Menu
Papua New Guinea Computer Emergency Response Team
  • Common Threats
  • Guides
  • Alerts
  • Events
  • News
  • Report Incident
  • International Cyber Security Awareness Month
Close Menu
Home
About
Policies
Services
Downloads
Contact Us
  1. Home /
  2. Alerts /
  3. Siemens Patches 21 More File /
Photo by Sven Read on Unsplash
February 12 2021

Siemens Patches 21 More File Parsing Vulnerabilities in PLM Products

Alerts, News

Siemens this week released nine new security advisories describing vulnerabilities affecting the company’s products.

The biggest advisory covers 21 security holes affecting JT2Go, a 3D viewing tool for JT data (ISO-standardized 3D data format), and Teamcenter Visualization, which provides organizations visualization solutions for documents, 2D drawings, and 3D models. These products are made by Siemens Digital Industries Software, which specializes in product lifecycle management (PLM) solutions.

All of these vulnerabilities are related to how certain types of files are parsed by these products. An attacker can exploit them for arbitrary code execution, data extraction, and DoS attacks if they can trick the targeted user into opening a malicious file. Many of the issues affect the Siemens products due to their use of the Open Design Alliance (ODA) Drawings SDK. The ODA has published its own advisory for the flaws. 

Last month, Siemens informed customers about 18 similar file parsing vulnerabilities in JT2Go and Teamcenter Visualization.

Will Dormann from the CERT Coordination Center (CERT/CC) at Carnegie Mellon University informed Siemens about a serious privilege escalation issue affecting the Totally Integrated Administrator (TIA) portal. An advisory for this vulnerability has also been published on the CERT/CC website.

A high-severity privilege escalation vulnerability was also discovered in DIGSI 4, the operation and configuration software for SIPROTEC 4 and SIPROTEC Compact protection devices.

The German industrial giant also informed customers about a high-severity “Zip-Slip” vulnerability affecting SINEC and SINEMA network management products. The flaw allows an authenticated attacker to upload files or modify existing ones and possibly achieve arbitrary code execution.

Learn more about vulnerabilities in industrial systems at SecurityWeek’s ICS Cyber Security Conference and SecurityWeek’s Security Summits virtual event series

Customers were also informed about six medium- and high-severity DoS issues affecting RUGGEDCOM products. The flaws are related to IPsec and they impact the Network Security Services (NSS) and Libreswan components.

Siemens also issued an advisory for CVE-2020-28388, one of the nine TCP/IP stack vulnerabilities disclosed this week by cybersecurity firm Forescout. The flaws, tracked collectively as NUMBER:JACK, allow attackers to hijack or spoof TCP connections.

Patches from Schneider Electric

Schneider Electric only released one new advisory this Patch Tuesday to inform customers about the existence of three vulnerabilities affecting some of its PowerLogic power metering products.

Two of the vulnerabilities rated high severity, can allow a man-in-the-middle attacker to obtain credentials when intercepting Telnet and HTTP traffic between a user and a device. The third issue is a medium-severity CSRF bug that can be exploited to perform actions on behalf of a legitimate user.

The company has started releasing firmware updates for the impacted products.

Domestic Kitten is Actively Surveilling Enemies of the Iranian State Researchers Discover 30 Popular Mobile Health Apps Exposing Millions of Patient Records

Related Posts

Photo by Sigmund on Unsplash

Alerts, News

Android spyware strains linked to state-sponsored Confucius threat group

Photo by Markus Winkler on Unsplash

News

Researchers Discover 30 Popular Mobile Health Apps Exposing Millions of Patient Records

Photo by Maxim Hopman on Unsplash

News

Domestic Kitten is Actively Surveilling Enemies of the Iranian State

Recent Posts

  • Android spyware strains linked to state-sponsored Confucius threat group February 12, 2021
  • Researchers Discover 30 Popular Mobile Health Apps Exposing Millions of Patient Records February 12, 2021
  • Siemens Patches 21 More File Parsing Vulnerabilities in PLM Products February 12, 2021
  • Domestic Kitten is Actively Surveilling Enemies of the Iranian State February 12, 2021
  • If you use Slack on Android, reset your password now February 11, 2021
Back To Top
Follow Us

Explore

  • Home
  • About
  • Policies
  • Services
  • Downloads
  • Report Incident
  • Contact Us

Our Office

PNGCERT
C/-NICTA
Frangipani Street, Hohola
P O Box 8222
BOROKO
National Capital District
Papua New Guinea

Related Links

  • CERT New Zealand
  • Australian Cyber Security Center
  • Safer Internet Day
  • Pacific Cyber Security Operational Network
  • National Information & Communications Technology Authority (NICTA)
  • Get Safe Online Papua New Guinea

Contact Us

MON – FRI: 8 AM to 5 PM
Telephone: 3033200
Facsimile: 3266868

© 2023
Papua New Guinea Computer Emergency Response Team
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT