Today CISA’s NCCIC-ICS published a control system security advisory for products from Siemens and a medical device security advisory for products from Hillrom.
Siemens Advisory
This advisory describes an improper restriction of operations within the bounds of a memory buffer. . The vulnerability was reported by Tal Keren from Claroty. Siemens has new versions that mitigate the vulnerability. There is no indication that Keren has been provided an opportunity to verify the efficacy of the fix.
NCCIC-ICS reports that an uncharacterized attacker could remotely exploit the vulnerability to allow an attacker to write arbitrary data and code to protected memory areas or read sensitive data to launch further attacks.
NOTE: I briefly discussed this vulnerability last Saturday on CFSN Detailed Analysis (subscription required).
Hillrom Advisory
This advisory describes two vulnerabilities in Hillrom’s Welch Allyn medical device management tools. The vulnerabilities were reported by Uriel Malin, Jamison Utter, and Itay Kirshenbaum of Medigate. Hillrom has updates the mitigate the vulnerabilities. There is no indication that the researchers have been provided an opportunity to verify the efficacy of the fix.
The two reported vulnerabilities are:
• Out-of-bounds write - CVE-2021-27410,
and
• Out-of-bounds read - CVE-2021-27408
NCCIC-ICS reports that an uncharacterized attacker could remotely
exploit the vulnerabilities to allow an attacker to cause memory corruption and
remotely execute arbitrary code.
No comments:
Post a Comment