Oh GREAT: Your factory can Heartbleed out
Siemens issues first round of coagulants for vulnerable SCADA kit
Tired of Heartbleed horror? Brace yourself for another round, this time with a "hackers can attack factories" flavour after Siemens shipped coagulant patches for some of its key SCADA kit.
In a timely reminder of just how pervasive the vulnerability is, the European vendor says users of its eLAN and WinCC OA products to install the latest updates to the software.
eLAN versions prior to 8.3.3 need to be updated, and WinCC OA versions prior to 3.12. The vendor also says it's working on patches for:
- S7-1500 version 1.5 – The Simatic PLC is vulnerable when HTTPS is enabled. Mitigation includes disabling the web server, limiting access to trusted networks, and removing the certificate from the browser;
- CP1543-1 version 1.1 – The industrial Ethernet communication processor is vulnerable when FTPS (FTP with SSL) is enabled. Mitigation includes disabling FTPS, restricting FTPS access to the trusted network, and/or accessing FTPS over a VPN tunnel;
- APE 2.0 – This application environment is vulnerable if SSL/TLS is in use.
The vendor notes that the vulnerability can only be exploited by a user with network access to the systems, and emphasises that “all products except perimeter devices” only be operated within trusted networks.
In a couple of unrelated patches, Siemens has fixed HTML injection vulnerabilities in its Simatic S7-1200 system, with the advisory PDF here. ®
Sponsored: Virtual application patterns