Description

Major industrial control systems (ICS) providers released security advisories to warn customers about newly discovered vulnerabilities in their products. Siemens issued 17 new advisories detailing over 50 vulnerabilities and provided patches and mitigations. Additionally, Siemens updated 21 previously released advisories with new information. Among the most severe is a critical bug in the SINEMA remote connect server that could allow authenticated attackers to escalate privileges on the underlying operating system. Siemens also addressed the BlastRADIUS vulnerability (CVE-2024-3596) in the RADIUS protocol, which could enable attackers to bypass multi-factor authentication (MFA) protections. Schneider Electric released four new advisories outlining six vulnerabilities affecting its Wiser Home Controller WHC-5918A, EcoStruxure Foxboro DCS, EcoStruxure Foxboro SCADA FoxRTU Station, and Modicon controller products. The most critical issue is a vulnerability in the discontinued Wiser Home Controller WHC-5918A, a C-Bus-based home automation controller. Schneider Electric advises customers to upgrade to newer products or remove the outdated controller from service. Patches have been released for high-severity vulnerabilities in EcoStruxure Foxboro DCS and EcoStruxure Foxboro SCADA FoxRTU Station, but a remediation plan for the medium-severity bug in Modicon controllers is still pending. Ifm Electronic GmbH addressed five vulnerabilities in the Smart PLC firmware, including two critical issues that could allow attackers to gain high privileges or inject OS commands to enable telnet access with hardcoded credentials. The US cybersecurity agency CISA also published seven ICS advisories, highlighting vulnerabilities in products from Delta Electronics, Mitsubishi Electric, Johnson Controls, and PTC. Notably, a high-severity code execution bug in Mitsubishi Electric MELIPC series MI5122-VW devices has been patched, and updates to advisories for other severe vulnerabilities were made. These advisories emphasize the importance of prompt patching and the implementation of security best practices to mitigate potential risks.