HomeCyber BalkansSiemens and other vendors release patches for critical ICS product vulnerabilities

Siemens and other vendors release patches for critical ICS product vulnerabilities

Published on

spot_img

The recent release of 15 advisories by the US Cybersecurity & Infrastructure Security Agency (CISA) has shed light on serious vulnerabilities in industrial control products from prominent manufacturers such as Siemens, Mitsubishi Electric, Delta Electronics, and Softing Industrial Automation. These vulnerabilities, some of which have been classified with high and critical severity levels, have the potential to lead to remote code execution, posing significant risks to critical infrastructure.

Out of the 15 advisories issued, 11 focus on vulnerabilities in Siemens products. This concentration is not unexpected, considering the diverse range of product lines Siemens offers and the company’s dedicated cybersecurity program. Among the Siemens advisories, four highlight critical severity flaws with CVSS scores ranging from 9 to 10, while three others point out high severity issues with scores between 7 and 9. The remaining advisories address medium and lower severity vulnerabilities.

One notable vulnerability outlined in the advisories pertains to remote code execution flaws that could enable unauthorized access to equipment and sensitive information. For instance, an improper access control vulnerability (CVE-2022-32257) was identified in the web service endpoints of the SINEMA Remote Connect Server, a Siemens platform facilitating the management of VPN tunnels. This flaw, rated at 9.8, affects SINEMA Remote Connect Server versions prior to V3.2 and V3.1, underscoring the importance of prompt mitigation measures.

Additionally, a cross-site scripting issue (CVE-2020-23064) within the jQuery library of the service posed a lower severity risk but still had the potential to allow remote attackers to execute arbitrary code. Moreover, a high-risk vulnerability in the SINEMA Remote Connect Client component (CVE-2024-22045) was addressed to prevent unauthorized access to sensitive information stored in accessible files and directories.

In response to these vulnerabilities, a significant software update was released for the SIMATIC RF160B RFID mobile reader, a handheld terminal widely used across industries. The version 2.2 update addresses over 150 vulnerabilities identified over several years, with 11 of them carrying critical ratings that could lead to code execution if exploited.

The proactive approach taken by CISA in issuing these advisories underscores the importance of ongoing vigilance and prompt mitigation efforts in the face of evolving cybersecurity threats targeting industrial control systems. Manufacturers, cybersecurity experts, and end-users alike need to prioritize the implementation of security measures and updates to safeguard critical infrastructure from potential cyberattacks. As the digital landscape continues to expand, the resilience of industrial control systems against vulnerabilities remains a critical focus area for ensuring the integrity and security of essential services and operations.

Source link

Latest articles

Attackers Abuse Google Ad Feature to Target Slack, Notion Users

 Attackers are once again abusing Google Ads to target people with info-stealing malware, this time...

Hackers allege to have infiltrated computer network of Israeli nuclear facility

An Iran-linked hacking group has declared that they successfully breached the computer network of...

Hacker allegedly uses white-hat approach to exploit crypto game for $4.6M

In a surprising turn of events, the food-themed crypto game Super Sushi Samurai fell...

Reducing Threats from the IABs Market

As ransomware attacks continue to escalate in frequency and severity, one of the key...

More like this

Attackers Abuse Google Ad Feature to Target Slack, Notion Users

 Attackers are once again abusing Google Ads to target people with info-stealing malware, this time...

Hackers allege to have infiltrated computer network of Israeli nuclear facility

An Iran-linked hacking group has declared that they successfully breached the computer network of...

Hacker allegedly uses white-hat approach to exploit crypto game for $4.6M

In a surprising turn of events, the food-themed crypto game Super Sushi Samurai fell...
en_USEnglish