Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

ICS Patch Tuesday: Critical CodeMeter Vulnerability Impacts Several Siemens Products

ICS Patch Tuesday: Siemens has released 7 new advisories and Schneider Electric has released 1 new advisory.

ICS Patch Tuesday

Siemens and Schneider Electric’s Patch Tuesday advisories for September 2023 have been published. 

Siemens 

Siemens has published seven new advisories covering a total of 45 vulnerabilities affecting the company’s industrial products. 

One of the advisories describes CVE-2023-3935, a critical vulnerability affecting Wibu Systems’ CodeMeter software licensing and protection technology, which is used by several Siemens products, including PSS, SIMATIC, SIMIT, SINEC and SINEMA. 

The flaw can be exploited by a remote, unauthenticated attacker for arbitrary code execution if the CodeMeter Runtime is configured as a server. If CodeMeter Runtime is configured as a client, the bug can allow an authenticated local attacker to escalate privileges to root. 

QMS Automotive is affected by 10 medium- and high-severity vulnerabilities, including ones that allow session hijacking, malicious file uploads, information exposure, DoS attacks, and arbitrary code execution.

Advertisement. Scroll to continue reading.

The RUGGEDCOM APE1808 product family is affected by nearly two dozen medium- and high-severity vulnerabilities affecting the BIOS provided by Insyde. 

Parasolid, Teamcenter Visualization, and JT2Go are affected by remote code execution vulnerabilities that can be exploited using specially crafted files. 

Many SIMATIC and SIPLUS products are impacted by an ANSI C OPC UA SDK vulnerability that could allow an unauthenticated, remote attacker to cause a DoS condition using a specially crafted certificate. 

Siemens has also informed customers about the impact of the Intel CPU vulnerability named Downfall. The company is working on fixes for affected SIMATIC industrial PCs.   

Schneider Electric

Schneider Electric has only released one new advisory, to inform customers about a high-severity vulnerability patched in its IGSS (Interactive Graphical SCADA System) product.

The flaw, which the company describes as a missing authentication issue, could “allow a local attacker to change update source, potentially leading to remote code execution when the attacker forces an update containing malicious content”.

Related: ICS Patch Tuesday: Siemens Fixes 7 Vulnerabilities in Ruggedcom Products

Related: ICS Patch Tuesday: Siemens, Schneider Electric Fix 50 Vulnerabilities

Related: ICS Patch Tuesday: Siemens Addresses Over 180 Third-Party Component Vulnerabilities

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.