Latest Siemens vulnerabilities: SIMATIC S7-200 SMART Devices #
Siemens has disclosed a vulnerability in their SIMATIC S7-200 SMART Devices.
CVE-2024-35292 is rated high, with a CVSS score of 8.2, and allows attackers to predict IP ID sequence numbers as their base method of attack and eventually could allow an attacker to create a denial-of-service condition.
What is the impact? #
Successful exploitation of this vulnerability would allow an attacker to issue a denial-of-service condition.
Are updates or workarounds available? #
The only workaround is to restrict access to the network where the affected products are located by introducing strict access control mechanisms.
How to find potentially vulnerable systems with runZero #
From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:
hw:SIMATIC
SENTRON, SCALANCE, and RUGGEDCOM vulnerabilities (March 2024) #
In March, 2024, Siemens released security advisories for a variety of products and devices, including the SENTRON, SCALANCE, and RUGGEDCOM product lines.
Several of the vulnerabilities had CVSS scores in the 7.0 to 8.9 range (high) and several more in the 9.0 to 10.0 range (critical).
For the full list of vulnerabilities, you can consult Siemens ProductCERT.
What was the impact? #
Several of these vulnerabilities allowed for unauthenticated remote code execution, allowing for compromise of the vulnerable systems. Other vulnerabilities could lead to privilege escalation, information disclosure, or denial of service. Users were urged to upgrade as quickly as possible.
Siemens released updates via a variety of channels. See Siemens ProductCERT for details.
How runZero users found potentially vulnerable systems
#
From the Asset Inventory, runZero users applied the following query to locate Siemens assets that were potentially vulnerable:
hardware:Siemens OR hardware:RuggedCom