ID CVE-2019-6576
Summary A vulnerability has been identified in SIMATIC HMI Comfort Panels 4" - 22" (All versions < V15.1 Update 1), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (All versions < V15.1 Update 1), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 und KTP900F (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Advanced (All versions < V15.1 Update 1), SIMATIC WinCC Runtime Professional (All versions < V15.1 Update 1), SIMATIC WinCC (TIA Portal) (All versions < V15.1 Update 1), SIMATIC HMI Classic Devices (TP/MP/OP/MP Mobile Panel) (All versions). An attacker with network access to affected devices could potentially obtain a TLS session key. If the attacker is able to observe TLS traffic between a legitimate user and the device, then the attacker could decrypt the TLS traffic. The security vulnerability could be exploited by an attacker who has network access to the web interface of the device and who is able to observe TLS traffic between legitimate users and the web interface of the affected device. The vulnerability could impact the confidentiality of the communication between the affected device and a legitimate user. At the time of advisory publication no public exploitation of the security vulnerability was known.
References
Vulnerable Configurations
  • cpe:2.3:h:siemens:simatic_hmi_comfort_panels
    cpe:2.3:h:siemens:simatic_hmi_comfort_panels
  • cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels
    cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels
  • cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f
    cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f
  • cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700
    cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700
  • cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f
    cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f
  • cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900
    cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900
  • cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f
    cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f
  • Siemens SIMATIC WinCC (TIA Portal) Runtime Advanced
    cpe:2.3:a:siemens:simatic_wincc_runtime:-:-:-:-:advanced
  • cpe:2.3:o:siemens:simatic_hmi_tp_firmware
    cpe:2.3:o:siemens:simatic_hmi_tp_firmware
  • cpe:2.3:h:siemens:simatic_hmi_tp
    cpe:2.3:h:siemens:simatic_hmi_tp
  • cpe:2.3:o:siemens:simatic_hmi_mp_firmware
    cpe:2.3:o:siemens:simatic_hmi_mp_firmware
  • cpe:2.3:h:siemens:simatic_hmi_mp
    cpe:2.3:h:siemens:simatic_hmi_mp
  • cpe:2.3:o:siemens:simatic_hmi_op_firmware
    cpe:2.3:o:siemens:simatic_hmi_op_firmware
  • cpe:2.3:h:siemens:simatic_hmi_op
    cpe:2.3:h:siemens:simatic_hmi_op
CVSS
Base: 5.0
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
refmap via4
bid 108412
misc https://cert-portal.siemens.com/productcert/pdf/ssa-804486.pdf
Last major update 14-05-2019 - 16:29
Published 14-05-2019 - 16:29
Last modified 22-05-2019 - 12:29
Back to Top