PT-2013-81: Cross-Site Request Forgery in Siemens SIMATIC S7-1500 CPU PLC Vulnerable platformSiemens SIMATIC S7-1500 CPU PLC Version: 1.1.x and earlierLink: http://www.siemens.com/Severity levelSeverity level: Medium Impact: Cross-Site Request Forgery Access Vector: Remote CVSS v2: Base Score: 5.8 Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:P)CVE: CVE-2014-2249Platform descriptionSiemens SIMATIC S7-1500 - controllers featuring high efficiency in data processing, integrated technological functions of Motion Control, PID control and the use of high-speed counters..Vulnerability descriptionThe specialists of the Positive Research center have detected a Cross-Site Request Forgery vulnerability in Siemens SIMATIC S7-1500 CPU PLC.The web server of the affected PLCs (port 80/tcp and port 443/tcp) might allow CSRF (Cross-Site Request Forgery) attacks, compromising integrity and availability of the affected device.How to fixUpdate your firmware up to the latest versionAdvisory status 05.08.2013 - Vendor gets vulnerability details 12.03.2014 - Vendor releases fixed version and details 25.03.2014 - Public disclosureCreditsThe vulnerability was detected by Dmitry Serebryannikov, Ilya Karpov, Alexey Osipov, Yury Goltsev, and Alexander Timorin, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2013-81 http://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-456423.pdf https://ics-cert.us-cert.gov/advisories/ICSA-14-073-01 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/