Security Experts:

Siemens Addresses Vulnerabilities in LOGO, SINAMICS Products

The May 2019 Patch Tuesday advisories from Siemens address over a dozen vulnerabilities, including serious flaws affecting the company’s LOGO and SINAMICS Perfect Harmony products.

Siemens has published a total of nine new advisories and four of them describe vulnerabilities in LOGO and SINAMICS Perfect Harmony.

Siemens Patch Tuesday updatesAccording to the German industrial giant, SINAMICS Perfect Harmony GH180 medium voltage converters are impacted by two high-severity denial-of-service (DoS) vulnerabilities that can be exploited by an attacker who has access to the network housing the targeted device. The flaws can be exploited with no privileges and without any user interaction.

In the case of LOGO products, Siemens learned from external researchers that LOGO!8 BM devices, which are designed for basic automation tasks, are affected by three critical and high-severity flaws.

The vulnerabilities can be exploited by an unauthenticated attacker with network access to TCP port 10005 to reconfigure devices, obtain and decrypt project data, and acquire unencrypted passwords.

Researchers also found that the LOGO! Soft Comfort tool, which is used to configure and program LOGO controllers, is affected by an arbitrary code execution flaw. Exploitation involves the attacker tricking a legitimate user into opening a specially crafted project file.

Learn More About ICS Flaws at SecurityWeek’s 2019 ICS Cyber Security Conference

Siemens has also informed users of critical and high-severity flaws affecting SIMATIC PCS7 and WinCC products. These security holes can allow unauthenticated code execution, arbitrary command execution, and DoS attacks.

Siemens has also revealed that some flaws found last year in the WibuKey digital rights management (DRM) solution from Wibu Systems also impact its SISHIP automation solutions. The WibuKey vulnerabilities affect the products of several industrial automation companies.

Another advisory informs customers that the latest update for SCALANCE W1750D access points patches several vulnerabilities affecting Aruba Networks software — Aruba and Siemens announced a partnership last year.

Siemens says it has found no evidence that the flaws described in these advisories have been exploited for malicious purposes.

Patches, workarounds and/or mitigations are available for each of the vulnerabilities.

Related: Siemens Patches Serious DoS Flaws in Many Industrial Products

Related: Siemens Patches Several Critical Flaws in SINUMERIK Controllers

view counter
Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.