OTPulse

Siemens RUGGEDCOM ROS IP Forwarding Vulnerability

Low RiskICS-CERT ICSA-15-244-01Jun 4, 2015
Summary

Siemens RUGGEDCOM ROS firmware versions 3.8.0 through 4.2.0 contain a vulnerability in IP forwarding configuration that could allow an attacker with network access to the device to enable unauthorized IP forwarding. This could be exploited to route traffic through the device, potentially bypassing network segmentation in industrial control systems. The vendor has not planned to release a fix for affected versions.

What this means
What could happen
An attacker with network access to the RUGGEDCOM ROS device could enable IP forwarding to route traffic through your network device, potentially allowing them to pivot to other systems or eavesdrop on network communications on your industrial network.
Who's at risk
Water utilities, electric utilities, and other critical infrastructure operators using Siemens RUGGEDCOM ROS industrial network devices (firmware versions 3.8.0 through 4.2.0) should be concerned. This device is commonly used to provide ruggedized network connectivity in harsh industrial environments, so it may be deployed in substations, treatment plants, or pump stations.
How it could be exploited
An attacker with network access to the ROS management interface or control channel could modify the device's IP forwarding configuration. This would allow the device to forward packets between network segments, turning it into a network relay that an attacker could use to bypass network segmentation or gain access to restricted plant networks.
Prerequisites
  • Network access to the RUGGEDCOM ROS device management interface or control channel
  • Ability to modify device configuration (may require valid credentials or exploitation of another vulnerability)
no patch availableaffects network infrastructure in critical facilities
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
ROS: >=3.8.0|<=4.2.0≥ 3.8.0|≤ 4.2.0No fix (EOL)
Remediation & Mitigation
0/3
Do now
0/1
WORKAROUNDDeploy firewall rules to block unnecessary inbound connections to the ROS device and restrict IP forwarding capability at the network perimeter
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HARDENINGMonitor ROS device configuration changes and network traffic patterns for signs of unauthorized IP forwarding activity
Mitigations - no patch available
0/1
ROS: >=3.8.0|<=4.2.0 has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGImplement network segmentation to isolate RUGGEDCOM ROS devices from untrusted networks and restrict management access to authorized engineering workstations only
↑↓ Navigate · Esc Close
API: /api/v1/advisories/6dab6f22-bd13-4936-b199-fe0350f90f39