ICS/OT

ICS Patch Tuesday: Siemens Addresses 270 Vulnerabilities

February 2024 ICS Patch Tuesday: Siemens and Schneider Electric release a total of 18 new security advisories.

ICS Patch Tuesday

Industrial giants Siemens and Schneider Electric have published a total of 18 new security advisories for the February 2024 ICS Patch Tuesday.

Siemens

Siemens has published 15 new advisories that describe — based on SecurityWeek’s analysis — a whopping total of 270 unique vulnerabilities found in the company’s products. 

The advisory covering more than half of them describes vulnerabilities in Scalance XCM-/XRM-300 switches. The flaws impact third-party components and most of them were discovered in 2022 and 2023. A majority of these issues have severity ratings of ‘critical’ or ‘high’ and their exploitation can lead to arbitrary code execution, DoS attacks, or information disclosure.

A significant number of vulnerabilities, more than 60, has also been addressed in the Sinec industrial network management solution. These issues also mostly impact third-party components and they have severity ratings of ‘critical’ or ‘high’.

Several vulnerabilities, including critical issues, have been addressed in Scalance W1750D access points, which are a brand-labeled device from Aruba.

Critical vulnerabilities have also been addressed in Sidis Prime, Location Intelligence, and Scalance SC-600 products. High-severity issues have been resolved in Simatic CP 343-1, Parasolid, Polarion ALM, Simatic RTLS, Simcenter Femap, Unicam FX, and Tecnomatix Plant Simulation products.

Siemens has released updates that should patch most of these vulnerabilities, but the industrial giant does not plan on releasing fixes for some of the impacted products. 

Advertisement. Scroll to continue reading.

It’s also worth mentioning that Siemens has started adding CVSS 4.0 severity ratings to its advisories. 

The fact that Siemens addresses a significant number of vulnerabilities every month is more of a testament to the company’s investment in cybersecurity rather than an indication that its products are not secure, particularly considering that many flaws impact third-party products. 

Schneider Electric

Schneider Electric has published three new advisories describing a total of five vulnerabilities.

Three high-severity flaws have been found and patched in EcoStruxure Control Expert, EcoStruxure Process Expert, and Modicon M340, M580 and M580 safety PLCs. They can be exploited to gain unauthorized access to PLCs.

In its EcoStruxure IT Gateway, Schneider fixed a high-severity hardcoded credentials issue that could be exploited for local privilege escalation. 

In Harmony Relay NFC products, the company fixed an authentication bypass that could allow an attacker to tamper with a device’s configuration.

Related: ICS Patch Tuesday: Electromagnetic Fault Injection, Critical Redis Vulnerability

Related: Siemens, Schneider Electric Release First ICS Patch Tuesday Advisories of 2024

Related Content

ICS/OT

Several ICS vendors released advisories on Tuesday to inform customers about vulnerabilities found in their products. 

ICS/OT

Siemens and Schneider Electric release their ICS Patch Tuesday advisories for April 2024, informing customers about dozens of vulnerabilities.

ICS/OT

Siemens and Schneider Electric publish March 2024 Patch Tuesday advisories to inform customers about over 200 vulnerabilities.

ICS/OT

Industrial giants Siemens and Schneider Electric publish a total of 7 new security advisories addressing 22 vulnerabilities. 

ICS/OT

ICS Patch Tuesday: Siemens and Schneider Electric address dozens of vulnerabilities affecting their industrial products.

ICS/OT

Siemens and Schneider Electric’s Patch Tuesday advisories for November 2023 address 90 vulnerabilities affecting their products. 

ICS/OT

ICS Patch Tuesday: Siemens and Schneider Electric release over a dozen advisories addressing more than 40 vulnerabilities.

ICS/OT

ICS Patch Tuesday: Siemens has released 7 new advisories and Schneider Electric has released 1 new advisory.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version