

Rewterz Threat Update – Increased Malware Attacks in Linux-based Multi-Cloud Environments
February 10, 2022
Rewterz Threat Advisory – CVE-2022-0435 – Linux Kernel Vulnerability
February 11, 2022
Rewterz Threat Update – Increased Malware Attacks in Linux-based Multi-Cloud Environments
February 10, 2022
Rewterz Threat Advisory – CVE-2022-0435 – Linux Kernel Vulnerability
February 11, 2022Severity
High
Analysis Summary
CVE-2021-37185
An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations.
CVE-2021-37204
An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations.
CVE-2021-37205
An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations.
CVE-2021-40360
The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.
CVE-2021-40363
The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system.
CVE-2021-40358
Legitimate file operations of the affected systems do not properly neutralize special elements within the pathname. An attacker could cause the pathname to resolve to a location outside of the restricted directory on the server and read, write, or delete critical files.
CVE-2021-40359
When downloading files, the affected systems do not properly neutralize special elements within the pathname. An attacker could cause the pathname to resolve to a location outside of the restricted directory on the server and read critical files.
CVE-2021-40364
The affected systems store sensitive information in log files. An attacker with access to the log files could publicly expose the information or reuse it to develop further attacks.
Impact
- Unauthorized Access
- Denial of Service
- Exposure of Sensitive Data
Indicators of Compromise
CVEs
- CVE-2021-37185
- CVE-2021-37204
- CVE-2021-40360
- CVE-2021-40363
- CVE-2021-40358
- CVE-2021-40359
- CVE-2021-40364
Affected Vendors
Siemens
Affected Products
- SIMATIC Drive Controller family: All versions prior to v2.9.4
- SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants): All versions
- SIMATIC S7-1200 CPU family (incl. SIPLUS variants): Version 4.5.0 and all following versions prior to v4.5.2
- SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants): Version 2.9.2 and all following versions prior to v2.9.4
- SIMATIC S7-1500 Software Controller: All versions
- SIMATIC S7-PLCSIM Advanced: All versions
- TIM 1531 IRC (incl. SIPLUS NET variants): Version 2.2 and all following versions
- SIMATIC PCS 7 v8.2 and earlier: All versions
- SIMATIC PCS 7 v9.0: All versions
- SIMATIC PCS 7 v9.1: All versions prior to v9.1 SP1
- SIMATIC WinCC v7.4 and earlier: All versions
- SIMATIC WinCC v7.5: All versions prior to v7.5 Update 6
- SIMATIC WinCC v15 and earlier: All versions
- SIMATIC WinCC v16: All versions prior to v16 Update 5
- SIMATIC WinCC v17: All versions prior to v17 Update 2
- SIMATIC WinCC v17: All versions since and including v17 Update 2
Remediation
Refer to CISA Advisory for the patch, upgrade, or suggested workaround information.
Siemens SIMATIC Industrial Products
https://www.cisa.gov/uscert/ics/advisories/icsa-22-041-01
Siemens SIMATIC WinCC
https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-03
Siemens SIMATIC WinCC and PCS
https://www.cisa.gov/uscert/ics/advisories/icsa-22-041-02