Siemens has reported several vulnerabilities in its SIMATIC RFID Readers, which could pose significant security risks if exploited. These vulnerabilities, which range from hidden functionality to improper access controls, affect various versions of the SIMATIC RFID Reader models, including RF610R, RF615R, RF650R, and RF680R. The vulnerabilities are particularly concerning because they can be exploited remotely with low complexity. Exploiting these issues could allow attackers to gain unauthorized access, disrupt system functionality, or expose sensitive data. These vulnerabilities have been assigned CVEs, including CVE-2024-37990, CVE-2024-37991, and others, each with varying levels of severity, ranging from moderate to high, depending on the specific vulnerability.
The vulnerabilities in question are diverse and include hidden functionality, where unauthorized features could be enabled by modifying configuration files. Additionally, some devices expose sensitive log files without proper authentication, allowing unauthorized attackers to access sensitive information. Another issue is improper access control, which could enable attackers to create Ajax2App instances without authentication, leading to denial-of-service conditions. In some instances, improper handling of exceptional conditions, such as SNMP errors or certificate issues, could crash the application, potentially disclosing sensitive data in the process. These flaws affect a wide range of models, including those deployed in critical infrastructure sectors such as manufacturing.
In response to these vulnerabilities, Siemens has released security updates for the affected devices. The company recommends that users update their systems to the latest versions, with specific guidance to upgrade to SIMATIC Reader V4.2 or later and SIMATIC RF models to V2.2 or later. For users who cannot immediately update, Siemens advises disabling remote connections or restricting remote access to trusted systems. In addition to patching, Siemens emphasizes the importance of configuring devices according to their operational security guidelines to safeguard against exploitation. This includes implementing network access control measures to limit exposure to potential attacks.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also provided recommendations for mitigating the risk of exploitation. CISA advises organizations to reduce network exposure for control systems and isolate these systems from business networks and the internet. Remote access should be secured using virtual private networks (VPNs) or other secure methods. Additionally, CISA encourages organizations to conduct thorough risk assessments and impact analyses before deploying defensive measures. By following these practices and ensuring systems are up to date, organizations can reduce the likelihood of successful exploitation of these vulnerabilities and protect their critical infrastructure.
Reference: