OTPulse

Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1

Act Now9.8SSA-794697Jun 13, 2023
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

Multiple vulnerabilities exist in the GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP firmware version V1.0. These include buffer overflows (CWE-119, CWE-120, CWE-121, CWE-122), integer overflows (CWE-190), weak cryptographic implementations (CWE-327, CWE-326, CWE-295), command injection (CWE-78), improper access control (CWE-284, CWE-287, CWE-863), and improper resource handling (CWE-400, CWE-401, CWE-416). The vulnerabilities allow remote execution of arbitrary code without authentication or user interaction.

What this means
What could happen
An attacker with network access to the S7-1500 TM MFP could execute arbitrary code on the device, potentially altering process logic, stopping operations, or gaining access to connected production systems and engineering workstations.
Who's at risk
Water authorities and municipal electric utilities operating SIMATIC S7-1500 TM MFP controllers for master fault protection or turbine management systems are affected. This includes any plant using these programmable logic controllers (PLCs) for critical process automation.
How it could be exploited
The S7-1500 TM MFP's GNU/Linux subsystem is reachable over the network without authentication required. An attacker could exploit multiple vulnerabilities (buffer overflows, integer overflows, command injection, weak cryptography, and access control flaws) to execute arbitrary commands or code on the device's Linux kernel, then potentially pivot to the industrial control functions or attached systems.
Prerequisites
  • Network access to the S7-1500 TM MFP on its Ethernet interface
  • Device running firmware version V1.0 or earlier
  • No prior authentication or valid credentials required
remotely exploitableno authentication requiredlow complexityactively exploited (KEV)high EPSS score (88.5%)affects control systemsmultiple vulnerability types including remote code execution
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (1)
ProductAffected VersionsFix Status
SIMATIC S7-1500 TM MFP - GNU/Linux subsystem<V1.11.1
Remediation & Mitigation
0/3
Do now
0/3
HOTFIXUpdate SIMATIC S7-1500 TM MFP firmware to version V1.1 or later
HARDENINGIsolate or segment the S7-1500 TM MFP on the network until the patch can be applied, restricting inbound network access to only authorized engineering and monitoring workstations
WORKAROUNDMonitor network traffic to and from the S7-1500 TM MFP for signs of exploitation attempts or unauthorized command execution
CVEs (168)
CVE-2020-12762CVE-2021-3759CVE-2021-4037CVE-2021-33655CVE-2021-44879CVE-2022-0171CVE-2022-1012CVE-2022-1015CVE-2022-1184CVE-2022-1292CVE-2022-1343CVE-2022-1434CVE-2022-1462CVE-2022-1473CVE-2022-1679CVE-2022-1852CVE-2022-1882CVE-2022-2068CVE-2022-2078CVE-2022-2097CVE-2022-2153CVE-2022-2274CVE-2022-2327CVE-2022-2503CVE-2022-2586CVE-2022-2588CVE-2022-2602CVE-2022-2663CVE-2022-2905CVE-2022-2959CVE-2022-2978CVE-2022-3028CVE-2022-3104CVE-2022-3115CVE-2022-3169CVE-2022-3303CVE-2022-3521CVE-2022-3524CVE-2022-3534CVE-2022-3545CVE-2022-3564CVE-2022-3565CVE-2022-3586CVE-2022-3594CVE-2022-3606CVE-2022-3621CVE-2022-3625CVE-2022-3628CVE-2022-3629CVE-2022-3633CVE-2022-3635CVE-2022-3646CVE-2022-3649CVE-2022-4095CVE-2022-4129CVE-2022-4139CVE-2022-4269CVE-2022-4304CVE-2022-4450CVE-2022-4662CVE-2022-20421CVE-2022-20422CVE-2022-20566CVE-2022-20572CVE-2022-21123CVE-2022-21125CVE-2022-21166CVE-2022-21505CVE-2022-26373CVE-2022-32250CVE-2022-32296CVE-2022-34918CVE-2022-36123CVE-2022-36280CVE-2022-36879CVE-2022-36946CVE-2022-39188CVE-2022-39190CVE-2022-40307CVE-2022-40768CVE-2022-41218CVE-2022-41222CVE-2022-41674CVE-2022-41849CVE-2022-41850CVE-2022-42328CVE-2022-42329CVE-2022-42432CVE-2022-42703CVE-2022-42719CVE-2022-42720CVE-2022-42721CVE-2022-42722CVE-2022-42895CVE-2022-42896CVE-2022-43750CVE-2022-47518CVE-2022-47520CVE-2022-47929CVE-2022-47946CVE-2023-0215CVE-2023-0286CVE-2023-0464CVE-2023-0465CVE-2023-0466CVE-2023-0590CVE-2023-1077CVE-2023-1095CVE-2023-1206CVE-2023-2898CVE-2023-3141CVE-2023-3268CVE-2023-3338CVE-2023-3389CVE-2023-3446CVE-2023-3609CVE-2023-3610CVE-2023-3611CVE-2023-3772CVE-2023-3773CVE-2023-3777CVE-2023-4004CVE-2023-4015CVE-2023-4273CVE-2023-4623CVE-2023-4911CVE-2023-4921CVE-2023-5178CVE-2023-5197CVE-2023-5678CVE-2023-5717CVE-2023-6606CVE-2023-6931CVE-2023-6932CVE-2023-7008CVE-2023-7104CVE-2023-23454CVE-2023-23455CVE-2023-23559CVE-2023-26607CVE-2023-31085CVE-2023-31436CVE-2023-32233CVE-2023-35001CVE-2023-35827CVE-2023-36660CVE-2023-37453CVE-2023-39189CVE-2023-39192CVE-2023-39193CVE-2023-39194CVE-2023-42753CVE-2023-42754CVE-2023-42755CVE-2023-45863CVE-2023-45871CVE-2023-48795CVE-2023-50495CVE-2023-51384CVE-2023-51385CVE-2023-51767CVE-2024-0232CVE-2024-0553CVE-2024-0567CVE-2024-0584CVE-2024-0684CVE-2024-22365CVE-2024-25062
↑↓ Navigate · Esc Close
API: /api/v1/advisories/7e45a01e-f5bf-4f7f-b963-8eb279bd0c5b