Siemens SCALANCE X-200RNA Switch Devices Path Traversal (CVE-2019-6111)

medium Tenable OT Security Plugin ID 500898

Synopsis

The remote OT asset is affected by a vulnerability.

Description

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).

- An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). (CVE-2019-6111)

This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://usn.ubuntu.com/3885-1/

https://usn.ubuntu.com/3885-2/

https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt

https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html

https://security.gentoo.org/glsa/201903-16

https://www.debian.org/security/2019/dsa-4387

https://bugzilla.redhat.com/show_bug.cgi?id=1677794

https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c

https://security.netapp.com/advisory/ntap-20190213-0001/

http://www.nessus.org/u?b370bc74

https://access.redhat.com/errata/RHSA-2019:3702

http://www.openwall.com/lists/oss-security/2022/08/02/1

https://www.exploit-db.com/exploits/46193/

http://www.openwall.com/lists/oss-security/2019/04/18/1

https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc

https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

http://www.nessus.org/u?e31ba540

http://www.nessus.org/u?3636e0a7

http://www.nessus.org/u?4d26567d

http://www.nessus.org/u?c601aafc

http://www.nessus.org/u?af028629

Plugin Details

Severity: Medium

ID: 500898

Version: 1.9

Type: remote

Family: Tenable.ot

Published: 3/24/2023

Updated: 12/5/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 6.1

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P

CVSS Score Source: CVE-2019-6111

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:siemens:scalance_x204rna_%28hsr%29_firmware:3.2.7, cpe:/o:siemens:scalance_x204rna_eec_%28prp%29_firmware:3.2.7, cpe:/o:siemens:scalance_x204rna_eec_%28prp%2fhsr%29_firmware:3.2.7, cpe:/o:siemens:scalance_x204rna_%28prp%29_firmware:3.2.7, cpe:/o:siemens:scalance_x204rna_eec_%28hsr%29_firmware:3.2.7, cpe:/o:siemens:simatic_s7-1500_cpu_firmware:3.1.0, cpe:/o:siemens:siplus_s7-1500_cpu_firmware:3.1.0

Required KB Items: Tenable.ot/Siemens

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/31/2019

Vulnerability Publication Date: 1/31/2019

Reference Information

CVE: CVE-2019-6111

CWE: 22

DSA: DSA-4387

FEDORA: FEDORA-2019-0f4190cdb0

FREEBSD: FreeBSD-EN-19:10

GLSA: GLSA-201903-16

RHSA: RHSA-2019:3702

SuSE: openSUSE-SU-2019:1602

USN: USN-3885-1, USN-3885-2