The first round of security advisories released by Siemens and Schneider Electric in 2022 address a total of 40 vulnerabilities.
Siemens
Siemens has released five advisories addressing a total of 14 vulnerabilities. Based on the CVSS score, the most important advisory describes two flaws affecting SICAM A8000 devices.
One of the flaws, rated critical, is related to an undocumented debug port that uses hardcoded default credentials, enabling an attacker to access an administrative debug shell on the device. The second issue has been classified as medium severity and it allows an unauthenticated attacker to access log files and diagnostic data.
Another advisory from Siemens describes two high-severity and two medium-severity issues affecting the COMOS plant engineering software. An attacker can exploit the flaws for arbitrary code or command execution.
Siemens has also released another advisory related to the Nucleus RTOS vulnerabilities tracked as NUCLEUS:13. Specifically, the advisory addresses the impact of these flaws on PLUSCONTROL devices.
The remaining advisories describe a medium-severity information disclosure issue in SIPROTEC 5 products, and a low-severity bug that can be leveraged to achieve persistence or a DoS condition in the SICAM PQ Analyzer.
Siemens has released patches and/or mitigations for all of these security holes.
Schneider Electric
Schneider Electric has released seven advisories addressing 26 vulnerabilities.
One advisory describes two high-severity vulnerabilities in Easergy P5 medium-voltage protection relays. The flaws could allow an attacker to disrupt or take full control of a device, which could “result in loss of protection to your electrical network,” Schneider warned.
A separate advisory describes a vulnerability that has a similar impact on Easergy P3 relays.
Another advisory addresses two high- and two medium-severity issues in the EcoStruxure Power Monitoring Expert product. The flaws can be exploited to obtain information or to disrupt systems.
Schneider has also informed customers about six high- and medium-severity vulnerabilities affecting ConneXium Tofino firewall products. Exploitation of these weaknesses can lead to service interruption or configuration changes to allow malicious network traffic.
The other advisories describe 10 vulnerabilities that exist in third-party components from Codesys, DoS and CSRF flaws in Modicon M340 controllers, and a weakness in the Easergy T300 RTU that could lead to code execution or a DoS condition.
Schneider has also released patches and/or mitigations for the vulnerabilities found in its products.
Related: ICS Vendors Respond to Log4j Vulnerabilities
Related: ICS Patch Tuesday: Siemens and Schneider Electric Address 100 Vulnerabilities

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
Latest News
- Backslash Snags $8M Seed Financing for AppSec Tech
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- Chrome 111 Update Patches High-Severity Vulnerabilities
- BreachForums Shut Down Over Law Enforcement Takeover Concerns
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Malware Trends: What’s Old Is Still New
- Burnout in Cybersecurity – Can It Be Prevented?
