Siemens TIM 3V-IE and 4R-IE Family Devices
Act Now9ICS-CERT ICSA-20-105-09Apr 14, 2020
Attack VectorNetwork
Auth RequiredNone
ComplexityHigh
User InteractionNone needed
Summary
Siemens TIM 3V-IE and TIM 4R-IE telecom interface modules contain an improper input validation vulnerability (CWE-489) in versions prior to 2.8 (or 3.3 for DNP3 variants). The vulnerability allows an unauthenticated remote attacker to send malformed packets to UDP port 17185, potentially leading to code execution on the device. These modules are commonly deployed in substations and remote sites for SCADA communications. Siemens has released firmware updates that address the issue and recommends immediate patching. Interim mitigations include firewall rules to restrict access to port 17185/UDP and changing the default IP address of affected devices.
What this means
What could happen
An attacker with network access to the device could send specially crafted packets to port 17185/UDP that may cause the TIM module to execute arbitrary code, potentially allowing them to modify network traffic or configuration, disrupt communications between your field devices and control center, or intercept sensitive SCADA data.
Who's at risk
Water utilities and electric utilities using Siemens TIM (Telecom Interface Module) 3V-IE or 4R-IE devices for remote communication between SCADA systems and field equipment should apply these updates. These modules are typically used in substations and remote terminal units (RTUs) to provide network connectivity for control and telemetry data. Both standard and harsh-environment SIPLUS NET variants are affected.
How it could be exploited
An attacker on your network (or from the Internet if the device is exposed) sends a malformed packet to port 17185/UDP on the TIM 3V-IE or 4R-IE device. The vulnerable firmware does not properly validate the packet structure, allowing code execution. No credentials or authentication are required.
Prerequisites
- Network access to port 17185/UDP on the affected device
- Device running vulnerable firmware version (TIM 3V-IE/Advanced/4R-IE below v2.8, or DNP3 variants below v3.3)
- Device must be reachable on the network from attacker's location
Remotely exploitable over networkNo authentication requiredHigh complexity to exploit but publicly documented vulnerability classAffects network communication modules in SCADA infrastructureDefault device configuration exposes risk (IP 192.168.1.2, UDP port open)
Exploitability
Low exploit probability (EPSS 0.4%)
Affected products (5)
5 with fix
ProductAffected VersionsFix Status
TIM 3V-IE (incl. SIPLUS NET variants): All<V2.82.8
TIM 3V-IE Advanced (incl. SIPLUS NET variants): All<V2.82.8
TIM 3V-IE DNP3 (incl. SIPLUS NET variants): All<V3.33.3
TIM 4R-IE (incl. SIPLUS NET variants): All<V2.82.8
TIM 4R-IE DNP3 (incl. SIPLUS NET variants): All<V3.33.3
Remediation & Mitigation
0/8
Do now
0/2WORKAROUNDBlock inbound traffic to port 17185/UDP at your firewall for affected TIM devices from untrusted networks
WORKAROUNDChange the device IP address from the default 192.168.1.2 if currently set to that value
Schedule — requires maintenance window
0/5Patching may require device reboot — plan for process interruption
HOTFIXUpdate TIM 3V-IE (including SIPLUS NET) to firmware version 2.8 or later
HOTFIXUpdate TIM 3V-IE Advanced (including SIPLUS NET) to firmware version 2.8 or later
HOTFIXUpdate TIM 3V-IE DNP3 (including SIPLUS NET) to firmware version 3.3 or later
HOTFIXUpdate TIM 4R-IE (including SIPLUS NET) to firmware version 2.8 or later
HOTFIXUpdate TIM 4R-IE DNP3 (including SIPLUS NET) to firmware version 3.3 or later
Long-term hardening
0/1HARDENINGSegment the TIM devices onto a protected network separate from Internet-facing systems and business networks
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/afa93182-5d09-4823-999a-9e68a15003e2