Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

ICS Patch Tuesday: Siemens Addresses Palo Alto Networks Product Vulnerabilities

Siemens and Schneider Electric release their ICS Patch Tuesday advisories for April 2024, informing customers about dozens of vulnerabilities.

ICS Patch Tuesday

Industrial giants Siemens and Schneider Electric have published their Patch Tuesday advisories for April 2024, informing customers about the vulnerabilities found in their ICS products over the past month.

Siemens published eight new advisories covering a total of roughly 80 vulnerabilities. One advisory covers nearly 50 flaws found in the company’s Telecontrol Server Basic product, particularly in third-party components.

The company also announced patches for three critical arbitrary code execution vulnerabilities in Scalance W1750D access points, which are rebranded Aruba devices. 

Two advisories cover vulnerabilities introduced by the use of Palo Alto Networks virtual next-generation firewalls. The flaws impact Siemens’ Ruggedcom APE1808 industrial application hosting platform, which enables organizations to deploy commercially available applications for edge computing and cybersecurity in harsh environments. 

One of these advisories focuses on an attack named Terrapin, which allows an attacker who can intercept SSH traffic on Palo Alto Networks products to downgrade connection security.

The second advisory covers six vulnerabilities discovered in Palo Alto Networks’ PAN-OS software in 2022 and 2023, including a flaw that was exploited for DDoS attacks in 2022. 

Advertisement. Scroll to continue reading.

Ruggedcom APE1808 also uses technology from Fortinet and Nozomi Networks, and Siemens previously informed customers about vulnerabilities in the products of these vendors. 

Siemens has also informed customers about vulnerabilities in Simatic S7-100 (Linux component issues), Sinec NMS, Parasolid, and Simatic WinCC products.

The company has started releasing patches for these vulnerabilities, but only mitigations are currently available for some of them.

It’s worth noting that while Siemens typically addresses a higher number of vulnerabilities each month compared to other vendors, this is an indication of the effort the company puts into securing its products rather than evidence that its products are more vulnerable.

Schneider Electric has published one new advisory this month, informing customers of a high-severity privilege escalation vulnerability affecting its Easergy Studio product. 

Related: UK Government Releases Cloud SCADA Security Guidance

Related: 1 in 4 Organizations Shut Down OT Operations Due to Cyberattacks: Survey

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.