CVE-2024-54093 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 7.3
ATTENTION: Low attack complexity
Vendor: Siemens
Equipment: Solid Edge SE2024
Vulnerabilities: Heap-based Buffer Overflow, Integer Underflow (Wrap or Wraparound)
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the current process.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of Siemens Solid Edge SE2024 are affected:
Solid Edge SE2024: All versions prior to V224.0
3.2 Vulnerability Overview
3.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122
The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted ASM files. This could allow an attacker to execute code in the context of the current process.
CVE-2024-54093 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2024-54093. A base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).
3.2.2 HEAP-BASED BUFFER OVERFLOW CWE-122
The a...
EPSS Score: 0.05%
December 12th, 2024 (4 months ago)
|
CVE-2024-53832 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 5.1
ATTENTION: Low attack complexity
Vendor: Siemens
Equipment: CPCI85 Central Processing/Communication
Vulnerability: Insufficiently Protected Credentials
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker with physical access to the device to decrypt the firmware.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
Siemens CPCI85 Central Processing/Communication: All versions prior to V05.30
3.2 Vulnerability Overview
3.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522
The affected devices contain a secure element which is connected via an unencrypted SPI bus. This could allow an attacker with physical access to the SPI bus to observe the password used for the secure element authentication and use the secure element as an oracle to decrypt all encrypted update files.
CVE-2024-53832 has been assigned to this vulnerability. A CVSS v3 base score of 4.6 has been assigned; the CVSS vector string is (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
A CVSS v4 score has also been calculated for CVE-2024-53832. A base score of 5.1 has been cal...
EPSS Score: 0.05%
December 12th, 2024 (4 months ago)
|
CVE-2024-6657 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 5.9
ATTENTION: Exploitable from adjacent network
Vendor: Siemens
Equipment: SENTRON Powercenter 1000
Vulnerability: Incorrect Synchronization
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to cause a denial-of-service condition.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
SENTRON Powercenter 1000 (7KN1110-0MC00): All versions
SENTRON Powercenter 1100 (7KN1111-0MC00): All versions
3.2 Vulnerability Overview
3.2.1 INCORRECT SYNCHRONIZATION CWE-821
A denial of service condition can only be triggered during BLE pairing. This occurs only in a limited time window of three minutes after any device restart requiring physical access. A reset of the power supply is necessary for device recovery.
CVE-2024-6657 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
A CVSS v4 score has also been calculated for CVE-2024-6657. A base score of 5.9 has been calculated; the CVSS vector string is (CVSS4.0/AV:A/AC:L/AT:P/PR:N/...
December 12th, 2024 (4 months ago)
|
CVE-2024-41981 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 7.3
ATTENTION: Low Attack Complexity
Vendor: Siemens
Equipment: Simcenter Femap
Vulnerabilities: Heap-based Buffer Overflow, Improper Restriction of Operations within the Bounds of a Memory Buffer
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the current process.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
Simcenter Femap V2306: All versions
Simcenter Femap V2401: All versions
Simcenter Femap V2406: All versions
3.2 Vulnerability Overview
3.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122
The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted BDF files. This could allow an attacker to execute code in the context of the current process.
CVE-2024-41981 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2024-41981. A base score of 7.3 has been calculated; the CVSS vector string is (CVSS:4.0/AV...
EPSS Score: 0.04%
December 12th, 2024 (4 months ago)
|
CVE-2024-54091 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 7.3
ATTENTION: Low attack complexity
Vendor: Siemens
Equipment: Parasolid
Vulnerability: Out-of-bounds Write
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to execute code in the context of the current process.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
Parasolid V36.1: Versions prior to V36.1.225
Parasolid V37.0: Versions prior to V37.0.173
Parasolid V37.1: Versions prior to V37.1.109
3.2 Vulnerability Overview
3.2.1 OUT-OF-BOUNDS WRITE CWE-787
The affected applications contain an out-of-bounds write vulnerability when parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
CVE-2024-54091 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2024-54091. A base score of 7.3 has been calculated; the CVSS vector string is (CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).
3.3 BACKGROUND
...
EPSS Score: 0.04%
December 12th, 2024 (4 months ago)
|
CVE-2020-28398 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 8.6
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Siemens
Equipment: RUGGEDCOM ROX II
Vulnerability: Cross-Site Request Forgery
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to perform administrative actions if an authenticated user is tricked into accessing a malicious link.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens that the following products are affected:
Siemens RUGGEDCOM ROX RX1500: All versions prior to V2.16.0
Siemens RUGGEDCOM ROX RX1512: All versions prior to V2.16.0
Siemens RUGGEDCOM ROX RX1501: All versions prior to V2.16.0
Siemens RUGGEDCOM ROX MX5000RE: All versions prior to V2.16.0
Siemens RUGGEDCOM ROX RX1400: All versions prior to V2.16.0
Siemens RUGGEDCOM ROX RX5000: All versions prior to V2.16.0
Siemens RUGGEDCOM ROX RX1536: All versions prior to V2.16.0
Siemens RUGGEDCOM ROX RX1524: All versions prior to V2.16.0
Siemens RUGGEDCOM ROX RX1510: All versions prior to V2.16.0
Siemens RUGGEDCOM ROX RX1511: All versions prior to V2.16.0
Siemens RUGGEDCOM ROX MX5000: All versions prior to V2.16.0
3.2 Vulnerability Overview
3.2.1 CROSS-SITE R...
December 12th, 2024 (4 months ago)
|
![]() |
Description: CISA released ten Industrial Control Systems (ICS) advisories on December 12, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
ICSA-24-347-01 Siemens CPCI85 Central Processing/Communication
ICSA-24-347-02 Siemens Engineering Platforms
ICSA-24-347-03 Siemens RUGGEDCOM ROX II
ICSA-24-347-04 Siemens Parasolid
ICSA-24-347-05 Siemens Engineering Platforms
ICSA-24-347-06 Siemens Simcenter Femap
ICSA-24-347-07 Siemens Solid Edge SE2024
ICSA-24-347-08 Siemens COMOS
ICSA-24-347-09 Siemens Teamcenter Visualization
ICSA-24-347-10 Siemens SENTRON Powercenter 1000
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
December 12th, 2024 (4 months ago)
|
CVE-2024-49849 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 8.4
ATTENTION: Low Attack Complexity
Vendor: Siemens
Equipment: Siemens Engineering Platforms
Vulnerability: Deserialization of Untrusted Data
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to cause a type confusion and execute arbitrary code within the affected application.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following engineering platforms are affected:
SIMATIC STEP 7 Safety V17: All versions
SIMATIC STEP 7 Safety V18: All versions
SIMATIC S7-PLCSIM V17: All versions
SIMATIC WinCC V19: All versions
SIMATIC WinCC Unified V16: All versions
SIMOTION SCOUT TIA V5.4 SP3: All versions
SIMATIC STEP 7 Safety V19: All versions
SIMATIC WinCC V17: All versions
SIMOTION SCOUT TIA V5.6 SP1: All versions
SIRIUS Soft Starter ES V17 (TIA Portal): All versions
SIRIUS Soft Starter ES V18 (TIA Portal): All versions
SINAMICS Startdrive V16: All versions
SIMATIC STEP 7 V17: All versions
SINAMICS Startdrive V19: All versions
SINAMICS Startdrive V17: All versions
SIMOCODE ES V17: All versions
SIMOCODE ES V18: All versions
TIA Portal Cloud V19: All versions
SIMOTION SC...
EPSS Score: 0.05%
December 12th, 2024 (4 months ago)
|
CVE-2024-52051 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 7.0
ATTENTION: Low attack complexity
Vendor: Siemens
Equipment: Siemens Engineering Platforms
Vulnerability: Improper Input Validation
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
Siemens SIMATIC STEP 7 Safety V18: All versions
Siemens SIMATIC STEP 7 Safety V19: All versions
Siemens SIMATIC S7-PLCSIM V18: All versions
Siemens SIMOCODE ES V18: All versions
Siemens SIMATIC WinCC Unified V17: All versions
Siemens SINAMICS Startdrive V18: All versions
Siemens SIMATIC STEP 7 V17: All versions
Siemens SIMATIC WinCC V19: All versions
Siemens SIRIUS Safety ES V17 (TIA Portal): All versions
Siemens TIA Portal Cloud V19: All versions
Siemens SIRIUS Safety ES V18 (TIA Portal): All versions
Siemens SIMATIC STEP 7 V19: All versions
Siemens SIRIUS Soft Starter ES V18 (TIA Portal): All versions
Siemens SIRIUS Safety ES V19 (TIA Portal): All versions
Siemens SIMOTION SCOUT TIA V5.4 SP3: All versions
Siemens SIMOTION SCOUT TIA V5.5 SP1: All versions
Siemens SINAMI...
EPSS Score: 0.04%
December 12th, 2024 (4 months ago)
|
CVE-2024-49704 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 5.9
ATTENTION: Low Attack Complexity
Vendor: Siemens
Equipment: COMOS
Vulnerabilities: Improper Restriction of XML External Entity Reference
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to extract arbitrary application files.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
COMOS V10.4.0: All versions
COMOS V10.4.1: All versions
COMOS V10.4.2: All versions
COMOS V10.4.3: Versions prior to V10.4.3.0.47
COMOS V10.4.4: Versions prior to V10.4.4.2
COMOS V10.4.4.1: Versions prior to V10.4.4.1.21
COMOS V10.3: Versions prior to V10.3.3.5.8
3.2 Vulnerability Overview
3.2.1 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611
The Generic Data Mapper, the Engineering Adapter, and the Engineering Interface improperly handle XML External Entity (XXE) entries when parsing configuration and mapping files. This could allow an attacker to extract any file with a known location on the user's system or accessible network folders by persuading a user to use a maliciously crafted configuration or mapping file in one of the affected ...
EPSS Score: 0.05%
December 12th, 2024 (4 months ago)
|