PT-2012-48: Insecure storage of HTTPS CA certificate and private key in Siemens SIMATIC S7-1200
Siemens SIMATIC S7-1200
Severity level: High
Access Vector: Remote
Base Score: 9.3
SIMATIC S7-1200 controllers are new modular miniature controllers. Due to the compact modular design with a high performance at the same time, the SIMATIC S7-1200 is suitable for a wide variety of automation applications. Its range of use extends from the replacement of relays and contactors up to complex automation tasks in networks and within distributed structures.
The specialists of the Positive Research center have detected "Spoofing" vulnerability in Siemens SIMATIC S7-1200.
The private key for the CA "SIMATIC CONTROLLER" in the S7-1200 V2.x has been compromised. This could allow an attacker to perform man-in-the-middle attacks or to deploy malicious but trusted web sites.
How to fix
Siemens strongly recommends the user uninstall the CA keys from the browser’s certificate store. Once this is performed, warning messages will occur when attempting to connect to an S7-1200 PLC. The user can manually confirm the identity of the PLC and its certificate and accept it via the browser. This has to be done once for each S7-1200 PLC on the network.
The compromised key is not shared by the S7-1200 V3.x version of PLCs.
29.08.2012 - Vendor is notified
29.08.2012 - Vendor gets vulnerability details
13.09.2012 - Vendor has issued temporary workarounds
26.09.2012 - Public disclosure
The vulnerability has discovered by Dmitry Sklyarov, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research: