Serious Flaws in WibuKey DRM Impact Siemens Products
Siemens has informed customers that some of its products are affected by recently disclosed vulnerabilities affecting the WibuKey digital rights management (DRM) solution from Wibu Systems.
Cisco Talos revealed in December that the WibuKey DRM has three vulnerabilities that can lead to information disclosure, privilege escalation, and remote code execution. Cisco noted at the time that WibuKey is used by many applications, including the V-Ray image rendering software, the ArchiCAD architectural design software, and the Straton industrial automation software.
It turns out that Siemens also uses WibuKey for some of its products, including SICAM 230, a process control and monitoring system designed for the energy sector, and the SIMATIC WinCC Open Architecture (OA) human-machine interface (HMI) product.
The most serious of the WibuKey flaws is CVE-2018-3991, a critical heap overflow that can be exploited by a remote attacker for arbitrary code execution by sending specially crafted TCP packets to the targeted system on port 22347.
Another critical vulnerability is CVE-2018-3990, a pool corruption that can be exploited to escalate privileges by sending specially crafted I/O request packets (IRPs).
The last vulnerability is CVE-2018-3989, which can also be exploited via specially crafted IRP requests. This security hole can allow an attacker to read kernel memory information and it has been assigned a severity rating of “medium.”
Siemens has advised customers to update the WibuKey DRM to version 6.50 or higher, which should patch the vulnerabilities. The German industrial giant also recommends blocking port 22347 via a firewall to prevent exploitation of CVE-2018-3991.
Cisco has published technical information for each of the vulnerabilities, along with proof-of-concept (PoC) exploits, which increases the chances of exploitation.