Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Privilege Escalation Flaw Affects Several Siemens Products

Siemens has released updates and temporary fixes to address a medium-severity privilege escalation vulnerability affecting many of its industrial products.

Siemens has released updates and temporary fixes to address a medium-severity privilege escalation vulnerability affecting many of its industrial products.

Organizations have been warned that users with local access to the Windows operating system running on the same device as affected Siemens applications can escalate their privileges if certain conditions are met.

“Unquoted service paths could allow local Microsoft Windows operating system users to escalate their privileges if the affected products are not installed under their default path (“C:Program Files*” or the localized equivalent),” Siemens and ICS-CERT wrote in advisories published this week.

The vulnerability, tracked as CVE-2016-7165, cannot be exploited if the impacted product is installed in the default path or the localized equivalent.

The security hole affects several Siemens SCADA systems, distributed control systems (DCS), engineering tools, and simulators, including SIMATIC, SINEMA, TeleControl, SOFTNET, SIMIT, Security Configuration Tool (SCT) and Primary Setup Tool (PST) products.

The flaw, reported by Watersure and Kiandra IT, has been addressed in some of these products with software updates. For other products, until updates become available, the vendor recommends applying a temporary fix, following operational guidelines and restricting access to the file system.

High severity flaws in Phoenix Contact inline controllers

ICS-CERT also published an advisory this week to warn users about high severity flaws affecting inline controllers manufactured by Phoenix Contact, a Germany-based automation company.

Advertisement. Scroll to continue reading.

Matthias Niedermaier and Michael Kapfer of HSASec Hochschule Augsburg discovered that all ILC 1xx products are affected by three vulnerabilities. Remote attackers could exploit them to access passwords in clear text, bypass authentication, and read and write PLC variables without authentication.

The plaintext password storage issue has been patched with an update released by the vendor. For the other weaknesses, Phoenix Contact recommends the use of firewalls, restricting access to critical devices, updating the firmware, and following other best practices.

Related: Siemens Patches Flaws in SIMATIC, License Manager Products

Related: Siemens Patches Flaw in SCALANCE Products

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.