| Publication Date: |
|
| Last Update: |
|
| Current Version: | V1.3 |
| CVSS v3.1 Base Score: | 7.5 |
| Affected Product and Versions | Remediation |
|---|---|
|
All versions >= V2022.4 < V2023.1 affected by all CVEs |
Update to V2023.1 or later version
|
|
All versions >= V5.2.1 < V5.3.0 affected by all CVEs |
Update to V5.3.0 or later version
As a mitigation for vulnerable versions: Ensure that only trusted (CA) certificates are contained in the Machine Agent's truststore
|
|
All versions >= V3.2.7 < V3.2.8 affected by all CVEs |
Update to V3.2.8 or later version
|
|
All versions >= V1.80 < V2.20 affected by all CVEs |
Update to V2.20 or later version
As a mitigation for vulnerable versions: In the truststore, do not add CA certificates that contain a nameConstraint-extension (https://www.rfc-editor.org/rfc/rfc5280#section-4.2.1.10) with punycode-encoded internationalized domain names
|
|
All versions >= V2.13.0.0 < V2.13.0.3 affected by all CVEs |
Update to V2.13.0.3 or later version
|
Siemens has identified the following specific mitigations that customers can apply to reduce the risk:
Product-specific remediations or mitigations can be found in the section
Known Affected Products.
Please follow the General Security Recommendations.
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals. Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory. Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.
| CVSS v3.1 Base Score | 7.5 |
| CVSS v3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
| CWE | CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
| CVSS v3.1 Base Score | 7.5 |
| CVSS v3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C |
| CWE | CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
| V1.0 (2022-12-13): | Publication Date |
| V1.1 (2023-04-11): | Added fix for Calibre ICE and SICAM GridPass |
| V1.2 (2023-07-11): | Added fix for Mcenter (SINUMERIK Integrate) and for SIMATIC RTLS Locating Manager |
| V1.3 (2025-12-09): | Added fix for SCALANCE X-200RNA family |