As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
1. EXECUTIVE SUMMARY
- CVSS v3 9.8
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Siemens
- Equipment: SCALANCE XCM-/XRM-300
- Vulnerabilities: Out-of-bounds Write, Incorrect Type Conversion or Cast, Improper Verification of Cryptographic Signature, Improper Access Control, Improper Authentication, Missing Encryption of Sensitive Data, Use of a Broken or Risky Cryptographic Algorithm, Incorrect Permission Assignment for Critical Resource, Use After Free, HTTP Request/Response Smuggling, Improper Input Validation, Heap-based Buffer Overflow, Integer Overflow or Wraparound, Missing Release of Memory after Effective Lifetime, Double Free, Improper Validation of Specified Quantity in Input, Uncontrolled Resource Consumption, Incorrect Comparison, Out-of-bounds Read, Incorrect Default Permissions, Improper Ownership Management, Injection, Type Confusion, Inefficient Algorithmic Complexity, NULL Pointer Dereference, HTTP Request/Response Splitting, Allocation of Resources Without Limits or Throttling, Improper Validation of Integrity Check Value, Observable Discrepancy, Improper Locking, Incorrect Calculation of Buffer Size, Incorrect Authorization, Improper Removal of Sensitive Information Before Storage or Transfer, Unchecked Return Value, Race Condition, Link Following, Classic Buffer Overflow, Improper Check for Unusual or Exceptional Conditions, Path Traversal, Code Injection, Use of Uninitialized Resource, Cross-site Scripting, Exposure of Resource to Wrong Sphere, Improper Encoding or Escaping of Output, Interpretation Conflict, Use of Insufficiently Random Values, Buffer Underflow, Divide By Zero, Insufficiently Protected Credentials, Access of Uninitialized Pointer, Inefficient Regular Expression Complexity, OS Command Injection, Insu
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.This article has been indexed from All CISA AdvisoriesRead the original article: