Loading

PN965 | Stratix 5900 Security Updates

Advisory ID:
PN965
Published Date:
April 04, 2017
Last Updated:
April 04, 2017
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
No
Corrected:
No
Workaround:
No
CVE IDs
CVE-2015-1787,
CVE-2014-0195,
CVE-2014-2109,
CVE-2014-3566,
CVE-2016-1344,
CVE-2015-7702,
CVE-2015-7871,
CVE-2014-2106,
CVE-2015-0207,
CVE-2016-6393,
CVE-2014-3360,
CVE-2014-2112,
CVE-2016-6380,
CVE-2015-7691,
CVE-2015-7692,
CVE-2015-7849,
CVE-2015-0290,
CVE-2014-0224,
CVE-2015-7701,
CVE-2014-3470,
CVE-2014-2113,
CVE-2014-2108,
CVE-2015-7704,
CVE-2016-6415,
CVE-2014-2111,
CVE-2015-0642,
CVE-2015-1798,
CVE-2014-0221,
CVE-2015-0292,
CVE-2015-0293,
CVE-2015-7854,
CVE-2014-0076,
CVE-2015-0646,
CVE-2014-3361,
CVE-2016-6381,
CVE-2016-1409,
CVE-2015-7855,
CVE-2015-0291,
CVE-2015-7850,
CVE-2016-6384,
CVE-2014-3356,
CVE-2014-3354,
CVE-2014-3355,
CVE-2014-3299,
CVE-2015-7848,
CVE-2015-0289,
CVE-2015-7705,
CVE-2015-7703,
CVE-2015-7851,
CVE-2015-1799,
CVE-2016-6382,
CVE-2014-3359,
CVE-2015-0287,
CVE-2010-5298,
CVE-2015-7852,
CVE-2015-0209,
CVE-2015-0288,
CVE-2015-0285,
CVE-2014-0198,
CVE-2015-0643,
CVE-2015-7853,
CVE-2016-1350
Summary
Stratix 5900 Security Updates

Introduction

Stratix 5900 Security Updates

Description

Version 1.0 - April 4, 2017

Cisco Systems, Inc. ("Cisco") has reported that several vulnerabilities exist in versions the Stratix® 5900 Services Router software. The Stratix 5900 Services Router is capable of providing bridging, multi-protocol routing, and remote access services in industrial control systems.

Customers using affected versions of this software are encouraged to evaluate the mitigations provided below, and apply the applicable mitigations to their deployed products. Additional details relating to the discovered vulnerabilities, including affected products and recommended countermeasures, are provided herein.

AFFECTED PRODUCTS
Stratix 5900, All Versions prior to 15.6.3

VULNERABILITY DETAILS
Rockwell Automation evaluated the vulnerabilities using the Common Vulnerability Scoring System ("CVSS") v3.0.

Security Advisories that Affect this Release

CVE ID #

Headline

(linked to Cisco Advisory)

CVSS v3 Score and Vector String**

(**For a better understanding of how this score was generated, please follow the link to first.org)

CVE-2016-6393

Cisco IOS and IOS XE Software AAA Login Denial of Service Vulnerability

8.1/10 - High
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H

CVE-2016-6380

Cisco IOS and IOS XE Software DNS Forwarder Denial of Service Vulnerability

8.1/10 - High
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H

CVE-2016-6384

Cisco IOS and IOS XE Software H.323 Message Validation Denial of Service Vulnerability

8.6/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2016-6381

Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Fragmentation Denial of Service Vulnerability

6.8/10 - Medium
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2016-6382

Cisco IOS and IOS XE Software Multicast Routing Denial of Service Vulnerabilities

8.6/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2016-6415

IKEv1 Information Disclosure Vulnerability in Multiple Cisco Products

8.6/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

CVE-2016-1409

Cisco Products IPv6 Neighbor Discovery Crafted Packet Denial of Service Vulnerability

5.8/10 - Medium
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L

CVE-2016-1350

Cisco IOS and IOS XE and Cisco Unified Communications Manager Software Session Initiation Protocol Memory Leak Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2016-1344

Cisco IOS and IOS XE Software Internet Key Exchange Version 2 Fragmentation Denial of Service Vulnerability

6.8/10 - Medium

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2015-7691

CVE-2015-7692

CVE-2015-7701

CVE-2015-7702

CVE-2015-7703

CVE-2015-7704

CVE-2015-7705

CVE-2015-7848

CVE-2015-7849

CVE-2015-7850

CVE-2015-7851

CVE-2015-7852

CVE-2015-7853

CVE-2015-7854

CVE-2015-7855

CVE-2015-7871

Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015

7.2/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L

CVE-2015-1798

CVE-2015-1799

Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products

5.8/10 - Medium
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N

CVE-2015-0642

CVE-2015-0643

Cisco IOS Software and IOS XE Software Internet Key Exchange Version 2 Denial of Service Vulnerabilities

8.6/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2015-0646

Cisco IOS Software and IOS XE Software TCP Packet Memory Leak Vulnerability

8.6/10 - High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2015-0207

CVE-2015-0209

CVE-2015-0285

CVE-2015-0287

CVE-2015-0288

CVE-2015-0289

CVE-2015-0290

CVE-2015-0291

CVE-2015-0292

CVE-2015-0293

CVE-2015-1787

Multiple Vulnerabilities in OpenSSL (March 2015) Affecting Cisco Products

4.0 - Medium

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N

CVE-2014-3566

SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability

4.0 - Medium

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N

CVE-2014-3359

Cisco IOS Software DHCP Version 6 Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-3355

CVE-2014-3356

Cisco IOS Software Metadata Vulnerabilities

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-3361

Cisco IOS Software Network Address Translation Denial of Service Vulnerability

6.8/10 - Medium

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-3354

Cisco IOS Software RSVP Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-3360

Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-3299

Cisco IOS Software IPsec Denial of Service Vulnerability

7.7/10 - High

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

CVE-2010-5298

CVE-2014-0076

CVE-2014-0195

CVE-2014-0198

CVE-2014-0221

CVE-2014-0224

CVE-2014-3470

Multiple Vulnerabilities in OpenSSL Affecting Cisco Products

10/10 - Critical
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE-2014-2113

Cisco IOS Software Crafted IPv6 Packet Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-2108

Cisco IOS Software Internet Key Exchange Version 2 Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-2109

CVE-2014-2111

Cisco IOS Software Network Address Translation Vulnerabilities

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-2106

Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CVE-2014-2112

Cisco IOS Software SSL VPN Denial of Service Vulnerability

8.6/10 - High

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

RISK MITIGATIONS and RECOMMENDED USER ACTIONS
Rockwell Automation has provided firmware version v15.6.3 as remediation for these vulnerabilities.

Product Name

Catalog Number

Suggested Actions

Stratix 5900 Services Router

1783-SRKIT

Update to v15.6.3 (Download)

Customers using affected products are encouraged to update to this latest version, which addresses the associated risk and includes added improvements to further harden the software and enhance its resilience against similar malicious attacks.

Customers who are unable to update their software are directed toward risk mitigation strategies provided below.

Where feasible, it is recommended to use the additional precautions and risk mitigation strategies listed below. When possible, multiple strategies should be employed simultaneously. Please click "Subscribe for Updates" in the upper right corner if you would like an email notification when this advisory is updated.

GENERAL SECURITY GUIDELINES

1. Help minimize any unnecessary network exposure by assessing all control system devices and/or systems, and confirm that firmware is kept up to date
2. Use proper network infrastructure controls, such as firewalls. As an extension to this approach, the Allen‑Bradley® Stratix 5950 Industrial Network Security Appliance offers an Intrusion Prevention System and an Intrusion Detection (IDS/IPS) System, and Deep Packet Inspection (DPI) technology of the Common Industrial Protocol (CIP). With the introduction of this new product, Rockwell Automation can offer customers an intrusion detection system to provide real-time visibility in the event that a vulnerability is being exploited. The Stratix 5950 Security Appliance uses Cisco FirePOWER™ technology, which allows created rules to be processed by Cisco TALOS for a variety of known security issues. Once configured with rules, the FirePOWER engine inspects the contents of every packet, looking for datapoints that correspond to one or more rules. Packets that have these signatures can be either logged using IDS or blocked using IPS. For further information on Rockwell Automation’s Vulnerability Handling process, please refer to our FAQs document.

For additional information on deploying the Stratix 5950, please see our Deploying Industrial Firewalls within a CPwE Architecture Guide.

Refer to http://www.rockwellautomation.com/rockwellautomation/products-technologies/network-technology/architectures.page for comprehensive information about implementing validated architectures designed to deliver these measures.

Refer to http://www.rockwellautomation.com/global/services/network-services/overview.page for information on Rockwell Automation network and security services to enable assessment, design, implementation and management of validated, secure network architectures.

We also recommend concerned customers continue to monitor this advisory with the Rockwell Automation Security Advisory Index at https://www.rockwellautomation.com/en-us/company/about-us/sustainability/trust-security/security-advisories.html, and the company public security webpage at http://www.rockwellautomation.com/security for new and relevant information relating to this matter.

Rockwell Automation remains committed to making security enhancements to our systems in the future. For more information and for assistance with assessing the state of security of your existing control system, including improving your system-level security when using Rockwell Automation and other vendor controls products, you can visit the Rockwell Automation Security Solutions web site at http://www.rockwellautomation.com/solutions/security.

ADDITIONAL LINKS

Security Advisory Index, Knowledgebase article KB:54102

Industrial Firewalls within a CPwE Architecture

Deploying Industrial Firewalls within a CPwE Architecture Design and Implementation Guide

·

KCS Status

Released

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Rockwell Automation Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Trust Center Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Security Adv Chevron RightChevron Right
  4. Chevron LeftChevron Left Industrial Security Advisory Detail Chevron RightChevron Right
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our Privacy Policy
CloseClose