HomeNewsSiemens, different distributors patch important ICS product vulnerabilities

Siemens, different distributors patch important ICS product vulnerabilities

The US Cybersecurity & Infrastructure Safety Company (CISA) launched 15 advisories masking critical vulnerabilities in industrial management merchandise from Siemens, Mitsubishi Electrical, Delta Electronics, and Softing Industrial Automation. Among the flaws are rated with excessive and important severity and can lead to distant code execution.

Eleven of the 15 advisories cowl vulnerabilities in Siemens merchandise, however the quantity isn’t a surprise contemplating what number of product strains Siemens has in its portfolio and the truth that the corporate is an ICS vendor with a really lively cybersecurity program. 4 of the Siemens advisories include important severity flaws with CVSS scores between 9 and 10, whereas one other three include excessive severity ones with scores between 7 and 9. The remaining cowl medium and decrease severity points.

Distant code execution flaws may permit entry to gear, delicate data

The primary distant code execution vulnerability is an improper entry management concern (CVE-2022-32257) in net service endpoints which might be a part of the SINEMA Distant Join Server, a Siemens platform that permits the administration of VPN tunnels between headquarters, service technicians and put in machines or crops. The flaw is rated 9.8 and impacts SINEMA Distant Join Server variations previous to V3.2 and V3.1.

See also  Understanding CISA’s proposed cyber incident reporting guidelines

A decrease severity cross-site scripting concern (CVE-2020-23064) has additionally been patched within the jQuery library that’s a part of the service and which may permit distant attackers to execute arbitrary code by way of the “choices” ingredient.

A high-risk vulnerability was additionally patched within the SINEMA Distant Join Consumer element. This flaw, tracked as CVE-2024-22045, may permit attackers to entry delicate data as a result of the product positioned such data into information and directories which might be accessible to unauthorized customers.

A serious software program replace was additionally launched for the SIMATIC RF160B RFID cell reader, which is a battery-powered handheld terminal utilized in many industries. The brand new model 2.2 replace addresses greater than 150 vulnerabilities found over the previous a number of years, 11 of that are rated important and will lead to code execution.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular