Connect with us

Hi, what are you looking for?



Siemens Patches Flaws in Industrial Automation Products

Siemens has released software updates for several of its industrial automation products to address medium and high severity vulnerabilities discovered by researchers from various companies.

Siemens has released software updates for several of its industrial automation products to address medium and high severity vulnerabilities discovered by researchers from various companies.

ICS-CERT and Siemens each published three separate advisories to describe the flaws found in SIMATIC and SINEMA products.

Antonio Morales Maldonado of InnoTec System, and Alexander Van Maele and Tijl Deneut of Howest have been credited for finding a cross-site scripting (XSS) vulnerability in the integrated web server of SINEMA Remote Connect Server, a remote network management platform.

The flaw, tracked as CVE-2016-6204, can be exploited by a remote attacker by tricking the targeted user into clicking on a specially crafted link. The issue affects SINEMA Remote Connect Server versions prior to 1.2, which resolves the security hole.

Siemens has also informed customers about three vulnerabilities found in some of its SIMATIC products. SIMATIC WinCC SCADA systems and PCS7 distributed control systems (DCS) are affected by two high severity improper input validation bugs.

ICS Cyber Security ConferenceOne of them, assigned the identifier CVE-2016-5743 and a CVSS score of 9.8, allows a remote, unauthenticated attacker to execute arbitrary code by sending specially crafted packets to the WinCC or WinCC Runtime Professional products. The second vulnerability, CVE-2016-5744, can be leveraged to extract arbitrary files from the WinCC station.

Researchers also discovered that the Siemens SIMATIC NET PC-Software, which handles communications between PLCs and HMIs, can be caused to enter a denial-of-service (DoS) condition by sending it specially crafted packets. The system can only be recovered through a manual restart after such an attack.

The SIMATIC flaws were reported directly to Siemens by Vladimir Dashchenko and Sergey Temnikov of Kaspersky Labs.

Advertisement. Scroll to continue reading.

Rockwell Automation FactoryTalk EnergyMetrix Vulnerabilities

ICS-CERT has also published an advisory detailing a couple of high severity flaws affecting Rockwell Automation FactoryTalk EnergyMetrix, a web-based management software that provides organizations critical energy data.

The product is plagued by a SQL injection vulnerability (CVE-2016-4522) that could be exploited to access the application’s data files, and a weakness related to the failure to invalidate user sessions immediately after logout (CVE-2016-4531). By failing to ensure that the session expires properly, the product allows attackers to access the system with a legitimate user’s credentials.

The security holes have been addressed with the release of Rockwell Automation FactoryTalk EnergyMetrix versions 2.20.00 and 2.30.00.

Related: Unpatched Flaws Plague Sierra Wireless Industrial Gateways

Related: U.S. Has Most Internet Connected Industrial Control Systems

Related: Vulnerabilities Found in Siemens Power Automation System

Related: Learn More at the ICS Cyber Security Conference

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...


Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).


Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.


More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


Siemens and Schneider Electric address nearly 100 vulnerabilities across several of their products with their February 2023 Patch Tuesday advisories.