Siemens OZW Devices Authentication Bypass

high Nessus Network Monitor Plugin ID 720122

Synopsis

A vulnerability was discovered in Siemens OZW that could allow an attacker to reada and manipulate data in TLS sessions.

Description

A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp.

Solution

Perform vendor recommended mitigations and apply available vendor upgrades.

See Also

http://www.securityfocus.com/bid/99473,https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-563539.pdf,https://ics-cert.us-cert.gov/advisories/ICSA-17-187-01

Plugin Details

Severity: High

ID: 720122

Family: SCADA

Published: 5/8/2019

Updated: 9/30/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 7/6/2017

Vulnerability Publication Date: 7/6/2017

Reference Information

CVE: CVE-2017-6873

BID: 99473