June 12, 2024 at 05:06AM
The June 2024 Patch Tuesday brought advisories from Siemens, Aveva, Schneider Electric, and the US cybersecurity agency CISA. Siemens published 14 new advisories addressing over 120 vulnerabilities, including critical authentication bypass and code execution flaws. Aveva released advisories for high-severity local and remote code execution vulnerabilities. Schneider Electric disclosed 11 vulnerabilities in its advisories, with potential impacts such as unauthorized file uploads and DoS attacks. CISA published multiple ICS advisories, including high-severity vulnerabilities in various systems.
From the meeting notes, we can gather the following key points:
Siemens:
– Published 14 new advisories covering more than 120 vulnerabilities
– Released patches and mitigations for the security holes
– Notable vulnerabilities include critical authentication bypass flaw in PowerSys service program for PowerLink 50/100 and SWT 3000 devices, high-severity code execution vulnerabilities in Tecnomatix Plant Simulation, Teamcenter Visualization, JT2Go, and SICAM AK3/TM/BC devices
Aveva:
– Published two new security advisories, covering high-severity local and remote code execution vulnerabilities in PI Asset Framework (AF) Client and PI Web API, related to the deserialization of untrusted data
Schneider Electric:
– Published five new advisories with a total of 11 vulnerabilities
– Patched six flaws in SAGE RTUs, including critical authentication bypass vulnerability and high-severity issues for disruption, unauthorized uploads, and DoS
– Medium-severity flaws addressed in Modicon M340 programmable automation controllers, PowerLogic P5 protection relays, EVlink Home Smart EV charging stations, and SpaceLogic controllers
CISA:
– Published advisories for high-severity vulnerabilities in Rockwell Automation ControlLogix, GuardLogix, and CompactLogix controllers, Intrado 911 Emergency Gateway, and MicroDicom medical software
– Vulnerabilities include critical code execution, data exposure, information disclosure, and DoS
It’s important to note the critical and high-severity vulnerabilities across these advisories, indicating the potential for significant impact if exploited. This information should be shared with relevant stakeholders and a plan for applying the available patches and mitigations should be prioritized.