Thursday, February 13, 2025

Review – 19 Advisories and 1 Update Published – 2-13-23

Today CISA’s NCCIC-ICS published 18 control system security advisories for products from Dingtian, Outback Power, mySCADA, ORing, and Siemens (14), as well as an update for a Mitsubishi advisory. They also included a medical device security advisory for products from Qardio.

Advisories

Dingtian Advisory - This advisory describes an authentication bypass using alternate path or channel vulnerability in the Dingtian DT 004 relay board.

Outback Advisory - This advisory describes three vulnerabilities in the Outback Power Mojave Inverter.

mySCADA Advisory - This advisory describes four vulnerabilities in the mySCADA myPRO Manager.

ORing Advisory - This advisory describes two vulnerabilities (with publicly available exploit code) in the Oring IAP-420 WLAN access point.

Opcenter Advisory - This advisory discusses five vulnerabilities (one with known exploit) in the Siemens Opcenter Intelligence product.

SIMATIC PCS Advisory - This advisory describes an insufficient session expiration vulnerability in the Simens SIMATIC PCS neo and TIA Administrator products.

SIMATIC IPC Advisory - This advisory describes an incorrect permission assignment for critical resource vulnerability in the Siemens SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor.

APOGEE Advisory - This advisory describes two vulnerabilities in the Siemens APOGEE PXC and TALON TC series products.

cold state and a vulnerability that would allow an attacker to decrypt the passwords of the device.

Questa Advisory - This advisory describes an uncontrolled search path element vulnerability in the Siemens Questa and ModelSim products.

SCALANCE Advisory - This advisory discuss 72 vulnerabilities in the Siemens SCALANCE W700 access point.

OpenV2G Advisory - This advisory describes a classic buffer overflow vulnerability in the Siemens OpenV2G (vehicle to grid) communications interface.

Teamcenter Advisory - This advisory describes an open redirect vulnerability in the Siemens Teamcenter product.

RUGGEDCOM Advisory - This advisory discusses ten vulnerabilities in the Siemens RUGGEDCOM APE1808 product.

SIPROTEC 5 Advisory #1 - This advisory describes a use of default credentials vulnerability in the Siemens SIPROTEC 5 Devices.

SIPROTEC 5 Advisory #2 - This advisory describes an active debug code vulnerability in the Siemens SIPROTEC 5 products. The vulnerability was reported by Steffen Robertz, Stefan Viehböck, and Constantin Schieber-Knöbl of SEC Consult Vulnerability Lab.

SIPROTEC 5 Advisory #3 - This advisory describes a cleartext storage of sensitive information vulnerability in the Siemens SIPROTEC 5 products.

SIMATIC Advisory - This advisory describes an observable discrepancy vulnerability in the Siemens SIMATIC product line.

SIMATIC S7-1200 Advisory - This advisory describes two vulnerabilities in the Siemens SIMATIC S7-1200 CPU family.

Qardio Advisory - This advisory describes three vulnerabilities in the Qardio Heart Health IOS application, Heart Health Android Application, and QardioARM A100.

Updates

Mitsubishi Update - This update provides additional information on the FA Engineering Software Products advisory that was originally published on January 30th, 2024, and most recently updated on January 16th, 2025.

 

For more information on these advisories, including links to 3rd party advisories and researcher reports, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/19-advisories-and-1-update-published - subscription required.

1 comment:

Anonymous said...

I'm baffled by the discrepancy between the ICSA-25-035-02, about vulnerabilities in Rockwell PLC's, and the original Rockwell advisory. The ICSA mentions 1756-L3zS3, while Rockwell talks about Compact GuardLogix, which has catalog 5069 not 1756 (https://www.rockwellautomation.com/en-us/products/hardware/allen-bradley/programmable-controllers/small-controllers/compactlogix-family/compactlogix-5380-controllers.html)

This error is magnified by many other websites worldwide all copy/pasting the ICSA advisory text.

Rockwell itself doesn't make life any easier while on the webpage it appears that they refer to the whole GuardLogix 5580 range, but the downloadable JSON file for CVE-2025-24478 specifically mentions "GuardLogix 5580 SIL3".

 
/* Use this with templates/template-twocol.html */