS variants, and SIMATIC Teleservice Adapter IE Advanced and Basic. This vulnerability also affects the Siemens X-414-3E switch family. Further details can be found on the Siemens Security Advisory.
As of this time, there has been no publicly disclosed exploits of this vulnerability. However, vendors have provided bugfixes and updates for affected products. Users are advised to update to the latest fixed versions of these products as soon as possible. They should also make sure their systems have been updated.
The vulnerability is most prevalent in the Siemens Spectrum Power 4.7 software and firmware. The GE Communicator service runs with system privileges. This allows an unauthenticated user to install malicious files into the installer directory, which can give attackers administrative privileges. Further, the Moxa IKS and EDS fail to validate user input and may allow attackers to access the system