Multiple advisoried for Siemens systems

  • Siemens SINEMA Remote Connect Server
  • Siemens SIMATIC
  • Siemens SENTRON
  • Siemens Solid Edge
  • Siemens RUGGEDCOM APE1808
  • Siemens Sinteso EN Cerberus PRO EN Fire Protection Systems
  • Siemens SINEMA Remote Connect Client
  • Siemens SENTRON 7KM PAC3x20
  • Siemens SCALANCE XB-200/XC-200/XP-200/XF-200BA/XR-300WG Family

Siemens SINEMA Remote Connect Server

Vulnerabilities: Cross-site Scripting, Improper Access Control

Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code via the ‘options’ element or obtain access to unauthorized resources.

The following versions of Siemens SINEMA Remote Connect Server, a remote management platform, are affected:

  • SINEMA Remote Connect Server: Versions prior to V3.2
  • SINEMA Remote Connect Server: Versions prior to V3.1

https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-03

Siemens SIMATIC

Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code within the context of a privileged process.

  • Vulnerabilities: Improper Restriction of Operations within the Bounds of a Memory Buffer, Improper Input Validation, Missing Encryption of Sensitive Data, Incorrect Permission Assignment for Critical Resource, Expected Behavior Violation, Improper Authentication, Out-of-bounds Write, Use After Free, Inadequate Encryption Strength, Use of Insufficiently Random Values, Incorrect Authorization, Improper Locking, Improper Restriction of Rendered UI Layers or Frames, Improper Privilege Management, Missing Authorization, Cleartext Storage of Sensitive Information, Improper Check for Unusual or Exceptional Conditions, Improper Certificate Validation, Double Free, Integer Overflow or Wraparound, Out-of-bounds Read, Improper Initialization, Race Condition, Use of Uninitialized Resource, Improper Handling of Exceptional Conditions, Missing Initialization of Resource, Exposure of Resource to Wrong Sphere, Externally Controlled Reference to a Resource in Another Sphere, Injection, Excessive Iteration, Improper Preservation of Permissions, Improper Encoding or Escaping of Output, Incorrect Conversion between Numeric Types, Deserialization of Untrusted Data, Classic Buffer Overflow, Initialization of a Resource with an Insecure Default, Infinite Loop, Integer Underflow

Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code within the context of a privileged process.

Siemens reports that the following SIMATIC mobile RFID reader products are affected:

  • SIMATIC RF160B (6GT2003-0FA00): versions prior to V2.2

https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-07

Siemens SENTRON

  • Vulnerability: Hidden Functionality

Successful exploitation of this vulnerability could allow an attacker on the same Modbus network to create a denial-of-service condition that forces the device to reboot.

The following Siemens SENTRON products are affected:

  • SENTRON 3KC ATC6 Expansion Module Ethernet (3KC9000-8TL75): all versions

https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-06

Siemens Solid Edge

  • Vulnerability: Out-of-bounds Read

Successful exploitation of this vulnerability could allow an attacker to cause an out-of-bounds read past the end of an allocated structure while parsing specially crafted files, resulting in code execution.

The following versions of Siemens Solid Edge, a product development tool, are affected:

  • Solid Edge: Versions prior to V223.0.11

https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-02

Siemens RUGGEDCOM APE1808

  • Vulnerabilities: Heap-based Buffer Overflow, External Control of File Name or Path, Improper Privilege Management, Uncontrolled Resource Consumption, Improper Certificate Validation, Out-of-bounds Write, Use of Externally-Controlled Format String

Successful exploitation of these vulnerabilities could allow an attacker to execute elevated actions, cause a denial-of-service, or execute arbitrary commands or code.

The following versions of Siemens RUGGEDCOM APE1808, an application hosting platform, are affected:

  • RUGGEDCOM APE1808: All versions with Fortinet NGFW

https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-05

Siemens Sinteso EN Cerberus PRO EN Fire Protection Systems

  • Vulnerabilities: Classic Buffer Overflow, Out-of-bounds Read, Improper Restriction of Operations within the Bounds of a Memory Buffer

Successful exploitation of the vulnerabilities could allow an unauthenticated attacker, who gained access to the fire protection system network, to execute arbitrary code on the affected products or create a denial-of-service (DoS) condition.

The following products of Siemens, are affected:

  • Cerberus PRO EN Engineering Tool: Versions prior to IP8
  • Cerberus PRO EN Engineering Tool: All versions
  • Cerberus PRO EN Fire Panel FC72x: Versions prior to IP8
  • Cerberus PRO EN Fire Panel FC72x: Versions prior to IP8 SR4
  • Cerberus PRO EN X200 Cloud Distribution: Versions prior to V4.0.5016
  • Cerberus PRO EN X200 Cloud Distribution: Versions prior to V4.3.5618
  • Cerberus PRO EN X300 Cloud Distribution: Versions prior to V4.2.5015
  • Cerberus PRO EN X300 Cloud Distribution: Versions prior to V4.3.5617
  • Sinteso FS20 EN Engineering Tool: Versions prior to MP8
  • Sinteso FS20 EN Engineering Tool: All versions
  • Sinteso FS20 EN Fire Panel FC20: Versions prior to MP8
  • Sinteso FS20 EN Fire Panel FC20: Versions prior to MP8 SR4
  • Sinteso FS20 EN X200 Cloud Distribution: Versions prior to V4.0.5016
  • Sinteso FS20 EN X200 Cloud Distribution: Versions prior to V4.3.5618
  • Sinteso FS20 EN X300 Cloud Distribution: Versions prior to V4.2.5015
  • Sinteso FS20 EN X300 Cloud Distribution: Versions prior to V4.3.5617
  • Sinteso Mobile: Versions prior to V3.0.0
  • Sinteso Mobile: All versions

https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-09

Siemens SINEMA Remote Connect Client

  • Vulnerability: Insertion of Sensitive Information into Externally-Accessible File or Directory

Successful exploitation of this vulnerability could allow an attacker to access sensitive information.

The following versions of Siemens SINEMA Remote Connect Client, a remote management platform, are affected:

  • SINEMA Remote Connect Client: All versions prior to V3.1 SP1

https://www.cisa.gov/news-events/ics-advisories/icsa-27-074-04

Siemens SENTRON 7KM PAC3x20

  • Vulnerability: Improper Access Control

Successful exploitation of this vulnerability could allow attacker to read out the data from the internal flash of affected device.

The following versions of Siemens SENTRON 7KM PAC3120 and PAC3220, power measuring devices, are affected:

  • SENTRON 7KM PAC3120 AC/DC (7KM3120-0BA01-1DA0): Versions V3.2.3 and after but before V3.3.0 only when manufactured between LQN231003… and LQN231215… (with LQNYYMMDD…)
  • SENTRON 7KM PAC3120 DC (7KM3120-1BA01-1EA0): Versions V3.2.3 and after but before V3.3.0 only when manufactured between LQN231003… and
    LQN231215… (with LQNYYMMDD…)
  • SENTRON 7KM PAC3220 AC/DC (7KM3220-0BA01-1DA0): Versions V3.2.3 and after but before V3.3.0 only when manufactured between LQN231003… and LQN231215… (with LQNYYMMDD…)
  • SENTRON 7KM PAC3220 DC (7KM3220-1BA01-1EA0): Versions V3.2.3 and after but before V3.3.0 only when manufactured between LQN231003… and
    LQN231215… (with LQNYYMMDD…)

https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-01

Siemens SCALANCE XB-200/XC-200/XP-200/XF-200BA/XR-300WG Family

  • Vulnerabilities: Use of Hard-coded Cryptographic Key, Uncontrolled Resource Consumption

Successful exploitation of this vulnerability could allow an authenticated attacker to cause a denial-of-service condition or extract configuration information from a configuration backup file.

The following products of Siemens, are affected:

  • SCALANCE XB205-3 (SC, PN) (6GK5205-3BB00-2AB2): All versions
  • SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BB00-2TB2): All versions
  • SCALANCE XB205-3 (ST, E/IP) (6GK5205-3BD00-2TB2): All versions
  • SCALANCE XB205-3 (ST, PN) (6GK5205-3BD00-2AB2): All versions
  • SCALANCE XB205-3LD (SC, E/IP) (6GK5205-3BF00-2TB2): All versions
  • SCALANCE XB205-3LD (SC, PN) (6GK5205-3BF00-2AB2): All versions
  • SCALANCE XB208 (E/IP) (6GK5208-0BA00-2TB2): All versions
  • SCALANCE XB208 (PN) (6GK5208-0BA00-2AB2): All versions
  • SCALANCE XB213-3 (SC, E/IP) (6GK5213-3BD00-2TB2): All versions
  • SCALANCE XB213-3 (SC, PN) (6GK5213-3BD00-2AB2): All versions
  • SCALANCE XB213-3 (ST, E/IP) (6GK5213-3BB00-2TB2): All versions
  • SCALANCE XB213-3 (ST, PN) (6GK5213-3BB00-2AB2): All versions
  • SCALANCE XB213-3LD (SC, E/IP) (6GK5213-3BF00-2TB2): All versions
  • SCALANCE XB213-3LD (SC, PN) (6GK5213-3BF00-2AB2): All versions
  • SCALANCE XB216 (E/IP) (6GK5216-0BA00-2TB2): All versions
  • SCALANCE XB216 (PN) (6GK5216-0BA00-2AB2): All versions
  • SCALANCE XC206-2 (SC) (6GK5206-2BD00-2AC2): All versions
  • SCALANCE XC206-2 (ST/BFOC) (6GK5206-2BB00-2AC2): All versions
  • SCALANCE XC206-2G PoE (6GK5206-2RS00-2AC2): All versions
  • SCALANCE XC206-2G PoE (54 V DC) (6GK5206-2RS00-5AC2): All versions
  • SCALANCE XC206-2G PoE EEC (54 V DC) (6GK5206-2RS00-5FC2): All versions
  • SCALANCE XC206-2SFP (6GK5206-2BS00-2AC2): All versions
  • SCALANCE XC206-2SFP EEC (6GK5206-2BS00-2FC2): All versions
  • SCALANCE XC206-2SFP G (6GK5206-2GS00-2AC2): All versions
  • SCALANCE XC206-2SFP G (EIP DEF.) (6GK5206-2GS00-2TC2): All versions
  • SCALANCE XC206-2SFP G EEC (6GK5206-2GS00-2FC2): All versions
  • SCALANCE XC208 (6GK5208-0BA00-2AC2): All versions
  • SCALANCE XC208EEC (6GK5208-0BA00-2FC2): All versions
  • SCALANCE XC208G (6GK5208-0GA00-2AC2): All versions
  • SCALANCE XC208G (EIP def.) (6GK5208-0GA00-2TC2): All versions
  • SCALANCE XC208G EEC (6GK5208-0GA00-2FC2): All versions
  • SCALANCE XC208G PoE (6GK5208-0RA00-2AC2): All versions
  • SCALANCE XC208G PoE (54 V DC) (6GK5208-0RA00-5AC2): All versions
  • SCALANCE XC216 (6GK5216-0BA00-2AC2): All versions
  • SCALANCE XC216-3G PoE (6GK5216-3RS00-2AC2): All versions
  • SCALANCE XC216-3G PoE (54 V DC) (6GK5216-3RS00-5AC2): All versions
  • SCALANCE XC216-4C (6GK5216-4BS00-2AC2): All versions
  • SCALANCE XC216-4C G (6GK5216-4GS00-2AC2): All versions
  • SCALANCE XC216-4C G (EIP Def.) (6GK5216-4GS00-2TC2): All versions
  • SCALANCE XC216-4C G EEC (6GK5216-4GS00-2FC2): All versions
  • SCALANCE XC216EEC (6GK5216-0BA00-2FC2): All versions
  • SCALANCE XC224 (6GK5224-0BA00-2AC2): All versions
  • SCALANCE XC224-4C G (6GK5224-4GS00-2AC2): All versions
  • SCALANCE XC224-4C G (EIP Def.) (6GK5224-4GS00-2TC2): All versions
  • SCALANCE XC224-4C G EEC (6GK5224-4GS00-2FC2): All versions
  • SCALANCE XF204 (6GK5204-0BA00-2GF2): All versions
  • SCALANCE XF204 DNA (6GK5204-0BA00-2YF2): All versions
  • SCALANCE XF204-2BA (6GK5204-2AA00-2GF2): All versions
  • SCALANCE XF204-2BA DNA (6GK5204-2AA00-2YF2): All versions
  • SCALANCE XP208 (6GK5208-0HA00-2AS6): All versions
  • SCALANCE XP208 (Ethernet/IP) (6GK5208-0HA00-2TS6): All versions
  • SCALANCE XP208EEC (6GK5208-0HA00-2ES6): All versions
  • SCALANCE XP208PoE EEC (6GK5208-0UA00-5ES6): All versions
  • SCALANCE XP216 (6GK5216-0HA00-2AS6): All versions
  • SCALANCE XP216 (Ethernet/IP) (6GK5216-0HA00-2TS6): All versions
  • SCALANCE XP216EEC (6GK5216-0HA00-2ES6): All versions
  • SCALANCE XP216POE EEC (6GK5216-0UA00-5ES6): All versions
  • SCALANCE XR324WG (24 x FE, AC 230V) (6GK5324-0BA00-3AR3): All versions
  • SCALANCE XR324WG (24 X FE, DC 24V) (6GK5324-0BA00-2AR3): All versions
  • SCALANCE XR326-2C PoE WG (6GK5326-2QS00-3AR3): All versions
  • SCALANCE XR326-2C PoE WG (without UL) (6GK5326-2QS00-3RR3): All versions
  • SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3AR3): All versions
  • SCALANCE XR328-4C WG (24xFE,4xGE,AC230V) (6GK5328-4FS00-3RR3): All versions
  • SCALANCE XR328-4C WG (24XFE, 4XGE, 24V) (6GK5328-4FS00-2AR3): All versions
  • SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V) (6GK5328-4FS00-2RR3): All versions
  • SCALANCE XR328-4C WG (28xGE, AC 230V) (6GK5328-4SS00-3AR3): All versions
  • SCALANCE XR328-4C WG (28xGE, DC 24V) (6GK5328-4SS00-2AR3): All versions
  • SIPLUS NET SCALANCE XC206-2 (6AG1206-2BB00-7AC2): All versions
  • SIPLUS NET SCALANCE XC206-2SFP (6AG1206-2BS00-7AC2): All versions
  • SIPLUS NET SCALANCE XC208 (6AG1208-0BA00-7AC2): All versions
  • SIPLUS NET SCALANCE XC216-4C (6AG1216-4BS00-7AC2): All versions

https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-08