Industrial giants Siemens and Schneider Electric have addressed over 140 vulnerabilities with their December 2022 Patch Tuesday updates.
As usual, Siemens released far more advisories and addressed far more vulnerabilities. Specifically, the company released 20 new advisories addressing roughly 140 security holes.
One of the advisories informs customers about patches for more than 80 OpenSSL and OpenSSH vulnerabilities affecting its Scalance X-200RNA switches. The CVEs mentioned in the advisory range between 2003 and 2019. This is the only advisory with an overall severity rating of ‘critical’.
The same switches are also affected by six medium- and high-severity vulnerabilities that can be exploited for cross-site scripting (XSS) attacks, denial-of-service (DoS) attacks, and session hijacking.
In addition, Siemens informed customers that some of its products are impacted by two recently patched OpenSSL vulnerabilities tracked as CVE-2022-3602 and CVE-2022-3786. CVE-2022-3602 was initially classified as ‘critical’, but it was later downgraded to ‘high’.
The company has also notified organizations using its products about high-severity issues in Sicam PAS, Apogee/Talon, Mendix, Teamcenter Visualization, JT2Go, Scalance, Simatic, Parasolid, Ruggedcom, and Simcenter STAR-CCM+ products.
Exploitation of the vulnerabilities can lead to remote code execution, privilege escalation, DoS attacks, information disclosure, and information manipulation.
Medium-severity vulnerabilities have been found in Siemens’ PLM Help Server (no longer supported), Apogee/Talon field panels, Simatic WinCC OA, Siprotec 5 devices, and the Polarion application lifecycle management solution.
These medium-severity flaws can be exploited for XSS attacks, DoS attacks and command injection.
Siemens has released patches for some of the impacted products, but for many of them fixes will be released in the future. In the meantime, mitigations and workarounds have been made available.
Schneider Electric has only released three new advisories covering six vulnerabilities.
Based on CVSS scores, the most important advisory covers four critical and high-severity flaws affecting APC Easy UPS online monitoring software. Exploitation can lead to remote code execution, privilege escalation or authentication bypass.
The second advisory describes a high-severity improper authorization vulnerability whose exploitation could lead to unauthorized access and information disclosure.
The last advisory describes a medium-severity DoS issue affecting the Saitel DR remote terminal unit (RTU).
Schneider has released software and firmware updates that should patch these vulnerabilities.
Related: ICS Patch Tuesday: Siemens, Schneider Electric Release 19 New Security Advisories
Related: ICS Patch Tuesday: Siemens Addresses Critical Vulnerabilities