Siemens OpenSSL 3.0 Affecting Products
OpenSSL 3.0.0 through 3.0.6 contains buffer overflow vulnerabilities (CVE-2022-3602, CVE-2022-3786) in X.509 certificate verification during TLS handshakes. An attacker can craft a malicious certificate with a nameConstraint extension using punycode-encoded internationalized domain names to trigger the overflow. This could cause denial of service (crash) or arbitrary code execution on vulnerable TLS servers that request client certificates or vulnerable TLS clients connecting to attacker-controlled servers. Affected Siemens products include Calibre ICE, Mcenter, SCALANCE X-200RNA, SICAM GridPass, and SIMATIC RTLS Locating Manager.
- Network access to the device's TLS port (typically 443 or another HTTPS/secure port)
- For server exploitation: device must be configured to require client certificate authentication
- For client exploitation: device must connect to an attacker-controlled TLS server
- Device must be running OpenSSL 3.0.0 through 3.0.6
Patching may require device reboot — plan for process interruption
/api/v1/advisories/99cbfaa4-a3b7-47b2-8b9f-9378ca89a951Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.