Connect with us

Hi, what are you looking for?



Siemens Patches Vulnerabilities in SIPROTEC, SIMATIC, RuggedCom Products

Siemens has released software and firmware updates to address vulnerabilities identified in several of the company’s products.

Siemens has released software and firmware updates to address vulnerabilities identified in several of the company’s products.

Advisories published by ICS-CERT and Siemens reveal that SIPROTEC 4 and SIPROTEC Compact devices are plagued by a bug which, under certain conditions, can be exploited for denial-of-service (DoS) attacks. The affected products provide protection, control, measurement, and automation functions for electrical substations and other fields of application.

The vulnerability (CVE-2015-5374), which can be exploited by sending specially crafted packets to the device on Port 50000/UDP, affects products running version 4.24 or prior of the EN100 Ethernet module. This module is used by SIPROTEC devices for IEC 61850 communication with electrical or optical 100Mbit interfaces.

Siemens has addressed the vulnerability with the release of firmware version 4.25 for the EN100 module. The company has pointed out that an attacker must have network access in order to exploit the flaw.

Siemens has also patched a locally exploitable vulnerability (CVE-2015-5084) affecting the SIMATIC WinCC Sm@rtClient application for Android. The Sm@rtClient app and the Sm@rtServer are designed to enable the remote operation and monitoring of SIMATIC human-machine interface (HMI) systems from a mobile device.

The problem is that an attacker with local access to the Sm@rtClient app can extract credentials for the Sm@rtServer.

The vulnerability has been patched by Siemens with the release of SIMATIC WinCC Sm@rtClient V01.00.01.00 for Android.

Advertisement. Scroll to continue reading.

The third and final advisory published by Siemens and ICS-CERT reveals that RuggedCom devices running ROS and ROX rugged operating systems are vulnerable to Padding Oracle On Downgraded Legacy Encryption (POODLE) attacks. POODLE is vulnerability that can be exploited by a man-in-the-middle (MitM) attacker to extract potentially sensitive information from encrypted communications.

Siemens has addressed the vulnerability (CVE-2015-5537) with the release of version 4.2.0 of the firmware for ROS-based devices. The company says it’s working on patches for ROX-based devices. In the meantime, users are advised to disable the web interface on ROX II and use the SSH command line interface for configuration, or restrict access to the web interface to trusted clients.

Related: Learn more at the ICS Cyber Security Conference

Related: Siemens Patches Authentication Bypass Bug in Telecontrol Product

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.