Siemens and Schneider Electric’s Patch Tuesday advisories for September 2023 have been published.
Siemens
Siemens has published seven new advisories covering a total of 45 vulnerabilities affecting the company’s industrial products.
One of the advisories describes CVE-2023-3935, a critical vulnerability affecting Wibu Systems’ CodeMeter software licensing and protection technology, which is used by several Siemens products, including PSS, SIMATIC, SIMIT, SINEC and SINEMA.
The flaw can be exploited by a remote, unauthenticated attacker for arbitrary code execution if the CodeMeter Runtime is configured as a server. If CodeMeter Runtime is configured as a client, the bug can allow an authenticated local attacker to escalate privileges to root.
QMS Automotive is affected by 10 medium- and high-severity vulnerabilities, including ones that allow session hijacking, malicious file uploads, information exposure, DoS attacks, and arbitrary code execution.
The RUGGEDCOM APE1808 product family is affected by nearly two dozen medium- and high-severity vulnerabilities affecting the BIOS provided by Insyde.
Parasolid, Teamcenter Visualization, and JT2Go are affected by remote code execution vulnerabilities that can be exploited using specially crafted files.
Many SIMATIC and SIPLUS products are impacted by an ANSI C OPC UA SDK vulnerability that could allow an unauthenticated, remote attacker to cause a DoS condition using a specially crafted certificate.
Siemens has also informed customers about the impact of the Intel CPU vulnerability named Downfall. The company is working on fixes for affected SIMATIC industrial PCs.
Schneider Electric
Schneider Electric has only released one new advisory, to inform customers about a high-severity vulnerability patched in its IGSS (Interactive Graphical SCADA System) product.
The flaw, which the company describes as a missing authentication issue, could “allow a local attacker to change update source, potentially leading to remote code execution when the attacker forces an update containing malicious content”.
Related: ICS Patch Tuesday: Siemens Fixes 7 Vulnerabilities in Ruggedcom Products
Related: ICS Patch Tuesday: Siemens, Schneider Electric Fix 50 Vulnerabilities
Related: ICS Patch Tuesday: Siemens Addresses Over 180 Third-Party Component Vulnerabilities

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- China’s Offensive Cyber Operations in Africa Support Soft Power Efforts
- SANS Survey Shows Drop in 2023 ICS/OT Security Budgets
- Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones
- Cisco to Acquire Splunk for $28 Billion
- Car Cybersecurity Study Shows Drop in Critical Vulnerabilities Over Past Decade
- Omron Patches PLC, Engineering Software Flaws Discovered During ICS Malware Analysis
- Intel Launches New Attestation Service as Part of Trust Authority Portfolio
- Atos Unify Vulnerabilities Could Allow Hackers to Backdoor Systems
Latest News
- In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking
- China’s Offensive Cyber Operations in Africa Support Soft Power Efforts
- Air Canada Says Employee Information Accessed in Cyberattack
- BIND Updates Patch Two High-Severity DoS Vulnerabilities
- Faster Patching Pace Validates CISA’s KEV Catalog Initiative
- SANS Survey Shows Drop in 2023 ICS/OT Security Budgets
- Apple Patches 3 Zero-Days Likely Exploited by Spyware Vendor to Hack iPhones
- New ‘Sandman’ APT Group Hitting Telcos With Rare LuaJIT Malware
