Siemens LOGO! 8 BM Devices

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 8.6
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Siemens
  • Equipment: LOGO! 8 BM Devices
  • Vulnerabilities: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’), Missing Authentication for Critical Function

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to execute code remotely, put the device into a denial-of-service state, or change the behavior of the device.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Siemens reports that the following products are affected:

  • LOGO! 12/24RCE (6ED1052-1MD08-0BA2): All versions
  • SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA2): All versions
  • SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA2): All versions
  • SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA2): All versions
  • SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA2): All versions
  • SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA2): All versions
  • SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA2): All versions
  • SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA2): All versions
  • LOGO! 12/24RCEo (6ED1052-2MD08-0BA2): All versions
  • LOGO! 230RCE (6ED1052-1FB08-0BA2): All versions
  • LOGO! 230RCEo (6ED1052-2FB08-0BA2): All versions
  • LOGO! 24CE (6ED1052-1CC08-0BA2): All versions
  • LOGO! 24CEo (6ED1052-2CC08-0BA2): All versions
  • LOGO! 24RCE (6ED1052-1HB08-0BA2): All versions
  • LOGO! 24RCEo (6ED1052-2HB08-0BA2): All versions
  • SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA2): All versions

3.2 VULNERABILITY OVERVIEW

This article has been indexed from All CISA Advisories

Read the original article:

Siemens LOGO! 8 BM Devices