ICS/OT

ICS Patch Tuesday: Electromagnetic Fault Injection, Critical Redis Vulnerability

ICS Patch Tuesday: Siemens and Schneider Electric address dozens of vulnerabilities affecting their industrial products.

ICS Patch Tuesday

Siemens and Schneider Electric have published their Patch Tuesday advisories for December 2023, addressing dozens of vulnerabilities affecting their products.

Siemens

Siemens has published 12 advisories that cover more than 30 vulnerabilities. In addition, the industrial giant has published an advisory describing 430 GNU/Linux subsystem vulnerabilities affecting its Simatic S7-1500 CPU. These flaws have CVEs ranging between 2013 and 2023 and severity ratings from ‘low’ to ‘critical’. The company said it’s preparing patches.

Another noteworthy advisory describes a high-severity vulnerability affecting LOGO! V8.3 BM controllers. The flaw, reported by Sebastien Leger and tracked as CVE-2022-42784, can be exploited for electromagnetic fault injection. 

“This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed by the LOGO! V8.3 Product CA,” Siemens explained. 

The vendor has released new LOGO! hardware versions to address the issue and is working on new Siplus devices that should not be vulnerable to attacks. 

In addition, Siemens has informed customers about the existence of critical and/or high-severity flaws in products such as Sinec INS, Scalance M-800/S615, Sinumerik ONE and MC, Simatic S7-1500, Sinamics S210 and S120, and User Management Component (UMC).

In most cases exploitation of the vulnerabilities can lead to a denial-of-service (DoS) condition, but some of the flaws can allow arbitrary code execution. 

Advertisement. Scroll to continue reading.

Medium-severity issues have been addressed in Simatic Step 7 and Sicam Q100 products. 

Some of these vulnerabilities have been patched and some will be fixed in the future, but Siemens does not plan on releasing patches for some of the impacted products. 

Siemens has also provided clarifications on a recent talk at Black Hat Europe. Researchers analyzed the security of a Siemens communication protocol a decade after the infamous Stuxnet attack. The vendor pointed out that no new vulnerabilities were disclosed and that newer versions of the protocol address the highlighted issues. 

Schneider Electric

Schneider Electric has released three new advisories describing a total of four vulnerabilities. 

The most serious of them — based on their CVSS score — is a critical flaw in the Redis database, which is used in the company’s Plant iT/Brewmaxx process control system. The vulnerability, disclosed last year and tracked as CVE-2022-0543, can lead to a sandbox escape and remote code execution. 

The industrial giant has also patched a high-severity open redirect vulnerability that can be exploited for phishing attacks in its Trio licensed and license-free data radio products. In addition, a medium-severity issue affecting these products can be exploited by a privileged attacker to install malicious firmware.

The third advisory describes a medium-severity path traversal vulnerability in Easy UPS Online Monitoring Software that can be exploited by a local attacker to delete arbitrary files when the service is restarted.

Related: ICS Patch Tuesday: 90 Vulnerabilities Addressed by Siemens and Schneider Electric

Related: ICS Patch Tuesday: Siemens Ruggedcom Devices Affected by Nozomi Component Flaws

Related Content

ICS/OT

Several ICS vendors released advisories on Tuesday to inform customers about vulnerabilities found in their products. 

ICS/OT

Government agencies are sharing recommendations following attacks claimed by pro-Russian hacktivists on ICS/OT systems.

ICS/OT

An analysis conducted by Honeywell shows that much of the USB-borne malware targeting industrial organizations can still cause OT disruption.

ICS/OT

Palo Alto Networks firewall vulnerability CVE-2024-3400, exploited as a zero-day, impacts a Siemens industrial product.

Nation-State

Mandiant summarizes some of the latest operations of Russia’s notorious Sandworm group, which it now tracks as APT44.

ICS/OT

Siemens and Schneider Electric release their ICS Patch Tuesday advisories for April 2024, informing customers about dozens of vulnerabilities.

ICS/OT

In the past week Rockwell Automation addressed 10 vulnerabilities found in its FactoryTalk, PowerFlex and Arena Simulation products.

Malware & Threats

A suspicious NuGet package likely targets developers working with technology from Chinese firm Bozhon.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version