Siemens Industrial Devices using libcurl
Vulnerabilities in the cURL library used by multiple Siemens industrial communication and remote access devices could allow an attacker to interfere with affected products through use-after-free (CWE-416) and unrestricted upload of file with dangerous type (CWE-706) flaws. Affected products include SIMATIC CP series communication processors, SIPLUS modules, SCALANCE industrial routers, RUGGEDCOM remote management devices, SIMATIC RTU series remote terminal units, and SINEMA Remote Connect Client. No public exploits currently available, but vulnerabilities have been partially demonstrated (E:P).
- Network access to the affected device's HTTP/HTTPS service port
- Device must be running a vulnerable firmware version
- No authentication is required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/849a5d97-a0d1-4724-ac1d-82a15b68bf14Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.