Siemens and Schneider Electric have published their Patch Tuesday advisories for December 2023, addressing dozens of vulnerabilities affecting their products.
Siemens has published 12 advisories that cover more than 30 vulnerabilities.
The industrial giant has published an advisory describing 430 GNU/Linux subsystem vulnerabilities affecting its Simatic S7-1500 CPU. These flaws have CVEs ranging between 2013 and 2023 and severity ratings from 'low' to 'critical'.
The flaw, reported by Sebastien Leger and tracked as CVE-2022-42784, can be exploited for electromagnetic fault injection.
Siemens has informed customers about the existence of critical and/or high-severity flaws in products such as Sinec INS, Scalance M-800/S615, Sinumerik ONE and MC, Simatic S7-1500, Sinamics S210 and S120, and User Management Component.
In most cases exploitation of the vulnerabilities can lead to a denial-of-service condition, but some of the flaws can allow arbitrary code execution.
Medium-severity issues have been addressed in Simatic Step 7 and Sicam Q100 products.
Some of these vulnerabilities have been patched and some will be fixed in the future, but Siemens does not plan on releasing patches for some of the impacted products.
Siemens has also provided clarifications on a recent talk at Black Hat Europe.
Researchers analyzed the security of a Siemens communication protocol a decade after the infamous Stuxnet attack.
The vendor pointed out that no new vulnerabilities were disclosed and that newer versions of the protocol address the highlighted issues.
Schneider Electric has released three new advisories describing a total of four vulnerabilities.
The most serious of them - based on their CVSS score - is a critical flaw in the Redis database, which is used in the company's Plant iT/Brewmaxx process control system.
The vulnerability, disclosed last year and tracked as CVE-2022-0543, can lead to a sandbox escape and remote code execution.
The industrial giant has also patched a high-severity open redirect vulnerability that can be exploited for phishing attacks in its Trio licensed and license-free data radio products.
A medium-severity issue affecting these products can be exploited by a privileged attacker to install malicious firmware.
The third advisory describes a medium-severity path traversal vulnerability in Easy UPS Online Monitoring Software that can be exploited by a local attacker to delete arbitrary files when the service is restarted.
This Cyber News was published on www.securityweek.com. Publication date: Tue, 12 Dec 2023 14:13:10 +0000