CVE-2019-18321

9.1 CRITICAL

📋 TL;DR

This vulnerability in Siemens SPPA-T3000 MS3000 Migration Server allows attackers with network access to read and write arbitrary files on the server's local file system by sending specially crafted packets to TCP port 5010. This affects all versions of the MS3000 Migration Server. Attackers need network access to the target system to exploit this vulnerability.

💻 Affected Systems

Products:
  • SPPA-T3000 MS3000 Migration Server
Versions: All versions
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the MS3000 Migration Server component specifically. Network access to port 5010/tcp is required for exploitation.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including installation of malware, data theft, system manipulation, and potential disruption of industrial control operations.

🟠

Likely Case

Unauthorized file access leading to sensitive information disclosure, configuration tampering, or planting of backdoors for persistent access.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized network access to the vulnerable service.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can directly exploit this vulnerability without needing internal access.
🏢 Internal Only: HIGH - Even internally, any compromised device or malicious insider could exploit this vulnerability to gain file system access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

No authentication required - attackers only need network access to port 5010. No public exploit code was known at advisory publication time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references - consult Siemens advisory for specific patched versions

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf

Restart Required: Yes

Instructions:

1. Review Siemens advisory SSA-451445. 2. Apply the recommended security updates from Siemens. 3. Restart the MS3000 Migration Server service. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Segmentation

linux

Block external and unnecessary internal access to port 5010/tcp on MS3000 servers

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_NETWORK" port protocol="tcp" port="5010" accept'
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port protocol="tcp" port="5010" drop'
firewall-cmd --reload

Service Restriction

all

Configure the MS3000 service to only listen on specific trusted interfaces

# Configuration depends on specific MS3000 service settings - consult Siemens documentation

🧯 If You Can't Patch

  • Implement strict network access controls to block all traffic to port 5010/tcp except from authorized management systems
  • Deploy network monitoring and intrusion detection specifically for port 5010 traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check if MS3000 Migration Server is running and listening on port 5010: netstat -tlnp | grep :5010

Check Version:

# Check version through Siemens SPPA-T3000 management interface or consult system documentation

Verify Fix Applied:

Verify patch installation through Siemens management interface and confirm no unauthorized file access attempts are successful

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns on MS3000 server
  • Connection attempts to port 5010 from unauthorized sources
  • File modification events in system directories

Network Indicators:

  • Unusual traffic patterns to port 5010/tcp
  • Crafted packets to port 5010
  • Multiple connection attempts to port 5010 from single sources

SIEM Query:

destination_port:5010 AND (protocol:TCP) AND (bytes_out > threshold OR bytes_in > threshold)

🔗 References

📤 Share & Export