This week we have two new vendor notifications from
Schneider and 18 researcher reports from Talos of vulnerabilities in products
from Schneider. We also have four updated notifications from Schneider (2) and Siemens
(2). Additionally, we have two vendor updates for advisories about the
Microsoft® RDP vulnerability from Philips and Drager.
Schneider Advisories
1. Schneider published an
advisory for a credential exposure vulnerability in the Schneider PowerSCADA
Expert product (NOTE: According to Schneider this also affects the AVEVA CitecSCADA,
but no AVEVA advisory has yet been published). This vulnerability is apparently
self-reported. Schneider has a new version that mitigates the vulnerability.
2. Schneider published an
advisory for three vulnerabilities in the Schneider ProClima product. The
vulnerabilities were reported by Kushal Arvind Shah (Fortinet), Telus, and Haojun
Hou and
Yongjun Liu (NSFOCUS). Schneider has a new version that
mitigates the vulnerability. There is no indication that the researchers have
been provided an opportunity to verify the efficacy of the fix.
The three reported vulnerabilities are:
• Code injection - CVE-2019-6823;
• Buffer errors - CVE-2019-6824; and
• Uncontrolled search path element - CVE-2019-6825
Talos Reports on Schneider Vulnerabilities
Talos has provided reports with exploits on 18 vulnerabilities
in two products from Schneider; Modicon 580 UMAS and UnityPro PLC. These are
coordinated disclosures, but Schneider has not yet published advisories for
these vulnerabilities. Because of the volume I am not going to attempt to go
into details.
Modicon 580 UMAS
UnityPro
NOTE: There are still 10 reports pending on Schneider vulnerabilities
on the Talos Zeroday
Reports web page. Someone has been spending a great deal of time testing
Schneider equipment.
Schneider Updates
1. Schneider updated an
advisory for the Schneider Embedded Web Servers for Modicon V2 (Note: this
has not been reported by NCCIC-ICS). The new information is the addition of
researcher acknowledgements.
2. Schneider updated an
advisory for the Schneider – U.motion Builder software (Note: this has not
been reported by NCCIC-ICS). Schneider is reporting that this vulnerability has
been exploited by Mirai malware. Schneider is making an unusual recommendation:
“It is imperative customers cease using U.motion Builder software and remove it from their systems immediately.”
Siemens Updates
1. Siemens updated an advisory
for Foreshadow/L1 terminal fault vulnerabilities in Industrial Products (Note:
this has not been reported by NCCIC-ICS). The new information is added
mitigation measures for:
• SIMATIC S7-1500 Software Controller;
• SIMATIC ET 200 SP Open Controller; and
• SIMATIC ET 200 SP Open Controller (F)
2. Siemens updated an
advisory for Vulnerabilities in the additional GNU/Linux subsystem of the
SIMATIC S7-1500 CPU. The update adds information for new firmware V2.6.1
RDP Vulnerability
Two vendor advisories were updated this week:
No comments:
Post a Comment