Siemens SCALANCE and SIMATIC libcurl (Update B)
Siemens SINEMA Remote Connect Client and Server, as well as SCALANCE SC600 and SIMATIC NET CM 1542-1 devices, contain multiple libcurl vulnerabilities (CWE-131, CWE-125, CWE-121, CWE-280) including buffer overflows and out-of-bounds memory access. An attacker with valid credentials and network access could exploit these flaws to execute arbitrary code on the affected device. The vulnerabilities are particularly relevant to the SMTP Client functionality on SCALANCE and SIMATIC devices, which can be disabled to reduce risk.
- Valid user credentials for SINEMA Remote Connect Client or Server
- Network access to the affected device on its management port
- SMTP Client function enabled on the target device (for SCALANCE/SIMATIC products)
- Authentication required; not exploitable anonymously
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f78a3f0c-2954-4bce-8cac-403633aafbd6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.