The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

PLC web server access using repeater

Chandra | Last updated: Apr 12, 2022 04:29PM UTC

Dear all, In our research lab, we have Siemens PLC S7-1200.Recently there is security vulnerability on this PLC device if firmware is 4.5 or below. As mentioned here https://packetstormsecurity.com/files/166255/Siemens-S7-1200-4.5-Unauthenticated-Access.html In fact, i can capture the STOP/RUN request on Burp suite and send to Repeater.Then use the send via CURL command. So, i can send the Stop/ Run command and the Unauthenticated Access hack works. Now my question is , what is the mitigation for this vulnerability? The PLC web server uses HTTP 1.1 / TLS 1.2. It uses HTTPS. When access the Web server by IP by HTTPS, very first, the Chrome browser warns some certificate issue. So, if understand correctly, the web server vulnerable because it uses HTTP 1.1 ?

andre | Last updated: Oct 17, 2022 01:14PM UTC