Siemens SCALANCE Improper Neutralization of Special Elements in Output Used by a Downstream Component (CVE-2023-44373)

critical Tenable OT Security Plugin ID 501871

Synopsis

The remote OT asset is affected by a vulnerability.

Description

A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU, RUGGEDCOM RM1224 LTE(4G) NAM, SCALANCE M804PB, SCALANCE M812-1 ADSL- Router (Annex A), SCALANCE M812-1 ADSL-Router (Annex B), SCALANCE M816-1 ADSL-Router (Annex A), SCALANCE M816-1 ADSL-Router (Annex B), SCALANCE M826-2 SHDSL-Router, SCALANCE M874-2, SCALANCE M874-3, SCALANCE M876-3 (EVDO), SCALANCE M876-3 (ROK), SCALANCE M876-4, SCALANCE M876-4 (EU), SCALANCE M876-4 (NAM), SCALANCE MUM853-1 (EU), SCALANCE MUM856-1 (EU), SCALANCE MUM856-1 (RoW), SCALANCE S615, SCALANCE S615 EEC, SCALANCE XB205-3 (SC, PN), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, E/IP), SCALANCE XB205-3 (ST, PN), SCALANCE XB205-3LD (SC, E/IP), SCALANCE XB205-3LD (SC, PN), SCALANCE XB208 (E/IP), SCALANCE XB208 (PN), SCALANCE XB213-3 (SC, E/IP), SCALANCE XB213-3 (SC, PN), SCALANCE XB213-3 (ST, E/IP), SCALANCE XB213-3 (ST, PN), SCALANCE XB213-3LD (SC, E/IP), SCALANCE XB213-3LD (SC, PN), SCALANCE XB216 (E/IP), SCALANCE XB216 (PN), SCALANCE XC206-2 (SC), SCALANCE XC206-2 (ST/BFOC), SCALANCE XC206-2G PoE, SCALANCE XC206-2G PoE (54 V DC), SCALANCE XC206-2G PoE EEC (54 V DC), SCALANCE XC206-2SFP, SCALANCE XC206-2SFP EEC, SCALANCE XC206-2SFP G, SCALANCE XC206-2SFP G (EIP DEF.), SCALANCE XC206-2SFP G EEC, SCALANCE XC208, SCALANCE XC208EEC, SCALANCE XC208G, SCALANCE XC208G (EIP def.), SCALANCE XC208G EEC, SCALANCE XC208G PoE, SCALANCE XC208G PoE (54 V DC), SCALANCE XC216, SCALANCE XC216-3G PoE, SCALANCE XC216-3G PoE (54 V DC), SCALANCE XC216-4C, SCALANCE XC216-4C G, SCALANCE XC216-4C G (EIP Def.), SCALANCE XC216-4C G EEC, SCALANCE XC216EEC, SCALANCE XC224, SCALANCE XC224-4C G, SCALANCE XC224-4C G (EIP Def.), SCALANCE XC224-4C G EEC, SCALANCE XF204, SCALANCE XF204 DNA, SCALANCE XF204-2BA, SCALANCE XF204-2BA DNA, SCALANCE XP208, SCALANCE XP208 (Ethernet/IP), SCALANCE XP208EEC, SCALANCE XP208PoE EEC, SCALANCE XP216, SCALANCE XP216 (Ethernet/IP), SCALANCE XP216EEC, SCALANCE XP216POE EEC, SCALANCE XR324WG (24 x FE, AC 230V), SCALANCE XR324WG (24 X FE, DC 24V), SCALANCE XR326-2C PoE WG, SCALANCE XR326-2C PoE WG (without UL), SCALANCE XR328-4C WG (24XFE, 4XGE, 24V), SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (24xFE,4xGE,AC230V), SCALANCE XR328-4C WG (28xGE, AC 230V), SCALANCE XR328-4C WG (28xGE, DC 24V), SIPLUS NET SCALANCE XC206-2, SIPLUS NET SCALANCE XC206-2SFP, SIPLUS NET SCALANCE XC208, SIPLUS NET SCALANCE XC216-4C. Affected devices do not properly sanitize an input field. This could allow an authenticated remote attacker with administrative privileges to inject code or spawn a system root shell. Follow-up of CVE-2022-36323.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf

Plugin Details

Severity: Critical

ID: 501871

Version: 1.5

Type: remote

Family: Tenable.ot

Published: 1/8/2024

Updated: 4/22/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C

CVSS Score Source: CVE-2023-44373

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:siemens:scalance_xf204_dna_firmware:-, cpe:/o:siemens:scalance_xc206-2_firmware:-, cpe:/o:siemens:scalance_xc216eec_firmware:-, cpe:/o:siemens:ruggedcom_rm1224_lte_firmware, cpe:/o:siemens:scalance_xc224_4c_g_eec_firmware:-, cpe:/o:siemens:scalance_xp216eec_firmware:-, cpe:/o:siemens:scalance_xc216_4c_g_eec_firmware:-, cpe:/o:siemens:scalance_xc208g_eec_firmware:-, cpe:/o:siemens:scalance_sc646-2c_firmware, cpe:/o:siemens:scalance_xb213-3_firmware:-, cpe:/o:siemens:scalance_xb208_firmware:-, cpe:/o:siemens:scalance_xc224_4c_g_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_g_firmware:-, cpe:/o:siemens:scalance_xp216poe_eec_firmware:-, cpe:/o:siemens:siplus_net_scalance_xc206-2sfp_firmware:-, cpe:/o:siemens:scalance_xr324wg_firmware:-, cpe:/o:siemens:scalance_xc206-2g_poe_eec_firmware:-, cpe:/o:siemens:scalance_xc208g_firmware:-, cpe:/o:siemens:scalance_xc216_4c_g_firmware:-, cpe:/o:siemens:scalance_xc208_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_firmware:-, cpe:/o:siemens:scalance_sc632-2c_firmware, cpe:/o:siemens:scalance_xp208eec_firmware:-, cpe:/o:siemens:scalance_xr326-2c_poe_wg_firmware:-, cpe:/o:siemens:scalance_xp216_firmware:-, cpe:/o:siemens:scalance_xc208eec_firmware:-, cpe:/o:siemens:scalance_xf204_2ba_dna_firmware:-, cpe:/o:siemens:scalance_sc642-2c_firmware, cpe:/o:siemens:scalance_xc216_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_eec_firmware:-, cpe:/o:siemens:scalance_xf204_2ba_firmware:-, cpe:/o:siemens:siplus_net_scalance_xc208_firmware:-, cpe:/o:siemens:scalance_xr328-4c_wg_firmware:-, cpe:/o:siemens:scalance_xb205-3ld_firmware:-, cpe:/o:siemens:scalance_xb213-3ld_firmware:-, cpe:/o:siemens:scalance_sc622-2c_firmware, cpe:/o:siemens:scalance_xc206-2g_poe_firmware:-, cpe:/o:siemens:scalance_xc208g_poe_firmware:-, cpe:/o:siemens:scalance_xc206-2sfp_g_eec_firmware:-, cpe:/o:siemens:scalance_xc216_4c_firmware:-, cpe:/o:siemens:scalance_xc216_3g_poe_firmware:-, cpe:/o:siemens:scalance_xc224_firmware:-, cpe:/o:siemens:scalance_sc626-2c_firmware, cpe:/o:siemens:scalance_xb205-3_firmware:-, cpe:/o:siemens:siplus_net_scalance_xc216-4c_firmware:-, cpe:/o:siemens:scalance_xp208poe_eec_firmware:-, cpe:/o:siemens:scalance_xp208_firmware:-, cpe:/o:siemens:scalance_sc636-2c_firmware, cpe:/o:siemens:siplus_net_scalance_xc206-2_firmware:-, cpe:/o:siemens:scalance_xb216_firmware:-, cpe:/o:siemens:scalance_m804pb_firmware

Required KB Items: Tenable.ot/Siemens

Exploit Ease: No known exploits are available

Patch Publication Date: 11/14/2023

Vulnerability Publication Date: 11/14/2023

Reference Information

CVE: CVE-2023-44373

CWE: 74