Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Siemens Patches Flaws in Industrial Automation Products

Siemens has released software updates for several of its industrial automation products to address medium and high severity vulnerabilities discovered by researchers from various companies.

Siemens has released software updates for several of its industrial automation products to address medium and high severity vulnerabilities discovered by researchers from various companies.

ICS-CERT and Siemens each published three separate advisories to describe the flaws found in SIMATIC and SINEMA products.

Antonio Morales Maldonado of InnoTec System, and Alexander Van Maele and Tijl Deneut of Howest have been credited for finding a cross-site scripting (XSS) vulnerability in the integrated web server of SINEMA Remote Connect Server, a remote network management platform.

The flaw, tracked as CVE-2016-6204, can be exploited by a remote attacker by tricking the targeted user into clicking on a specially crafted link. The issue affects SINEMA Remote Connect Server versions prior to 1.2, which resolves the security hole.

Siemens has also informed customers about three vulnerabilities found in some of its SIMATIC products. SIMATIC WinCC SCADA systems and PCS7 distributed control systems (DCS) are affected by two high severity improper input validation bugs.

ICS Cyber Security ConferenceOne of them, assigned the identifier CVE-2016-5743 and a CVSS score of 9.8, allows a remote, unauthenticated attacker to execute arbitrary code by sending specially crafted packets to the WinCC or WinCC Runtime Professional products. The second vulnerability, CVE-2016-5744, can be leveraged to extract arbitrary files from the WinCC station.

Researchers also discovered that the Siemens SIMATIC NET PC-Software, which handles communications between PLCs and HMIs, can be caused to enter a denial-of-service (DoS) condition by sending it specially crafted packets. The system can only be recovered through a manual restart after such an attack.

The SIMATIC flaws were reported directly to Siemens by Vladimir Dashchenko and Sergey Temnikov of Kaspersky Labs.

Rockwell Automation FactoryTalk EnergyMetrix Vulnerabilities

Advertisement. Scroll to continue reading.

ICS-CERT has also published an advisory detailing a couple of high severity flaws affecting Rockwell Automation FactoryTalk EnergyMetrix, a web-based management software that provides organizations critical energy data.

The product is plagued by a SQL injection vulnerability (CVE-2016-4522) that could be exploited to access the application’s data files, and a weakness related to the failure to invalidate user sessions immediately after logout (CVE-2016-4531). By failing to ensure that the session expires properly, the product allows attackers to access the system with a legitimate user’s credentials.

The security holes have been addressed with the release of Rockwell Automation FactoryTalk EnergyMetrix versions 2.20.00 and 2.30.00.

Related: Unpatched Flaws Plague Sierra Wireless Industrial Gateways

Related: U.S. Has Most Internet Connected Industrial Control Systems

Related: Vulnerabilities Found in Siemens Power Automation System

Related: Learn More at the ICS Cyber Security Conference

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.