Critical Apache HTTP Server vulnerabilities reported in Siemens Industrial Network Management Systems
Take action: If you're using Siemens industrial network products, make sure they are isolated from the internet and accessible only from trusted networks. Then plan update for SINEC NMS to V1.0.3+ and SINEMA Remote Connect Server to V3.1+. For RUGGEDCOM NMS and SINEMA Server V14 there are no planned fixes. All you can do isolate them, then check with the vendor again.
Learn More
CISA warns of critical security vulnerabilities affecting multiple Siemens industrial network management products, including RUGGEDCOM NMS, SINEC NMS, and SINEMA systems.
The vulnerabilities were identified in Apache HTTP Server software versions 2.4.48 and earlier, which are embedded within Siemens' industrial networking products.
Vulnerabilities summary:
- CVE-2021-39275 (CVSS score 9.8) - Out-of-bounds Write . The ap_escape_quotes() function may write beyond the end of a buffer when given malicious input, potentially enabling remote code execution.
- CVE-2021-40438 (CVSS score 9.0) - Server-Side Request Forgery. A crafted request URI-path can cause mod_proxy to forward requests to origin servers chosen by remote attackers.
- CVE-2021-34798 (CVSS score 7.5) - NULL Pointer Dereference. Malformed requests may cause the server to dereference a NULL pointer, leading to denial-of-service conditions.
The affected Siemens products and versions include:
- RUGGEDCOM NMS (all versions when using the device firmware upgrade mechanism),
- SINEC NMS (versions prior to V1.0.3),
- SINEMA Remote Connect Server (versions prior to V3.1),
- SINEMA Server V14 (all versions). For some products, Siemens has released updates, while others currently have no fix planned and must rely on compensating controls
Versions that are not affected include SINEC NMS V1.0.3 and later versions, and SINEMA Remote Connect Server V3.1 and later versions. RUGGEDCOM NMS and SINEMA Server V14 are marked as having no fix planned at the time of the advisory, requiring operators to apply network restrictions and other mitigations