Article No° | Product Name | Affected Version(s) |
---|---|---|
Command Station CS 5800-9800 | all versions | |
Control Cabinet PC 2800 | all versions | |
EL100 PLC | all versions | |
Embedded Line EL 1800-9800 | all versions | |
E94xSHxxx | EtherNet Module E94AYCEN on slot MXI1 or MXI2 in 9400 servo inverters | <= V15.02.04 |
E94xMHxxx | EtherNet Module E94AYCEN on slot MXI1 or MXI2 in 9400 servo inverters | <= V15.02.04 |
The affected products contain a CODESYS Control runtime system in version V2. They are therefore affected by the
vulnerability described in CODESYS Advisory 2021-06. It provides a communication server for the communication with clients like the CODESYS Development System.
The 9400 servo inverters is only affected if the communication Path via the inserted EtherNet Module E94AYCEN on slot MXI1 or MXI2 is used. If the Module E94AYCEN is used, the following Versions are affected.
Product Identification: E94xSHxxx (Single Drive, High Line)
Product Identification: E94xMHxxx (Multi Drive, High Line)
Remark: If the product identification of your 9400 product does not fit to the above mentioned identification, please contact Lenze at Security.de@Lenze.com.
The Versions P (power supply module) and R (regenerative power supply module) are not affected. Furthermore, the Variant P (PLC) and the Variant S (StateLine) are not affected. The communication paths via the diagnostic interface X6, the system bus (CAN) X1 or the field buses (other than the named Ethernet module) that can be plugged into the module slots MXI1 or MXI2 are not affected.
The focus is therefore on 9400 servo inverters with the product-identification E94x{S/M}{H}... with a plugged in Ethernet module E94AYCEN... in module slot MXI1 or MXI2 and communication with the Engineer-Tools via exactly this channel.
In addition to the standard tool Engineer, there is also a special Version of the PLC Designer (Version 0.x). The communication path to the PLC Designer is not considered with the planned update and the vulnerabilities here remain even after the update. Here, the customer must provide a secure Environment, see Mitigation.
CODESYS V2 runtime system SP before 2.4.7.55 has a Stack-based Buffer Overflow.
CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation.
CODESYS V2 runtime system SP before 2.4.7.55 has a Heap-based Buffer Overflow.
A crafted request may cause a heap-based, a stack-based buffer overflow or a buffer over-read in the affected products, resulting in a denial-of-service condition or being utilized for remote code execution.
The crafted requests are only processed on the products, if no online password is configured on the products or if the attacker has previously successfully authenticated himself at the affected products.
Mitigation
As part of a security strategy, Lenze SE recommends the following general defense measures to reduce the risk of exploits:
Remark: One Measure should be to Block port 1200 via the firewall and open this port for authenticated access only.
Solution / Updates
The affected products
are at the end of life and are no longer available. A further development or adaption of the
products is no longer planned and no longer possible from the process of discontinuation.
The affected product
in the constellation described above will be revised in the next product release. An update is
planned for Q2 2022.
Reported by Yossi Reuven of SCADAfence, Anton Dorfman, Denis Goryushev and Sergey Fedonin of Positive Technologies.
Coordinated by CERT@VDE
Lenze SE thanks for reporting following coordinated disclosure. This helps us to improve our products and to protect customers and users