Siemens has released software and firmware updates to address vulnerabilities identified in several of the company’s products.
Advisories published by ICS-CERT and Siemens reveal that SIPROTEC 4 and SIPROTEC Compact devices are plagued by a bug which, under certain conditions, can be exploited for denial-of-service (DoS) attacks. The affected products provide protection, control, measurement, and automation functions for electrical substations and other fields of application.
The vulnerability (CVE-2015-5374), which can be exploited by sending specially crafted packets to the device on Port 50000/UDP, affects products running version 4.24 or prior of the EN100 Ethernet module. This module is used by SIPROTEC devices for IEC 61850 communication with electrical or optical 100Mbit interfaces.
Siemens has addressed the vulnerability with the release of firmware version 4.25 for the EN100 module. The company has pointed out that an attacker must have network access in order to exploit the flaw.
Siemens has also patched a locally exploitable vulnerability (CVE-2015-5084) affecting the SIMATIC WinCC [email protected] application for Android. The [email protected] app and the [email protected] are designed to enable the remote operation and monitoring of SIMATIC human-machine interface (HMI) systems from a mobile device.
The problem is that an attacker with local access to the [email protected] app can extract credentials for the [email protected]
The vulnerability has been patched by Siemens with the release of SIMATIC WinCC [email protected] V01.00.01.00 for Android.
The third and final advisory published by Siemens and ICS-CERT reveals that RuggedCom devices running ROS and ROX rugged operating systems are vulnerable to Padding Oracle On Downgraded Legacy Encryption (POODLE) attacks. POODLE is vulnerability that can be exploited by a man-in-the-middle (MitM) attacker to extract potentially sensitive information from encrypted communications.
Siemens has addressed the vulnerability (CVE-2015-5537) with the release of version 4.2.0 of the firmware for ROS-based devices. The company says it’s working on patches for ROX-based devices. In the meantime, users are advised to disable the web interface on ROX II and use the SSH command line interface for configuration, or restrict access to the web interface to trusted clients.
Related: Learn more at the ICS Cyber Security Conference
Related: Siemens Patches Authentication Bypass Bug in Telecontrol Product

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Zyxel Firewalls Hacked by Mirai Botnet
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations
- Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances
- OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers
- New Honeywell OT Cybersecurity Solution Helps Identify Vulnerabilities, Threats
- Rheinmetall Says Military Business Not Impacted by Ransomware Attack
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
