Siemens and Schneider Electric have addressed more than two dozen vulnerabilities in their April 2022 Patch Tuesday security advisories, including flaws that have a “critical” severity rating.
Schneider Electric has only released two advisories and each covers only one vulnerability, but the weaknesses appear to be serious.
The industrial giant has patched a critical remote code execution vulnerability in the IGSS (Interactive Graphical SCADA System) product. The flaw, patched with the release of a new version, has been described as a stack-based buffer overflow that can be exploited by sending specially crafted messages to the targeted system.
The second advisory describes a high-severity denial-of-service (DoS) vulnerability affecting Schneider’s Modicon M340 controllers, as well as the communication modules for these devices. Exploitation involves sending specially crafted requests to the targeted controller.
Learn more about vulnerabilities in industrial systems at SecurityWeek’s ICS Cyber Security Conference
Siemens released 11 new advisories on Tuesday, including two that describe critical vulnerabilities. One of them covers three flaws affecting the SIMATIC Energy Manager product, including a deserialization-related issue that can be exploited by an unauthenticated attacker to execute code with elevated privileges.
Another advisory describes eight critical and high-severity bugs affecting SCALANCE X switches. The flaws, many of which can be exploited remotely and without authentication, can be used to crash devices, obtain sensitive information, and execute arbitrary code.
Siemens has also addressed high-severity vulnerabilities in Simcenter Femap, SIMATIC PCS neo, SIMATIC S7-400, and SCALANCE W1700. Many of these security holes can be exploited for DoS attacks.
It’s worth noting that DoS vulnerabilities can have a significant impact in the case of industrial systems, as their exploitation can lead to costly or damaging disruptions.
Medium-severity issues have been patched or mitigated by Siemens in SIMATIC, Mendix, and SICAM products.
Related: ICS Patch Tuesday: Siemens, Schneider Electric Address Nearly 50 Vulnerabilities
Related: Siemens Addresses Over 90 Vulnerabilities Affecting Third-Party Components

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- Intel Co-founder, Philanthropist Gordon Moore Dies at 94
- Google Leads $16 Million Investment in Dope.security
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
