Siemens and Schneider Electric have addressed more than two dozen vulnerabilities in their April 2022 Patch Tuesday security advisories, including flaws that have a “critical” severity rating.
Schneider Electric has only released two advisories and each covers only one vulnerability, but the weaknesses appear to be serious.
The industrial giant has patched a critical remote code execution vulnerability in the IGSS (Interactive Graphical SCADA System) product. The flaw, patched with the release of a new version, has been described as a stack-based buffer overflow that can be exploited by sending specially crafted messages to the targeted system.
The second advisory describes a high-severity denial-of-service (DoS) vulnerability affecting Schneider’s Modicon M340 controllers, as well as the communication modules for these devices. Exploitation involves sending specially crafted requests to the targeted controller.
Learn more about vulnerabilities in industrial systems at SecurityWeek’s ICS Cyber Security Conference
Siemens released 11 new advisories on Tuesday, including two that describe critical vulnerabilities. One of them covers three flaws affecting the SIMATIC Energy Manager product, including a deserialization-related issue that can be exploited by an unauthenticated attacker to execute code with elevated privileges.
Another advisory describes eight critical and high-severity bugs affecting SCALANCE X switches. The flaws, many of which can be exploited remotely and without authentication, can be used to crash devices, obtain sensitive information, and execute arbitrary code.
Siemens has also addressed high-severity vulnerabilities in Simcenter Femap, SIMATIC PCS neo, SIMATIC S7-400, and SCALANCE W1700. Many of these security holes can be exploited for DoS attacks.
It’s worth noting that DoS vulnerabilities can have a significant impact in the case of industrial systems, as their exploitation can lead to costly or damaging disruptions.
Medium-severity issues have been patched or mitigated by Siemens in SIMATIC, Mendix, and SICAM products.
Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.Previous Columns by Eduard Kovacs:Tags: