As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
1. EXECUTIVE SUMMARY
- CVSS v4 8.6
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Siemens
- Equipment: LOGO! 8 BM Devices
- Vulnerabilities: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’), Missing Authentication for Critical Function
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to execute code remotely, put the device into a denial-of-service state, or change the behavior of the device.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
- LOGO! 12/24RCE (6ED1052-1MD08-0BA2): All versions
- SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA2): All versions
- SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA2): All versions
- SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA2): All versions
- SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA2): All versions
- SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA2): All versions
- SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA2): All versions
- SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA2): All versions
- LOGO! 12/24RCEo (6ED1052-2MD08-0BA2): All versions
- LOGO! 230RCE (6ED1052-1FB08-0BA2): All versions
- LOGO! 230RCEo (6ED1052-2FB08-0BA2): All versions
- LOGO! 24CE (6ED1052-1CC08-0BA2): All versions
- LOGO! 24CEo (6ED1052-2CC08-0BA2): All versions
- LOGO! 24RCE (6ED1052-1HB08-0BA2): All versions
- LOGO! 24RCEo (6ED1052-2HB08-0BA2): All versions
- SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA2): All versions