ICS/OT

ICS Patch Tuesday: Siemens, Schneider Electric Address 43 Vulnerabilities

The 15 new advisories released by Siemens and Schneider Electric this Patch Tuesday address a total of 43 vulnerabilities, including ones that have been assigned a “critical” severity rating.

<p><strong><span><span>The 15 new advisories released by Siemens and Schneider Electric this Patch Tuesday address a total of 43 vulnerabilities, including ones that have been assigned a “critical” severity rating.</span></span></strong></p>

The 15 new advisories released by Siemens and Schneider Electric this Patch Tuesday address a total of 43 vulnerabilities, including ones that have been assigned a “critical” severity rating.

Siemens has released 12 advisories covering 35 vulnerabilities. Based on CVSS scores, the most important advisory covers 11 flaws affecting the web server of SICAM P850 and P855 devices.

One of these bugs is critical and it allows an unauthenticated attacker to execute arbitrary code or launch a denial-of-service (DoS) attack. The five high-severity vulnerabilities covered by the advisory can lead to DoS attacks, code execution, traffic capturing and interfering with device functionality, cross-site scripting (XSS) attacks, or access to a device’s management interface.

Critical and high-severity vulnerabilities have also been found in Desigo PXC3, PXC4, PXC5 and DXR2 devices. These flaws can be exploited for arbitrary code execution, and password spraying or credential stuffing attacks.

High-severity code execution issues have been identified in Simcenter Femap, JT2Go and Teamcenter Visualization, and various Siemens industrial products that use the cURL library.

Learn more about vulnerabilities in industrial systems at

SecurityWeek’s ICS Cyber Security Conference

High-severity flaws that can be leveraged for DoS attacks have been discovered in Desigo DXR and PXC controllers, the CP 44x-1 RNA communication processor modules, Teamcenter, and various industrial products that use OPC Local Discovery Server.

Advertisement. Scroll to continue reading.

A high-severity vulnerability that can be exploited by an authenticated attacker to escape the Kiosk Mode in SIMATIC WinCC has also been disclosed.

Siemens has started releasing patches for these vulnerabilities, but fixes are currently not available for all impacted products.

Schneider Electric has released three advisories to inform customers about eight vulnerabilities. Six of these flaws affect some Wiser Smart home automation products, including a critical hardcoded credentials issue, and high-severity vulnerabilities that can be exploited for brute-force attacks, admin account hijacking, cross-domain attacks, and obtaining authentication credentials.

The company has also informed customers about a medium-severity DoS vulnerability in Saitel DP remote terminal unit (RTU) products, and a high-severity remote code execution flaw in the PowerLogic ION Setup engineering tool for metering devices.

Schneider has released patches for Saitel DP RTU and PowerLogic ION products. In the case of Wiser Smart, the affected products have reached end of life and no longer receive patches, but the company has made available some mitigations.

Related: ICS Patch Tuesday: Siemens, Schneider Fix Several Critical Vulnerabilities

Related: Siemens Addresses Over 90 Vulnerabilities Affecting Third-Party Components

Related: ICS Patch Tuesday: Siemens, Schneider Electric Address Nearly 50 Vulnerabilities

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version