Home

Awesome

Siemens Simatic PCS 7 Hardening Tool

Version 1.0

Overview

Powershell script for assessing the security configurations of Siemens - SIMATIC PCS 7 OS client, OS Server or Engineering station

Dependencies

None! The script is Powershell 2.0 compatible. Powershell >=2.0 is pre-installed on every Windows since Windows 7 and Windows Server 2008R2.
The tool was tested on:

Usage

Run the script as an administrator.

Demo

Description

Collects data from the following sources:

Analyzes the collected data according to OTORIO's profound research on Simatic PCS 7 security and hardening. The research is based on

You should consult these documents in order to resolve the alerts which the tool notifies on.

Insights

#InsightData sourceDetails
1GPO is not strict enoughRSoPSee table below
2Some folders are shared with everyoneWMIPermissive sharing rights put your factory at risk. See Otorio's research https://www.otorio.com/blog/two-critical-configuration-issues-discovered-in-siemens-dcs-system/
3Password minimum lengthSecurity PolicyThe password length should be at least 14 characters
4Password complexitySecurity PolicyPassword complexity policy should be enforced
5Password cleartextSecurity PolicyForbid storing windows passwords as cleartext
6Encrypted communication between OS systems is not enabledRegistryIf you enable this policy, only systems with the same Pre Shared Key(PSK) can communicate with each other via PCS 7 mechanisms
7WinCC running with an administrator accountWMIAdministrative rights are not needed for operation of PCS 7 .
8Unnecessary services are runningPowershell commandThese services are unnecessary for the operation of the system and therefore should be disabled
9Server header is not disabledRegistryThis header specifies the web server version. This is a piece of information which attackers look for in the reconnaissance phase, and therefore the server shouldn't send it when replying
10httpOnlyCookies is not enabledweb.configEnabling this header makes cookies inaccessible to the JavaScript Document.cookie API, which prevents sending them using XSS attack
11customErrors is not enabledweb.configWhen this header is enabled, detailed errors are shown only to local users. Remote users are redirected to a custom error page
12X-Frame-Options header is not enabledweb.configWhen enabled, this header provides clickjacking protection by not allowing rendering of a page in a frame
13X-XSS-Protection header is not enabledweb.configWhen this header is enabled, pages aren't loaded when they detect reflected cross-site scripting (XSS) attacks.
14Content Security Policy header is not enabledweb.configThe HTTP Content-Security-Policy response header helps guard against XSS attacks
15X-Powered-By header is enabledweb.configIndicates that the website is "powered by ASP.NET."

Group policies for Insight #1

#PolicyRecommended state
1Turn off Application TelemetryEnabled
2Turn off Inventory CollectorEnabled
3Do not syncEnabled
4Do not sync app settingsEnabled
5Do not sync passwordEnabled
6Do not sync personalizeEnabled
7Do not sync AppsEnabled
8Do not sync other Windows settingsEnabled
9Do not sync desktop personalizationEnabled
10Do not sync browser settingsEnabled
11Do not sync on metered connectionsEnabled
12Do not sync start settingsEnabled
13Turn off Automatic Root Certificates UpdateEnabled
14Turn off printing over HTTPEnabled
15Turn off downloading of print drivers over HTTPEnabled
16Turn off Windows Update device driver searchingEnabled
17Turn off Windows Error ReportingEnabled
18Turn off access to the StoreEnabled
19Turn off the Windows Messenger Customer Experience Improvement ProgramEnabled
20Prevent the usage of OneDrive for file storageEnabled
21Turn off locationEnabled
22Turn off Windows Location ProviderEnabled
23Turn off downloading of game informationEnabled
24Turn off game updatesEnabled
25Allow CortanaDisabled
26Allow search and Cortana to use locationDisabled
27Do not allow Web searchEnabled
28Do not search the Web or display Web results in SearchEnabled
29Allow indexing of encrypted filesDisabled
30Allow TelemetryEnabled - Enterprise Only
31Turn off AutoplayEnabled on all drives

Authors

Amit Porat, Roman Dvorkin, Yuval Ardon, Uri Sade from OTORIO's Research Team.

For any questions/suggestions feel free to contact us at matan.dobr@otorio.com