Siemens SCALANCE W700 Uncontrolled Resource Consumption (CVE-2023-6237)

medium Tenable OT Security Plugin ID 502912

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack.
The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that application is also vulnerable if used with the '-pubin' and '-check' options on untrusted data. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://cert-portal.siemens.com/productcert/html/ssa-915275.html

https://cert-portal.siemens.com/productcert/html/ssa-331112.html

https://cert-portal.siemens.com/productcert/html/ssa-769027.html

https://support.industry.siemens.com/cs/ww/en/view/109975745/

https://support.industry.siemens.com/cs/ww/en/view/109977720/

https://support.industry.siemens.com/cs/ww/en/view/109974917/

https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09

Plugin Details

Severity: Medium

ID: 502912

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 2/24/2025

Updated: 2/25/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:siemens:scalance_wam763-1_firmware:3.0.0, cpe:/o:siemens:scalance_wab762-1_firmware:3.0.0, cpe:/o:siemens:scalance_wam763-1_%28me%29_firmware:3.0.0, cpe:/o:siemens:scalance_wum766-1_%28me%29_firmware:3.0.0, cpe:/o:siemens:scalance_wam766-1_eec_%28us%29_firmware:3.0.0, cpe:/o:siemens:scalance_wam766-1_%28us%29_firmware:3.0.0, cpe:/o:siemens:scalance_wam766-1_eec_%28me%29_firmware:3.0.0, cpe:/o:siemens:scalance_wub762-1_firmware:3.0.0, cpe:/o:siemens:scalance_wum766-1_%28usa%29_firmware:3.0.0, cpe:/o:siemens:scalance_wub762-1_ifeatures_firmware:3.0.0, cpe:/o:siemens:scalance_wum766-1_firmware:3.0.0, cpe:/o:siemens:scalance_wam766-1_eec_firmware:3.0.0, cpe:/o:siemens:scalance_wam766-1_%28me%29_firmware:3.0.0, cpe:/o:siemens:scalance_wum763-1_firmware:3.0.0, cpe:/o:siemens:scalance_wam766-1_firmware:3.0.0, cpe:/o:siemens:scalance_wam763-1_%28us%29_firmware:3.0.0, cpe:/o:siemens:scalance_wum763-1_%28us%29_firmware:3.0.0

Required KB Items: Tenable.ot/Siemens

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/12/2024

Vulnerability Publication Date: 11/12/2024

Reference Information

CVE: CVE-2023-6237

CWE: 400

ICSA: 25-044-09