Siemens RUGGEDCOM Exposure of Sensitive Information to an Unauthorized Actor (CVE-2023-52238)

medium Tenable OT Security Plugin ID 502353

Synopsis

The remote OT asset is affected by a vulnerability.

Description

The web server of the affected systems leaks the MACSEC key in clear text to a logged in user. An attacker with the credentials of a low privileged user could retrieve the MACSEC key and access (decrypt) the ethernet frames sent by authorized recipients.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

Siemens has prepared fixed versions and recommends countermeasures for products where fixes are not available.

RUGGEDCOM RST2228, RUGGEDCOM RST2228P: Update to V5.9.0 or later version

Siemens has identified the following specific workarounds and mitigations users can apply to reduce risk:

(CVE-2023-52237, CVE-2023-52238) Disable the webserver if not required on the affected systems.
Restrict the access to Port 80/tcp and 443/tcp to trusted IP address only

As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms.
To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens' operational guidelines for industrial security and following recommendations in the product manuals.

Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage.

For more information see the associated Siemens security advisory SSA-17037.

See Also

http://www.nessus.org/u?41658bf9

https://www.cisa.gov/news-events/ics-advisories/icsa-24-193-06

Plugin Details

Severity: Medium

ID: 502353

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 8/8/2024

Updated: 8/9/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:siemens:ruggedcom_rst2228_firmware, cpe:/o:siemens:ruggedcom_rst2228p_firmware

Required KB Items: Tenable.ot/Siemens

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/9/2024

Vulnerability Publication Date: 7/9/2024

Reference Information

CVE: CVE-2023-52238

CWE: 200