Siemens Issues Patches for 41 flaws, three of them critical
Take action: Most of the devices with critical flaws are (or at least should be) in an internet isolated network. Check for exposure first, then consider whether it's better to isolate or go straight to patching. Nevertheless, a systematic planned patch effort is still wise but not in a panic mode.
Learn More
Siemens, has released a series of new advisories that address 41 distinct vulnerabilities across their products.
Among these advisories, one specifically highlights seven security issues within Siemens' Ruggedcom APE1808 industrial application hosting platform.
Three of the advisories Siemens issued pertain to critical security flaws.
- One of these advisories details vulnerabilities in the Scalance W1750D product. Interestingly, Scalance W1750D is not a Siemens original product but a brand-labeled device from Aruba, a subsidiary of HPE. Some of these vulnerabilities were previously identified in Aruba's offerings.The consequences of exploiting these vulnerabilities are severe. Attackers can access confidential information, execute code remotely without authentication, and even trigger a Denial of Service (DoS) attack.
- Siemens has also issued a 'critical' rating for CVE-2023-43625. This vulnerability lies within the Simcenter Amesim software and permits an unauthenticated attacker to run any code they wish by exploiting DLL injections.
- Another 'critical' advisory released describes the CVE-2023-36380 flaw. This flaw concerns a hardcoded ID found in the SSH 'authorized_keys' configuration of the Sicam A8000 remote terminal units (RTUs). Under specific conditions, an attacker, if aware of the associated login details, can gain SSH access to the device.
Several high-severity vulnerabilities have also been identified and addressed in a variety of Siemens products, including Sinema Server, Sicam PAS/PQS, Siemens Xpedition Layout Browser, Sinec NMS, Tecnomatix Plant Simulation, and Sicam A8000 RTUs. These vulnerabilities can lead to issues like code execution, privilege escalation, and DoS attacks.
Additionally, medium-severity flaws have been fixed in Mendix's 'forgot password' feature and Simatic CP devices. These vulnerabilities could lead to potential threats like user enumeration, code execution, DoS attacks, and unwarranted network access.