CVE-2020-15798
📋 TL;DR
This vulnerability allows remote attackers to gain full administrative access to affected Siemens industrial control devices without authentication when the telnet service is enabled. It affects multiple SIMATIC HMI panels and SINAMICS drive controllers. Attackers can completely compromise these industrial devices.
💻 Affected Systems
- SIMATIC HMI Comfort Panels
- SIMATIC HMI KTP Mobile Panels
- SINAMICS GH150
- SINAMICS GL150 (with option X30)
- SINAMICS GM150 (with option X30)
- SINAMICS SH150
- SINAMICS SL150
- SINAMICS SM120
- SINAMICS SM150
- SINAMICS SM150i
📦 What is this software?
Simatic Hmi Comfort Panels Firmware by Siemens
View all CVEs affecting Simatic Hmi Comfort Panels Firmware →
Simatic Hmi Comfort Panels Firmware by Siemens
View all CVEs affecting Simatic Hmi Comfort Panels Firmware →
Simatic Hmi Comfort Panels Firmware by Siemens
View all CVEs affecting Simatic Hmi Comfort Panels Firmware →
Simatic Hmi Comfort Panels Firmware by Siemens
View all CVEs affecting Simatic Hmi Comfort Panels Firmware →
Simatic Hmi Comfort Panels Firmware by Siemens
View all CVEs affecting Simatic Hmi Comfort Panels Firmware →
Simatic Hmi Ktp Mobile Panels Firmware by Siemens
View all CVEs affecting Simatic Hmi Ktp Mobile Panels Firmware →
Simatic Hmi Ktp Mobile Panels Firmware by Siemens
View all CVEs affecting Simatic Hmi Ktp Mobile Panels Firmware →
Simatic Hmi Ktp Mobile Panels Firmware by Siemens
View all CVEs affecting Simatic Hmi Ktp Mobile Panels Firmware →
Simatic Hmi Ktp Mobile Panels Firmware by Siemens
View all CVEs affecting Simatic Hmi Ktp Mobile Panels Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete device takeover allowing attackers to modify configurations, disrupt industrial processes, install malware, or use devices as footholds into industrial networks.
Likely Case
Unauthorized access leading to configuration changes, data theft, or disruption of industrial operations.
If Mitigated
Limited impact if telnet is disabled and devices are properly segmented with network controls.
🎯 Exploit Status
Simple telnet connection without credentials provides full access. No special tools or techniques required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V16 Update 3a for HMI panels; SINAMICS devices require configuration changes
Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-520004.pdf
Restart Required: Yes
Instructions:
1. For HMI panels: Update to V16 Update 3a or later. 2. For SINAMICS devices: Disable telnet service via configuration. 3. Apply patches during maintenance windows. 4. Verify service is disabled after patching.
🔧 Temporary Workarounds
Disable Telnet Service
allDisable the telnet service on affected devices to prevent unauthenticated access.
Configuration via device web interface or engineering software (TIA Portal)
Network Segmentation
allIsolate affected devices in separate VLANs with strict firewall rules blocking telnet (port 23).
Firewall rule: deny tcp any any eq 23
🧯 If You Can't Patch
- Disable telnet service immediately via device configuration
- Implement strict network segmentation with firewall rules blocking port 23/tcp
- Monitor network traffic for telnet connections to affected devices
- Consider physical isolation of critical devices
🔍 How to Verify
Check if Vulnerable:
Attempt telnet connection to device port 23 without credentials. If connection succeeds and provides shell access, device is vulnerable.
Check Version:
Check via device web interface or TIA Portal engineering software
Verify Fix Applied:
1. Check device version is V16 Update 3a or later for HMI panels. 2. Verify telnet service is disabled via device configuration. 3. Attempt telnet connection - should fail or require authentication.
📡 Detection & Monitoring
Log Indicators:
- Successful telnet connections without authentication
- Configuration changes from unknown sources
- Unusual process execution
Network Indicators:
- Telnet traffic (port 23) to industrial devices
- Unusual outbound connections from industrial devices
SIEM Query:
source_port=23 OR destination_port=23 AND (device_type="industrial" OR device_vendor="siemens")
🔗 References
- https://cert-portal.siemens.com/productcert/pdf/ssa-520004.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-752103.pdf
- https://us-cert.cisa.gov/ics/advisories/icsa-21-033-02
- https://cert-portal.siemens.com/productcert/pdf/ssa-520004.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-752103.pdf
- https://us-cert.cisa.gov/ics/advisories/icsa-21-033-02