Siemens Addresses 60 Vulnerabilities Introduced by Third-Party Components
Siemens’ May 2021 Patch Tuesday advisories address roughly 60 vulnerabilities introduced by the use of third-party components.
The German industrial giant has released more than a dozen advisories to inform customers about tens of vulnerabilities affecting RUGGEDCOM, SCALANCE, SIMATIC, SINEMA, SINAMICS and other products. The company has advised organizations using its products to either install updates or apply workarounds and mitigations to reduce the risk of exploitation.
Of the 14 advisories published this week, nine cover 60 vulnerabilities related to third-party components. The remaining advisories cover only 7 flaws that are specific to Siemens products.
The advisories related to third-party software address the “SAD DNS” cache poisoning vulnerability in the Linux kernel, tens of vulnerabilities in the UltraVNC and SmartVNC remote access tools, two issues in Mendix modules, six issues affecting industrial PCs and other devices powered by Intel CPUs, and 19 vulnerabilities in Aruba Instant Access Point (IAP).
The security holes, many of which have been classified as critical and high severity, can be exploited for information disclosure, DoS attacks and remote code execution.
The issues specific to Siemens products are related to how SCALANCE devices handle OSPF packets (DoS), how the Tecnomatix Plant Simulation product handles SPP files (DoS, code execution, data extraction), and how SIMATIC NET CP devices handle specially crafted TCP packets (DoS).
Other advisories describe a DoS vulnerability that can be exploited without authentication against SIMATIC HMI products, and a Telnet authentication issue that can be used to gain full remote access to some SIMATIC HMI panels.