CVE-2020-7591
📋 TL;DR
This vulnerability in Siemens SIPORT MP allows authenticated attackers to impersonate other users and perform actions on their behalf when the 'Allow logon without password' single sign-on feature is enabled. This affects all SIPORT MP versions before 3.2.1, potentially enabling privilege escalation and unauthorized administrative actions.
💻 Affected Systems
- Siemens SIPORT MP
📦 What is this software?
Siport Mp by Siemens
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker could impersonate administrators, gain full system control, modify configurations, access sensitive data, and potentially disrupt industrial operations.
Likely Case
Authenticated users could impersonate other users to access unauthorized data, modify permissions, or perform actions beyond their normal privileges.
If Mitigated
With the single sign-on feature disabled, the vulnerability cannot be exploited, maintaining normal authentication controls.
🎯 Exploit Status
Requires authenticated access and the vulnerable feature enabled. No public exploit code known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.2.1
Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-384879.pdf
Restart Required: Yes
Instructions:
1. Download SIPORT MP version 3.2.1 or later from Siemens support portal. 2. Backup current configuration. 3. Install the update following Siemens documentation. 4. Restart the system. 5. Verify version and functionality.
🔧 Temporary Workarounds
Disable Single Sign-On Feature
allDisable the 'Allow logon without password' feature to prevent exploitation.
Access SIPORT MP web interface > Configuration > Security Settings > Disable 'Allow logon without password'
🧯 If You Can't Patch
- Disable the 'Allow logon without password' feature immediately
- Implement network segmentation to restrict access to SIPORT MP systems
- Monitor authentication logs for unusual impersonation attempts
- Review and limit user privileges to minimum necessary
🔍 How to Verify
Check if Vulnerable:
Check SIPORT MP version via web interface or CLI. If version < 3.2.1 AND 'Allow logon without password' is enabled, system is vulnerable.
Check Version:
Access SIPORT MP web interface > System Information or use device-specific CLI commands
Verify Fix Applied:
Verify version is 3.2.1 or higher via system interface and confirm 'Allow logon without password' feature status.
📡 Detection & Monitoring
Log Indicators:
- Multiple user sessions from same source
- Unusual privilege escalation events
- Authentication events without password verification when SSO enabled
Network Indicators:
- Unusual authentication patterns to SIPORT MP interface
- Multiple user impersonation attempts
SIEM Query:
source="siemens-siport" AND (event_type="authentication" AND user_impersonation=true) OR (feature="allow_logon_without_password" AND enabled=true)