The text describes a buffer overflow vulnerability in Siemens‘ SICAM and SITIPE products, identified as CVE-2024-34057. This vulnerability, which affects the IEC 61850 Client libraries integrated into these products, allows unauthenticated remote attackers to send specially crafted MMS (Manufacturing Message Specification) messages. The failure to properly check buffer sizes when processing these messages can result in a denial-of-service (DoS) condition. The vulnerability has a high CVSS v4 score of 8.8, indicating its severity, and it can be exploited remotely with low attack complexity.
The affected Siemens products include various models in the SICAM and SITIPE series, with versions prior to V05.30 and V10.0 being vulnerable. Specific versions of SICAM A8000, SICAM EGS, SICAM 8 Software Solution, SICAM SCC, and others are noted to be impacted. The vulnerability stems from improper handling of buffer sizes, which could allow an attacker to execute a denial-of-service attack, causing disruptions in the functioning of critical infrastructure systems that rely on these devices. The risk spans multiple sectors, including chemical, energy, food and agriculture, and water and wastewater systems.
Siemens has released mitigations and workarounds to reduce the risk. These include updating to newer versions, such as SICAM SCC V10.0 and SICAM A8000 V05.30, which resolve the issue. Siemens recommends applying the security updates using documented procedures, and, if possible, applying them across multiple devices using automated tools. Additionally, Siemens advises using security measures like firewalls, network segmentation, and VPNs to protect the devices from unauthorized access. It is also important for organizations to validate the updates before deployment and ensure that trained staff oversee the update process.
CISA has also recommended defensive measures to minimize the risk of exploitation, such as reducing network exposure to the vulnerable devices and ensuring they are not directly accessible from the internet. The vulnerability has not been publicly exploited yet, but organizations are encouraged to follow CISA’s cybersecurity best practices and implement proper defense-in-depth strategies. Siemens and CISA are working to provide guidance for securing industrial control systems, and organizations should report any suspected malicious activity to CISA for further analysis.
Reference: