Zurück zur Übersicht

Auma: SIMA² Master Station Denial of Service Vulnerability on Automation Runtime Webserver

VDE-2022-024
Last update
14.05.2025 15:00
Published at
15.06.2022 12:00
Vendor(s)
AUMA Riester GmbH & Co. KG
External ID
VDE-2022-024
CSAF Document

Summary

Improper buffer restrictions in the webserver used in SIMA² Master Station software versions < V 2.6 may allow an unauthenticated network-based attacker to stop the cyclic program on the device and cause a denial of service.

Impact

The webserver component of the automation runtime used implements insufficient checks on handling file uploads. This implementation could result in a memory violation, which in turn affects the stability of automation runtime.
An attacker could leverage this vulnerability to potentially cause a denial of service of the device.

Affected Product(s)

Model no. Product name Affected versions
SIMA² Master Station Firmware <v2.6

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE-120)
References

Mitigation

AUMA recommends the following specific workarounds and mitigations: The access to the SIMA² should be restricted to legitimate network partners, using e.g. a sufficient firewall setup and robust network segmentation. In general, AUMA recommends implementing the Product Security Guideline for uses on Cybersecurity for the SIMA² Master Station.

Remediation

The described vulnerabilities have been fixed in the product versions with software version V 2.6 or higher. SIMA² Master Stations with software versions < V 2.6 can be upgraded. AUMA recommends applying a product update at the earliest convenience

Revision History

Version Date Summary
1 15.06.2022 12:00 initial revision
2 14.05.2025 15:00 Fix: added distribution