Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Uncategorized

ICS Patch Tuesday: Siemens Addresses Over 180 Third-Party Component Vulnerabilities

ICS Patch Tuesday: Siemens and Schneider Electric have published more than a dozen advisories addressing over 200 vulnerabilities.

Siemens and Schneider Electric on Tuesday released a total of 16 advisories addressing well over 200 vulnerabilities affecting their industrial products.

Siemens

Siemens has released a dozen new advisories covering a total of roughly 200 vulnerabilities. A vast majority of these flaws impact third party components.

The industrial giant has informed customers about 108 Linux kernel vulnerabilities affecting Simatic S7-1500, specifically the TM multifunctional platform (MFP). The company is preparing patches for the flaws and in the meantime it has provided workarounds and mitigations. 

Siemens has also notified customers about 54 vulnerabilities found in the BIOS of the same product. The security holes impact various third-party components, including the Linux kernel, libraries, BusyBox, and Intel processors. Patches are being prepared for these vulnerabilities as well.

A separate advisory describes nearly two dozen bugs in Sinamics medium voltage products. The issues impact third-party components and fixes have been released.

In addition, Siemens has resolved critical remote code execution vulnerabilities in the Simatic Step 7 product and Sicam Q200 devices. 

A few high-severity flaws have been patched by the company in Solid Edge, Simatic WinCC, Teamcenter Visualization and JT2Go, and Sicam A8000 products. The security holes can lead to arbitrary code execution, DoS attacks, privilege escalation, and unauthorized access.

Advertisement. Scroll to continue reading.

Siemens has also informed customers about medium-severity flaws in TIA Portal (project file encryption issue), Simotion (configuration data exposure), and Simatic WinCC (authentication and encryption issues). 

Schneider Electric

Schneider Electric has released four new advisories covering a total of five vulnerabilities. 

One of the advisories informs customers about two high-severity flaws affecting its Foxboro distributed control system (DCS). An attacker can exploit them for DoS attacks, privilege escalation, and kernel code execution. 

In addition, the Foxboro SCADA product is affected by a flaw that exposes cleartext credentials. The issue exists in the Aveva InTouch component, where it was originally patched back in 2021. 

Schneider has also warned organizations that attackers could achieve arbitrary code execution by exploiting vulnerabilities in its EcoStruxure Operator Terminal Expert, Pro-face BLUEm and the IGSS (Interactive Graphical SCADA System) products. Exploitation involves tricking the targeted user into opening a specially crafted project file. 

Learn More at SecurityWeek’s ICS Cyber Security Conference
The leading global conference series for Operations, Control Systems and OT/IT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.
ICS Cybersecurity Conference
October 23-26, 2023 | Atlanta
www.icscybersecurityconference.com

Related: ICS Patch Tuesday: Siemens, Schneider Electric Address Few Dozen Vulnerabilities

Related: Critical Siemens RTU Vulnerability Could Allow Hackers to Destabilize Power Grid

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Management & Strategy

Anna Tutt, CMO of Oort, shares her experiences and perspectives on how we can accelerate growth of women in cybersecurity.

CISO Conversations

SecurityWeek talks to legal sector CISOs Alyssa Miller at Epiq and Mark Walmsley at Freshfields Bruckhaus Deringer

Ransomware

A new CISA pilot program to warn critical infrastructure organizations if their systems are unpatched against vulnerabilities exploited in ransomware attacks.

Cyberwarfare

The UK’s NCSC has issued a security advisory to warn about spearphishing campaigns conducted by two unrelated Russian and Iranian hacker groups.

Cybersecurity Funding

Silk Security raised $12.5 million in seed funding and is on a mission to break down the silos between security and development with an...

Uncategorized

Exploitation of a critical vulnerability (CVE-2023-46747) in F5’s  BIG-IP product started less than five days after public disclosure and PoC exploit code was published.

Cybersecurity Funding

B2B payment security provider NsKnox raised $17 million in a new funding round that brings the total raised by the company to $35.6 million.

Application Security

NSA has published guidance to help organizations incorporate SBOM to mitigate supply chain risks.