SB2021041517 - Multiple vulnerabilities in Siemens Control Center Server (CCS)



SB2021041517 - Multiple vulnerabilities in Siemens Control Center Server (CCS)

Published: April 15, 2021

Security Bulletin ID SB2021041517
Severity
High
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 27% Medium 55% Low 18%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Improper Authentication (CVE-ID: CVE-2019-18337)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in the XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. A remote attacker can bypass authentication process and read the CCS users database, including the passwords of all users in obfuscated cleartext.


2) Improper Authentication (CVE-ID: CVE-2019-18341)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in the SFTP service (default port 22/tcp). A remote attacker can bypass authentication process and read data from the EDIR directory, e.g. the list of all configured stations.


3) Path traversal (CVE-ID: CVE-2019-18338)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the XML-based communication protocol as provided by default on ports 5444/tcp and 5440/tcp. A remote authenticated attacker can send a specially crafted HTTP request and list arbitrary directories or read files outside of the CCS application context.


4) Path traversal (CVE-ID: CVE-2019-19290)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote authenticated attacker can send a specially crafted HTTP request and read arbitrary files on the system.


5) Cleartext transmission of sensitive information (CVE-ID: CVE-2019-13947)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to the user configuration menu in the web interface transfers user passwords in cleartext to the client (browser). A remote authenticated administrator with ability to intercept network traffic can gain access to sensitive data.


6) Cleartext storage of sensitive information (CVE-ID: CVE-2019-19291)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the affected product maintains a log file that stores login credentials in cleartext. A remote authenticated attacker can obtain credentials when the FTP service is enabled.


7) Path traversal (CVE-ID: CVE-2019-18342)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the SFTP service. A remote authenticated attacker can send a specially crafted SFTP request and read arbitrary files on the system.

Note: In conjunction with CVE-2019-18341, an unauthenticated remote attacker with network access to the CCS server can exploit this vulnerability to read or delete arbitrary files, or access other resources on the same server.


8) SQL injection (CVE-ID: CVE-2019-19292)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data in XML-based communication protocol. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


9) Cross-site scripting (CVE-ID: CVE-2019-19293)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


10) Stored cross-site scripting (CVE-ID: CVE-2019-19294)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in several input fields. A remote authenticated attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


11) Insufficient Logging (CVE-ID: CVE-2019-19295)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected device does not enforce logging of security-relevant activities in the XML-based communication protocol. A remote authenticated attacker can perform covert actions not visible in the application log.


Remediation

Install update from vendor's website.