Siemens Family Security Update Advisory

Overview

 

Simens has released a security update that addresses a vulnerability in its supplied products. Users of affected products are advised to update to the latest version.

 

Affected Products

 

CVE-2024-39888

  • Mendix Encryption module versions: 10.0.0 (inclusive) ~ 10.0.2 (excluded)

 

CVE-2023-46280

  • S7-PCT All
  • Security Configuration Tool (SCT) All
  • SIMATIC Automation Tool All
  • SIMATIC BATCH V9.1 All
  • SIMATIC NET PC Software V16, V17 All
  • SIMATIC NET PC Software versions: ~ 18 SP1 (excluded)
  • SIMATIC PCS 7 V9.1 All
  • SIMATIC PDM V9.2 All
  • SIMATIC Route Control V9.1 All
  • SIMATIC STEP 7 V5 All
  • SIMATIC WinCC OA V3.17 All
  • SIMATIC WinCC OA version: ~ 3.18 (excluded)
  • SIMATIC WinCC OA version: ~ 3.19 (excluded)
  • SIMATIC WinCC Runtime Advanced All
  • SIMATIC WinCC Runtime Professional version: ~ 16 (excluded)
  • SIMATIC WinCC Runtime Professional V17 All
  • SIMATIC WinCC Runtime Professional versions: ~ 18 (excluded)
  • SIMATIC WinCC Runtime Professional versions: up to 19 (excluded)
  • SIMATIC WinCC V7.4 All
  • SIMATIC WinCC version: ~ 7.5 SP2 (excluded)
  • SIMATIC WinCC version: ~ 8.0 (excluded)
  • SINAMICS Startdrive versions: ~ 19 SP1 (excluded)
  • SINUMERIK ONE virtual version: ~ 6.23 (excluded)
  • SINUMERIK PLC Programming Tool All
  • IA Portal Cloud Connector version: ~ 2.0 (excluded)
  • Totally Integrated Automation Portal (TIA Portal) Version: ~ 18 (excluded)
  • Totally Integrated Automation Portal (TIA Portal) V15.1 All
  • Totally Integrated Automation Portal (TIA Portal) V16 All
  • Totally Integrated Automation Portal (TIA Portal) V17 All
  • Totally Integrated Automation Portal (TIA Portal) Versions: ~ 19 (excluded)

 

Cve-2024-39570, cve-2024-39571

  • SINEMA Remote Connect Server Version: ~3.2 HF1 (excluded)

 

CVE-2024-30321

  • SIMATIC PCS 7 V9.1 All
  • SIMATIC WinCC Runtime Professional V18 All
  • SIMATIC WinCC Runtime Professional Version: ~19 (excluded)
  • SIMATIC WinCC versions: ~ 7.4 (excluded)
  • SIMATIC WinCC version: ~ 7.5 (excluded)
  • SIMATIC WinCC versions: ~ 8.0 (excluded)

 

Cve-2024-39568, cve-2024-39569, cve-2024-39567

  • SINEMA Remote Connect Client version: ~ 3.2 HF1 (excluded)

 

CVE-2022-45147

  • SIMATIC PCS neo V4.0 All
  • Totally Integrated Automation Portal (TIA Portal) V16, V17 All
  • Totally Integrated Automation Portal (TIA Portal) Version: ~ 18 (excluded)

 

CVE-2024-37997

  • JT Open Version: ~ 11.5 (excluded)
  • PLM XML SDK version: ~ 7.1.0.014 (excluded)

 

CVE-2019-13946

  • see references[16]

 

CVE-2023-32735

  • Totally Integrated Automation Portal V16, V17, V18 All

 

CVE-2024-38867

  • see references[20]

 

CVE-2022-32253

  • SINEMA Remote Connect Server version: ~ 3.1 (excluded)

 

CVE-2022-32260

  • SINEMA Remote Connect Server Version: ~ 3.2 SP1 (excluded)

 

CVE-2022-32252, CVE-2022-32258, CVE-2022-32254, CVE-2022-32261

  • SINEMA Remote Connect Server version: ~ 3.1 (excluded)

 

CVE-2019-10936

  • see references [28]
     

Cve-2024-39869, cve-2024-39874, cve-2024-39868, cve-2024-39867, cve-2024-39865, cve-2024-39873, cve-2024-39866, cve-2024-39870, cve-2022-32260, cve-2024-39872

  • SINEMA Remote Connect Server version: ~ 3.2 SP1 (excluded)

 

CVE-2017-12741

  • SIMOCODE pro V EIP (including SIPLUS variant) Version: ~ 1.0.2 (excluded)

 

  • see references[5]

 

  • SINAMICS SM150i-2 w. SIMOTION D4xx for PROFINET (including SIPLUS variants) Version: ~ 4.4 HF26 (excluded)
  • SINAMICS GH150 V4.7 w. PROFINET version: ~ 4.7 SP5 HF7 (excluded)
  • SINAMICS GL150 V4.7 w. PROFINET version: ~ 4.8 SP2 (excluded)
  • SINAMICS GM150 V4.7 w. PROFINET version: ~ 4.7 HF31 (excluded)
  • SINAMICS SL150 V4.7.0 w. PROFINET version: ~ 4.7 HF30 (excluded)
  • SINAMICS SL150 V4.7.4 w. PROFINET version: ~ 4.8 SP2 (excluded)
  • SINAMICS GH150 V4.7.5 w. PROFINET version: ~ 4.8 SP2 (excluded)
  • SINAMICS SM120 V4.7 w. PROFINET version: ~ 4.8 SP2 (excluded)

 

CVE-2022-40225

  • SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) Version: ~ 2.4.8 (excluded)
  • TIM 1531 IRC (6GK7543-1MX00-0XE0) Version: ~ 2.4.8 (excluded)

 

CVE-2023-32737

  • Totally integrated Automation Portal All

 

Cve-2023-52237, cve-2024-38278, cve-2024-39675

  • see references[12]

 

Cve-2024-32056, cve-2024-33653, cve-2024-33654

  • Simcenter Femap version: ~ 2406 (excluded)

 

 

Resolved Vulnerabilities

 

Vulnerability that could allow an attacker to decrypt all encrypted project data via the use of unspecified individual EncryptionKeys in projects (CVE-2024-39888)
An out-of-bounds read vulnerability could be exploited to cause a blue screen of death (BSOD) crash of the underlying Windows kernel, resulting in a denial of service condition (CVE-2023-46280)
Vulnerabilities that could allow authenticated attackers to execute arbitrary code with root privileges by exploiting a command injection vulnerability due to missing server-side input sanitization when loading VxLAN configurations (CVE-2024-39570, CVE-2024-39571)
Vulnerability in the failure to properly handle certain requests to a web application, which could allow privileged information to be leaked (CVE-2024-30321)
A missing server-side input sanitization when a system service loads proxy configurations, which could allow commands to be injected (CVE-2024-39568, CVE-2024-39569, CVE-2024-39567)
Failure to properly restrict .NET BinaryFormatter when deserializing user-controlled input, which could allow an attacker to cause type confusion and execute arbitrary code within the affected application (CVE-2022-45147)
A stack-based overflow vulnerability that could occur while parsing crafted XML files (CVE-2024-37997)
denial of service vulnerability when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface (CVE-2019-13946)
Vulnerability in .NET BinaryFormatter not properly constrained when deserializing hardware configuration profiles, which could allow an attacker to cause type confusion and execute arbitrary code within an affected application (CVE-2023-32735)
Support for weak passwords on multiple ports (443/tcp for web, 4443/tcp for DIGSI 5, and a configurable port for syslog over TLS), which could allow an unauthorized attacker in a man-in-the-middle position to read and modify all data sent to those ports (CVE-2024-38867)
A vulnerability that could allow passwords in OpenSSL certificates to be printed to an attacker-accessible file due to improper input validation (CVE-2022-32253)
A vulnerability in the creation of temporary user credentials for User Management Component (UMC) users that could allow an attacker to use these temporary credentials to bypass authentication in certain scenarios (CVE-2022-32260)
Vulnerability in which integrity checks for update packages are not performed, and without validation, administrators could be tricked into installing a malicious package and granting root privileges to an attacker (CVE-2022-32252)
A vulnerability that included the ability to get device configuration via certain endpoints or below, which could be used by an attacker to disclose this information (CVE-2022-32258)
Custom HTTP POST requests could force an application to write the status of a given user to a log file, which could expose sensitive user information that could provide valuable instructions to an attacker (CVE-2022-32254)
An APT update contained malformed configuration, which could allow an attacker to add insecure packages to the application (CVE-2022-32261)
Vulnerability that could allow an unauthenticated remote attacker to trigger a denial of service condition by improperly handling a large number of specially crafted UDP packets (CVE-2019-10936)

Vulnerability that could allow an authenticated attacker to upload a crafted certificate leading to a persistent denial of service condition (CVE-2024-39869
A vulnerability in a client communication component that did not properly implement brute force attacks on user credentials, which could allow an attacker to determine user credentials that are vulnerable to brute force attacks (CVE-2024-39874)
Vulnerability in the web interface that does not properly validate authentication when performing certain actions, allowing an unauthenticated attacker to access and edit VxLAN configuration information on an unauthorized network (CVE-2024-39868, CVE-2024-39867)
Vulnerability allowing users to upload encrypted backup files, which could allow an attacker to upload malicious files, leading to remote code execution (CVE-2024-39865)
API did not properly implement brute force attacks on user credentials, which could allow an attacker to determine user credentials vulnerable to brute force attacks (CVE-2024-39873)
Vulnerability that allows users to upload encrypted backup files, which could allow an attacker to create a user with administrator privileges (CVE-2024-39866)
a vulnerability that could be configured to allow users to manage their own users, allowing them to modify users outside their scope and expand their privileges (CVE-2024-39870)
Vulnerability in the creation of temporary user credentials for User Management Component (UMC) users, which could allow attackers to bypass authentication (CVE-2022-32260)
Failure to properly assign permissions to temporary files created during the update process, which could allow an authenticated attacker with the ‘Manage Firmware Update’ role to escalate privileges at the base OS level (CVE-2024-39872)
Vulnerability that could cause a denial of service condition when specially crafted packets are sent to port 161/udp (CVE-2017-12741)
casting an internal value could cause a floating-point exception under certain circumstances (CVE-2022-40225)
Vulnerability in .NET BinaryFormatter not properly constraining deserializing user-controlled input, which could allow an attacker to cause type confusion and execute arbitrary code (CVE-2023-32737)
A vulnerability that allows low-privileged users to access the hashes and password salts of all system users, including administrative users (CVE-2023-52237)
Vulnerability in some configurations that could allow affected products to incorrectly enable Modbus services on unmanaged VLANs (CVE-2024-39675)
Vulnerability in parsing a specially crafted IGS part file that contained an out-of-bounds write beyond the end of the allocated buffer, which could allow an attacker to execute code in the context of the current process (CVE-2024-32056)
Vulnerability in parsing a specially crafted BMP file contains an out-of-bounds read beyond the end of the allocated structure, which could allow an attacker to execute code in the context of the current process (CVE-2024-33653, CVE-2024-33654)

 

Vulnerability Patches

 

Patches for the vulnerabilities have been made available in the latest updates. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.

 

CVE-2024-39888

  • Mendix Encryption module version: 10.0.2 and later

 

CVE-2023-46280

S7-PCT 
Currently no fix is available

Security Configuration Tool (SCT)
Currently no fix is available

SIMATIC Automation Tool
Currently no fix is available

Simatic batch v9.1
Currently no fix is available

SIMATIC NET PC Software V16, V17
Currently no fix is available

 

SIMATIC NET PC Software version: 18 SP1 and later

 

Simatic pcs 7 v9.1
Currently no fix is available

Simatic pdm v9.2
Currently no fix is available

SIMATIC Route Control V9.1
Currently no fix is available

Simatic step 7 v5
Currently no fix is available

SIMATIC WinCC OA V3.17
Currently no fix is available

 

SIMATIC WinCC OA version: 3.18 P025 and later

SIMATIC WinCC OA version: 3.19 P010 and later

 

SIMATIC WinCC Runtime Advanced
Currently no fix is available

 

SIMATIC WinCC Runtime Professional Version: 16 and later

 

SIMATIC WinCC Runtime Professional V17
Currently no fix is available

 

SIMATIC WinCC Runtime Professional versions: 18 and later

SIMATIC WinCC Runtime Professional versions: 19 and later

 

SIMATIC WinCC V7.4
Currently no fix is available

 

SIMATIC WinCC Version: 7.5 SP2 and later

SIMATIC WinCC version: 8.0 and later

SINAMICS Startdrive version: 19 SP1 and later

SINUMERIK ONE virtual version: 6.23 and later

 

SINUMERIK PLC Programming Tool
Currently no fix is available

 

IA Portal Cloud Connector version: 2.0 and later

Totally Integrated Automation Portal (TIA Portal) version: 18 and later

 

Totally Integrated Automation Portal (TIA Portal) V15.1, V16, V17
Currently no fix is available

 

Totally Integrated Automation Portal (TIA Portal) Versions: 19 and later

 

Cve-2024-39570, cve-2024-39571

  • SINEMA Remote Connect Server version: 3.2 HF1 and later

 

CVE-2024-30321

SIMATIC PCS 7 versions: WinCC 7.5 SP2 and later versions
 

SIMATIC WinCC Runtime Professional V18
Currently no fix is available

 

SIMATIC WinCC Runtime Professional version: 19 and later

SIMATIC WinCC version: 7.4 SP1 and later
SIMATIC WinCC version: 7.5 SP2 and later
SIMATIC WinCC version: 8.0 and later

 

Cve-2024-39568, cve-2024-39569, cve-2024-39567

  • SINEMA Remote Connect Client versions: 3.2 HF1 and later

 

CVE-2022-45147

SIMATIC PCS neo V4.0
Currently no fix is planned

Totally Integrated Automation Portal (TIA Portal) V16, V17
Currently no fix is planned

 

Totally Integrated Automation Portal (TIA Portal) versions: 18 and later

 

CVE-2024-37997

  • JT Open version: 11.5 and later
  • PLM XML SDK version: 7.1.0.014 and later

 

CVE-2019-13946

  • updated based on reference [16]

 

CVE-2023-32735

Totally Integrated Automation Portal V16, V17, V18

  • do not open untrusted files from unknown sources in the affected products.

 

CVE-2024-38867

  • updated based on reference [20]

 

CVE-2022-32253

  • SINEMA Remote Connect Server versions: 3.1 and later

 

CVE-2022-32260

  • SINEMA Remote Connect Server version: 3.2 SP1 and later

 

Cve-2022-32252, cve-2022-32258, cve-2022-32254, cve-2022-32261

  • SINEMA Remote Connect Server versions: 3.1 and later

 

CVE-2019-10936

  • updated based on reference [28]

 

Cve-2024-39869, cve-2024-39874, cve-2024-39868, cve-2024-39867, cve-2024-39865, cve-2024-39873, cve-2024-39866, cve-2024-39870, cve-2022-32260, cve-2024-39872

  • SINEMA Remote Connect Server versions: 3.2 SP1 and later

 

CVE-2017-12741

  • SIMOCODE pro V EIP (including SIPLUS variant) Version: 1.0.2
  • see references[5] for updates

 

  • SINAMICS SM150i-2 w. SIMOTION D4xx for PROFINET (including SIPLUS variant) version: 4.4 HF26
  • SINAMICS GH150 V4.7 w. PROFINET version: 4.7 SP5 HF7 or 4.8 SP2
  • SINAMICS GL150 V4.7 w. PROFINET version: 4.8 SP2
  • SINAMICS GM150 V4.7 w. PROFINET version: 4.7 HF31 or 4.8 SP2
  • SINAMICS SL150 V4.7.0 w. PROFINET version: 4.7 HF30 or 4.8 SP2
  • SINAMICS SL150 V4.7.4 w. PROFINET version: 4.8 SP2
  • SINAMICS GH150 V4.7.5 w. PROFINET version: 4.8 SP2
  • SINAMICS SM120 V4.7 w. PROFINET version: 4.8 SP2

 

CVE-2022-40225

  • SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) versions: 2.4.8 and later
  • TIM 1531 IRC (6GK7543-1MX00-0XE0) versions: 2.4.8 and later

 

CVE-2023-32737

  • Totally Integrated Automation Portal Version: 18 and later

 

Cve-2023-52237, cve-2024-38278, cve-2024-39675

  • see references[12] for updates

 

Cve-2024-32056, cve-2024-33653, cve-2024-33654

  • Simcenter Femap versions: 2406 and later

 

 

references

 

[1] CVE-2024-39888 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-39888

[2] SSA-998949

https://cert-portal.siemens.com/productcert/html/ssa-998949.html

[3] CVE-2023-46280 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-46280

[4] SSA-962515

https://cert-portal.siemens.com/productcert/html/ssa-962515.html

[5] CVE-2024-39570, CVE-2024-39571 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-39570

https://nvd.nist.gov/vuln/detail/CVE-2024-39571

[6] SSA-928781

https://cert-portal.siemens.com/productcert/html/ssa-928781.html

[7] CVE-2024-30321 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-30321

[8] SSA-883918

https://cert-portal.siemens.com/productcert/html/ssa-883918.html

[9] CVE-2024-39568, CVE-2024-39569, CVE-2024-39567 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-39568

https://nvd.nist.gov/vuln/detail/CVE-2024-39569

https://nvd.nist.gov/vuln/detail/CVE-2024-39567

[10] SSA-868282

https://cert-portal.siemens.com/productcert/html/ssa-868282.html

[11] CVE-2022-45147 Detail

https://nvd.nist.gov/vuln/detail/CVE-2022-45147

[12] SSA-825651

https://cert-portal.siemens.com/productcert/html/ssa-825651.html

[13] CVE-2024-37997 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-37997

[14] SSA-824889

https://cert-portal.siemens.com/productcert/html/ssa-824889.html

[15] CVE-2019-13946 Detail

https://nvd.nist.gov/vuln/detail/CVE-2019-13946

[16] SSA-780073

https://cert-portal.siemens.com/productcert/html/ssa-780073.html

[17] CVE-2023-32735 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-32735

[18] SSA-779936

https://cert-portal.siemens.com/productcert/html/ssa-779936.html

[19] CVE-2024-38867 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-38867

[20] SSA-750499

https://cert-portal.siemens.com/productcert/html/ssa-750499.html

[21] CVE-2022-32253 Detail

https://nvd.nist.gov/vuln/detail/CVE-2022-32253

[22] SSA-484086

https://cert-portal.siemens.com/productcert/html/ssa-484086.html

[23] CVE-2022-32260 Detail

https://nvd.nist.gov/vuln/detail/CVE-2022-32260

[24] SSA-381581

https://cert-portal.siemens.com/productcert/html/ssa-381581.html

[25] CVE-2022-32252, CVE-2022-32258, CVE-2022-32254, CVE-2022-32261 Detail

https://nvd.nist.gov/vuln/detail/CVE-2022-32252

https://nvd.nist.gov/vuln/detail/CVE-2022-32258

https://nvd.nist.gov/vuln/detail/CVE-2022-32254

https://nvd.nist.gov/vuln/detail/CVE-2022-32261

[26] SSA-484086

https://cert-portal.siemens.com/productcert/html/ssa-484086.html

[27] CVE-2019-10936 Detail

https://nvd.nist.gov/vuln/detail/CVE-2019-10936

[28] SSA-473245

detail https://cert-portal.siemens.com/productcert/html/ssa-473245.html

[29] CVE-2024-39869, CVE-2024-39874, CVE-2024-39868, CVE-2024-3986, CVE-2024-3986, CVE-2024-39865, CVE-2024-39873, CVE-2024-39866, CVE-2024-39870, CVE-2022-32260, CVE-2024-39872 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-39869

https://nvd.nist.gov/vuln/detail/CVE-2024-39874

https://nvd.nist.gov/vuln/detail/CVE-2024-39868

https://nvd.nist.gov/vuln/detail/CVE-2024-39867

https://nvd.nist.gov/vuln/detail/CVE-2024-39865

https://nvd.nist.gov/vuln/detail/CVE-2024-39873

https://nvd.nist.gov/vuln/detail/CVE-2024-39866

https://nvd.nist.gov/vuln/detail/CVE-2024-39870

https://nvd.nist.gov/vuln/detail/CVE-2022-32260

https://nvd.nist.gov/vuln/detail/CVE-2024-39872

[30] SSA-381581

https://cert-portal.siemens.com/productcert/html/ssa-381581.html

[31] CVE-2017-12741 Detail

https://nvd.nist.gov/vuln/detail/CVE-2017-12741

[32] SSA-141614

https://cert-portal.siemens.com/productcert/html/ssa-141614.html

[33] SSA-346262

https://cert-portal.siemens.com/productcert/html/ssa-346262.html

[34] ssa-546832

https://cert-portal.siemens.com/productcert/html/ssa-546832.html

[35] CVE-2022-40225 Detail

https://nvd.nist.gov/vuln/detail/CVE-2022-40225

[36] SSA-337522

https://cert-portal.siemens.com/productcert/html/ssa-337522.html

[37] CVE-2023-32737 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-32737

[38] SSA-313039

https://cert-portal.siemens.com/productcert/html/ssa-313039.html

[39] CVE-2023-52237, CVE-2024-38278, CVE-2024-39675 Detail

https://nvd.nist.gov/vuln/detail/CVE-2023-52237

https://nvd.nist.gov/vuln/detail/CVE-2024-38278

https://nvd.nist.gov/vuln/detail/CVE-2024-39675

[40] SSA-170375

detail https://cert-portal.siemens.com/productcert/html/ssa-170375.html

[41] CVE-2024-32056, CVE-2024-33653, CVE-2024-33654 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-32056

https://nvd.nist.gov/vuln/detail/CVE-2024-33653

https://nvd.nist.gov/vuln/detail/CVE-2024-33654

[42] SSA-064222

detail https://cert-portal.siemens.com/productcert/html/ssa-064222.html