Vulnerabilities

Siemens Patches Vulnerabilities in SIPROTEC, SIMATIC, RuggedCom Products

Siemens has released software and firmware updates to address vulnerabilities identified in several of the company’s products.

<p><strong><span><span>Siemens has released software and firmware updates to address vulnerabilities identified in several of the company’s products.</span></span></strong></p>

Siemens has released software and firmware updates to address vulnerabilities identified in several of the company’s products.

Advisories published by ICS-CERT and Siemens reveal that SIPROTEC 4 and SIPROTEC Compact devices are plagued by a bug which, under certain conditions, can be exploited for denial-of-service (DoS) attacks. The affected products provide protection, control, measurement, and automation functions for electrical substations and other fields of application.

The vulnerability (CVE-2015-5374), which can be exploited by sending specially crafted packets to the device on Port 50000/UDP, affects products running version 4.24 or prior of the EN100 Ethernet module. This module is used by SIPROTEC devices for IEC 61850 communication with electrical or optical 100Mbit interfaces.

Siemens has addressed the vulnerability with the release of firmware version 4.25 for the EN100 module. The company has pointed out that an attacker must have network access in order to exploit the flaw.

Siemens has also patched a locally exploitable vulnerability (CVE-2015-5084) affecting the SIMATIC WinCC Sm@rtClient application for Android. The Sm@rtClient app and the Sm@rtServer are designed to enable the remote operation and monitoring of SIMATIC human-machine interface (HMI) systems from a mobile device.

The problem is that an attacker with local access to the Sm@rtClient app can extract credentials for the Sm@rtServer.

The vulnerability has been patched by Siemens with the release of SIMATIC WinCC Sm@rtClient V01.00.01.00 for Android.

The third and final advisory published by Siemens and ICS-CERT reveals that RuggedCom devices running ROS and ROX rugged operating systems are vulnerable to Padding Oracle On Downgraded Legacy Encryption (POODLE) attacks. POODLE is vulnerability that can be exploited by a man-in-the-middle (MitM) attacker to extract potentially sensitive information from encrypted communications.

Advertisement. Scroll to continue reading.

Siemens has addressed the vulnerability (CVE-2015-5537) with the release of version 4.2.0 of the firmware for ROS-based devices. The company says it’s working on patches for ROX-based devices. In the meantime, users are advised to disable the web interface on ROX II and use the SSH command line interface for configuration, or restrict access to the web interface to trusted clients.

Related: Learn more at the ICS Cyber Security Conference

Related: Siemens Patches Authentication Bypass Bug in Telecontrol Product

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version