Siemens Addresses 60 Vulnerabilities Introduced by Third-Party Components

Siemens’ May 2021 Patch Tuesday advisories address roughly 60 vulnerabilities introduced by the use of third-party components.


The German industrial giant has released more than a dozen advisories to inform customers about tens of vulnerabilities affecting RUGGEDCOM, SCALANCE, SIMATIC, SINEMA, SINAMICS and other products. The company has advised organizations using its products to either install updates or apply workarounds and mitigations to reduce the risk of exploitation.


Of the 14 advisories published this week, nine cover 60 vulnerabilities related to third-party components. The remaining advisories cover only 7 flaws that are specific to Siemens products.


The advisories related to third-party software address the “SAD DNS” cache poisoning vulnerability in the Linux kernel, tens of vulnerabilities in the UltraVNC and SmartVNC remote access tools, two issues in Mendix modules, six issues affecting industrial PCs and other devices powered by Intel CPUs, and 19 vulnerabilities in Aruba Instant Access Point (IAP).


Learn more about vulnerabilities in industrial systems at SecurityWeek’s ICS Cyber Security Conference and SecurityWeek’s Security Summits virtual event series


The security holes, many of which have been classified as critical and high severity, can be exploited for information disclosure, DoS attacks and remote code execution.


The issues specific to Siemens products are related to how SCALANCE devices handle OSPF packets (DoS), how the Tecnomatix Plant Simulation product handles SPP files (DoS, code execution, data extraction), and how SIMATIC NET CP devices handle specially crafted TCP packets (DoS).


Other adviso ..

Support the originator by clicking the read the rest link below.