Juniper Networks has released the first security recommendations in 2023
16-01-2023, 13:08
The first January ICS fixes came up with a dozen security recommendations from Siemens and Schneider Electric, eliminating a total of 27 vulnerabilities.
Siemens has published six bulletins describing a total of 20 vulnerabilities. Security updates are available for many vulnerable products, but fixes will not be made for some.
The most important recommendations describe a dozen shortcomings in Sinec INS (Infrastructure Network Services).
Errors, all of which are critical or of high severity, can allow an attacker to read and write arbitrary files, which can eventually lead to RCE on the device. Some vulnerabilities affect third-party components.
Another bulletin concerns a critical XSS vulnerability in the Mendix SAML module, which an attacker can use to obtain confidential information by tricking the target user into clicking a link, but exploitation is possible only in certain configurations other than the default settings.
Siemens also informed about two high-risk vulnerabilities in Automation License Manager.
One of them can allow an unauthenticated attacker to remotely rename and move files, and the other can be used for RCE if it is associated with the first.
RCE vulnerabilities have been fixed in JT Open Toolkit, JT Utilities and Solid Edge. The operation is to force the target user to open a specially created file.
Researchers have discovered a hardware problem in the S7-1500 CPU that could allow an attacker with physical access to the device to replace the boot image and execute arbitrary code.
The manufacturer has released new hardware versions for some modifications and is working on new ones for the remaining types of PLCs to completely eliminate this vulnerability.
Schneider Electric has also released six new bulletins, but in total they cover seven vulnerabilities.
The company informed customers about the availability of patches for critical and highly critical vulnerabilities in the EcoStruxure Geo SCADA Expert product, which can be used for DoS attacks and obtaining confidential information.
In EcoStruxure Power Operation and Power SCADA Operation software, a serious DoS-related problem has been fixed.
EcoStruxure Power SCADA Anywhere is subject to a serious vulnerability that can be used to execute OS commands, but authentication is required for use.
EcoStruxure Control Expert, Process Expert and Modicon PLC have fixed vulnerabilities that make possible RCE and DOS attacks using specially created project files. These products are also affected by the authentication bypass error.
In Machine Expert HVAC, the problem of disclosure of information of moderate severity is closed.
16-01-2023, 13:08
16-01-2023, 12:45
23-01-2023, 12:30
There are no comments
Information
Users of Visitor are not allowed to comment this publication.