December 2022
Title
SSA-552874 V1.0: Denial of Service Vulnerability in SIPROTEC 5 Devices
Published
Dec. 13, 2022, 1 a.m.
Summary
Devices of the SIPROTEC 5 family contain a vulnerability related to secure client-initiated renegotiation. This could allow an unauthenticated attacker to cause a denial of service condition for the duration of the attack. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet ...
Title
SSA-274900 V1.3 (Last Update: 2022-12-13): Use of Hardcoded Key in SCALANCE X Devices Under Certain Conditions
Published
Dec. 13, 2022, 1 a.m.
Summary
SCALANCE X devices might not generate a unique random key after factory reset, and use a private key shipped with the firmware. Siemens has released updates for the affected products and recommends to update to the latest versions.
Title
SSA-712929 V1.5 (Last Update: 2022-12-13): Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products
Published
Dec. 13, 2022, 1 a.m.
Summary
A vulnerability in the openSSL component (CVE-2022-0778, [0]) could allow an attacker to create a denial of service condition by providing specially crafted elliptic curve certificates to products that use a vulnerable version of openSSL. Siemens has released updates for several affected products and recommends to update to the latest ...
Title
SSA-700053 V1.0: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Published
Dec. 13, 2022, 1 a.m.
Summary
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities that could be triggered when the application reads a malicious file in CGM or RAS format. If a user is tricked to open a malicious file with the affected products, this could lead the application to crash or ...
Title
SSA-638652 V1.2 (Last Update: 2022-12-13): Authentication Bypass Vulnerability in Mendix SAML Module
Published
Dec. 13, 2022, 1 a.m.
Summary
The Mendix SAML module insufficiently protects from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and get access to the application. Mendix has provided fix releases for the Mendix SAML module and recommends to update to the latest version. Note: For compatibility reasons, fix versions are ...
Title
SSA-678983 V1.6 (Last Update: 2022-12-13): Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020)
Published
Dec. 13, 2022, 1 a.m.
Summary
Intel has published information on vulnerabilities in Intel products in November 2020. This advisory lists the Siemens IPC related products, that are affected by these vulnerabilities. In this advisory we take a representative CVE from each advisory: “Intel CSME, SPS, TXE, AMT and DAL Advisory” Intel-SA-00391 is represented by CVE-2020-8745 ...
Title
SSA-764417 V1.6 (Last Update: 2022-12-13): Weak Encryption Vulnerability in RUGGEDCOM ROS Devices
Published
Dec. 13, 2022, 1 a.m.
Summary
The SSH server on RUGGEDCOM ROS devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. Siemens has released updates for several affected products ...
Title
SSA-274282 V1.0: Cross Site Scripting Vulnerability in PLM Help Server V4.2
Published
Dec. 13, 2022, 1 a.m.
Summary
The Siemens PLM Help Server V4.2 for documentation contains a reflected cross-­site scripting vulnerability. This product has reached end of life, and security vulnerabilities are no longer patched. Siemens has released a new version of Documentation Server that resolves this vulnerability. See the chapter “Additional Information” below for more details.
Title
SSA-849072 V1.0: Several Vulnerabilities in SICAM PAS before V8.06
Published
Dec. 13, 2022, 1 a.m.
Summary
SICAM PAS/PQS before V8.06 is affected by three vulnerabilities which could lead to remote code execution, privilege escalation or the creation of a denial of service condition. Siemens has released several updates for SICAM PAS/PQS and recommends to update to the latest version.
Title
SSA-792594 V1.0: Host Header Injection Vulnerability in Polarion ALM
Published
Dec. 13, 2022, 1 a.m.
Summary
Polarion ALM contains a misconfiguration in its default Apache HTTP Server configuration that could allow an attacker to perform host header injection attacks. Siemens is preparing updates and recommends specific countermeasures for existing installations by checking for misconfigurations in configuration files.
Title
SSA-951513 V1.3 (Last Update: 2022-12-13): Clickjacking Vulnerability in SCALANCE S, SCALANCE X-300, X-200IRT, X-200RNA and X-200 Switch Families
Published
Dec. 13, 2022, 1 a.m.
Summary
Several SCALANCE X switches contain a vulnerability that could allow an attacker to perform administrative actions if the victim is tricked into clicking on a website controlled by the attacker. The attack only works if the victim has an authenticated session on the administrative interface of the switch. Siemens has ...
Title
SSA-572005 V1.1 (Last Update: 2022-12-13): Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices
Published
Dec. 13, 2022, 1 a.m.
Summary
Session fixation and incorrect parameter parsing vulnerabilities were identified in the web server of SICAM P850 and SICAM P855 devices. Siemens has released updates for the affected products and recommends to update to the latest versions.
Title
SSA-930100 V1.0: Privilege Escalation Vulnerability in Simcenter STAR-CCM+
Published
Dec. 13, 2022, 1 a.m.
Summary
Simcenter STAR-CCM+ contains a privilege escalation vulnerability which could allow a local attacker with an unprivileged account to override or modify the service executable and subsequently gain elevated privileges. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
November 2022
Title
SSA-638652 V1.1 (Last Update: 2022-11-08): Authentication Bypass Vulnerability in Mendix SAML Module
Published
Nov. 8, 2022, 1 a.m.
Summary
The Mendix SAML module insufficiently protects from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and get access to the application. Mendix has provided fix releases for the Mendix SAML module and recommends to update to the latest version. Note: For compatibility reasons, fix versions are ...
Title
SSA-620288 V1.1 (Last Update: 2022-11-08): Multiple Vulnerabilities (NUCLEUS:13) in CAPITAL VSTAR
Published
Nov. 8, 2022, 1 a.m.
Summary
Multiple vulnerabilities (also known as “NUCLEUS:13”) have be identified in the Nucleus RTOS (real-time operating system) and reported in the Siemens Security Advisory SSA-044112: https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf. CAPITAL VSTAR uses an affected version of the Nucleus software and inherently contains several of these vulnerabilities. Siemens recommends specific countermeasures for products where updates ...
Title
SSA-570294 V1.0: Multiple Vulnerabilities in SICAM Q100 Before V2.50
Published
Nov. 8, 2022, 1 a.m.
Summary
SICAM Q100 devices contain multiple vulnerabilities that could allow an attacker to take over the session of a logged in user or to inject custom code. Siemens has released updates for the affected products and recommends to update to the latest versions.
Title
SSA-764417 V1.5 (Last Update: 2022-11-08): Weak Encryption Vulnerability in RUGGEDCOM ROS Devices
Published
Nov. 8, 2022, 1 a.m.
Summary
The SSH server on RUGGEDCOM ROS devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. Siemens is preparing updates and recommends specific countermeasures ...
Title
SSA-787941 V1.0: Denial of Service Vulnerability in RUGGEDCOM ROS V4
Published
Nov. 8, 2022, 1 a.m.
Summary
RUGGEDCOM ROS-based V4 devices are vulnerable to a denial of service attack (Slowloris). By sending partial HTTP requests nonstop, with none completed, the affected web servers will be waiting for the completion of each request, occupying all available HTTP connections. The web server recovers by itself once the attack ends. ...
Title
SSA-853037 V1.0: File Parsing Vulnerabilities in Parasolid
Published
Nov. 8, 2022, 1 a.m.
Summary
Parasolid is affected by out of bounds read/write vulnerabilities that could be triggered when the application reads files in X_T format. If a user is tricked to open a malicious file with the affected applications, an attacker could leverage the vulnerability to perform remote code execution in the context of ...
Title
SSA-568428 V1.0: Weak Key Protection Vulnerability in SINUMERIK ONE and SINUMERIK MC
Published
Nov. 8, 2022, 1 a.m.
Summary
SINUMERIK ONE and SINUMERIK MC products are affected by a weak key protection vulnerability in the integrated S7-1500 CPU. The weak key protection vulnerability in the integrated S7-1500 CPU is documented in more detail in SSA-568427 [1]. Siemens is preparing updates and recommends specific countermeasures for products where updates are ...
Title
SSA-587547 V1.0: Unencrypted Storage of User Credentials in QMS Automotive
Published
Nov. 8, 2022, 1 a.m.
Summary
QMS Automotive contains a vulnerability that stores user credentials in plantext within the user database. This could allow an attacker to read credentials from memory. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Title
SSA-371761 V1.0: Arbitrary Code Execution Vulnerability in the Logback Component of SINEC NMS before V1.0.3
Published
Nov. 8, 2022, 1 a.m.
Summary
SINEC NMS versions before V1.0.3 are affected by a vulnerability in the logback component (CVE-2021-42550) that could allow attackers with write access to the logback configuration file to execute arbitrary code on the system. Siemens has released an update for SINEC NMS and recommends to update to the latest version.
Title
SSA-362164 V1.2 (Last Update: 2022-11-08): Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS
Published
Nov. 8, 2022, 1 a.m.
Summary
The networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) use Initial Sequence Numbers for TCP-Sessions that are predictable. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not available.
Title
SSA-120378 V1.0: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Published
Nov. 8, 2022, 1 a.m.
Summary
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities that could be triggered when the application reads malicious TIF, CGM or PDF files. If a user is tricked to open a malicious TIF, CGM or PDF file with the affected products, this could lead the application to ...
Title
SSA-400332 V1.1 (Last Update: 2022-11-08): Insufficient Design IP Protection in IEEE 1735 Recommended Practice - Impact to Questa and ModelSim
Published
Nov. 8, 2022, 1 a.m.
Summary
A security research [1] identified weaknesses in the IEEE 1735 recommended practice for encryption of Design IP, which could allow a sophisticated attacker access to unencrypted Design IP data in IEEE 1735-compliant products. This advisory addresses the specific details for the affected Siemens software products: Questa and ModelSim simulators. Siemens ...

Last Updates

BOSCH PSIRT
31.10.2024
SIEMENS CERT
22.11.2024
US CERT
08.11.2024
US CERT (ICS)
21.11.2024

By Source

Archive

2024
2023
2022
2021
2020
2019
2018
2017

Feeds