Industrial giants Siemens and Schneider Electric have published a total of 18 new security advisories for the February 2024 ICS Patch Tuesday.
Siemens has published 15 new advisories that describe — based on SecurityWeek’s analysis — a whopping total of 270 unique vulnerabilities found in the company’s products.
The advisory covering more than half of them describes vulnerabilities in Scalance XCM-/XRM-300 switches. The flaws impact third-party components and most of them were discovered in 2022 and 2023. A majority of these issues have severity ratings of ‘critical’ or ‘high’ and their exploitation can lead to arbitrary code execution, DoS attacks, or information disclosure.
A significant number of vulnerabilities, more than 60, has also been addressed in the Sinec industrial network management solution. These issues also mostly impact third-party components and they have severity ratings of ‘critical’ or ‘high’.
Several vulnerabilities, including critical issues, have been addressed in Scalance W1750D access points, which are a brand-labeled device from Aruba.
Critical vulnerabilities have also been addressed in Sidis Prime, Location Intelligence, and Scalance SC-600 products. High-severity issues have been resolved in Simatic CP 343-1, Parasolid, Polarion ALM, Simatic RTLS, Simcenter Femap, Unicam FX, and Tecnomatix Plant Simulation products.
Siemens has released updates that should patch most of these vulnerabilities, but the industrial giant does not plan on releasing fixes for some of the impacted products.
It’s also worth mentioning that Siemens has started adding CVSS 4.0 severity ratings to its advisories.
The fact that Siemens addresses a significant number of vulnerabilities every month is more of a testament to the company’s investment in cybersecurity rather than an indication that its products are not secure, particularly considering that many flaws impact third-party products.
Schneider Electric has published three new advisories describing a total of five vulnerabilities.
Three high-severity flaws have been found and patched in EcoStruxure Control Expert, EcoStruxure Process Expert, and Modicon M340, M580 and M580 safety PLCs. They can be exploited to gain unauthorized access to PLCs.
In its EcoStruxure IT Gateway, Schneider fixed a high-severity hardcoded credentials issue that could be exploited for local privilege escalation.
In Harmony Relay NFC products, the company fixed an authentication bypass that could allow an attacker to tamper with a device’s configuration.