Hard-coded keys in some Siemens PLCs can be cracked, say researchers

Share post:

Industries and utilities using some of Siemens’ programmable logic controllers (PLCs) are being urged to update to the latest firmware after the discovery of a serious vulnerability exposing the units’ hard-coded global private cryptographic key designed to protect devices from being hacked.

The call to take action on the SIMATIC S7-1200, S7-1500 CPUs and the related TIA Portal products comes after researchers at Claroty found they could extract the heavily guarded and hardcoded key, allowing them to bypassing all four of the processors’ access level protections. The key is used for the legacy protection of confidential configuration data and the legacy PG/PC and HMI communications,

“A malicious actor could use this secret information to compromise the entire SIMATIC S7-1200/1500 product line in an irreparable way,” the researchers concluded.

In its advisory Siemens admitted the protection of the keys “cannot be considered sufficient any longer.”

Siemens recommends updating both the affected products as well as the corresponding TIA Portal project to the latest versions. TIA Portal V17 and related CPU firmware versions introduced protection of confidential configuration data based on individual passwords per device and TLS-protected PG/PC and HMI communication, the company said.

Claroty said the introduction of the new TLS management system in TIA Portal v17, ensures that configuration data and communications between Siemens PLCs and engineering workstations is encrypted and confidential.

The vulnerability has been given the number CVE-2022-38465, with a Common Vulnerability Scoring System (CVSS) score of 9.3.

The vulnerability of hard-coded keys has been known for some time. However, in its report Claroty notes that 10 years ago, when the TIA Portal v12 and SIMATIC S7-1200/1500 PLC CPU firmware families were introduced, hardcoded keys had to be used for security. Dynamic key management and distribution did not exist then for industrial control systems, largely because of the operational burden that key management systems would put on integrators and users. Siemens decided at the time instead to rely on fixed cryptographic keys to secure programming and communications between its PLCs and the TIA portal. However, with advances in technology, fixed keys aren’t safe any more.

Claroty researchers used a vulnerability uncovered in previous research (CVE-2020-15782) to bypass native memory protections on the PLC and gain read and write privileges in order to remotely execute code. As a result they were able to extract the internal, heavily guarded private key used across the Siemens product lines.  An attacker with knowledge of the PLC’s private key and encryption algorithm could to retrieve the configured password on the PLC. With that they could encrypt and decrypt protected communications and configurations.

Siemens describes the S7-1200 as a modular controller for simple but highly precise automation tasks. For example, a company in the Czech Republic uses an S7-1200 system to control the water, temperature and lighting in hydroponic farms it builds in shipping containers.

It describes the S7-1500 controller family as a system for all aspects of production automation and applications for medium-sized and high-end machines. One customer is a Danish firm that built a solar-powered robot that can sow and weed crops. The centralizing controller is a S7-1500, which collects, checks and stores data from the robot. It communicates with an S7-1200 in the robot through a VPN tunnel based on Ethernet.

The post Hard-coded keys in some Siemens PLCs can be cracked, say researchers first appeared on IT World Canada.

Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Controversial expansion of US surveillance powers nears Senate vote

The US Senate is poised to vote on a significant expansion of Section 702 of the Foreign Intelligence...

Russian-linked hackers target U.S. and European water systems

A Russian military-affiliated hacking group, Sandworm, is suspected of coordinating recent cyberattacks on water utilities in the U.S.,...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways