OTPulse

Siemens SCALANCE, RUGGEDCOM Third-Party

Act Now9.8ICS-CERT ICSA-23-075-01Mar 14, 2023
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

Multiple third-party component vulnerabilities in Busybox, Linux Kernel, OpenSSL, OpenVPN and other components used by RUGGEDCOM and SCALANCE mobile/industrial routers. These vulnerabilities can lead to improper handling of commands, code injection, and denial of service. All versions prior to v7.2 are affected.

What this means
What could happen
An attacker with network access to these routers could inject commands to gain control of the device, disrupt network connectivity to critical infrastructure, or extract sensitive data. This could cause loss of remote access to field equipment or compromise the integrity of control communications.
Who's at risk
Mobile and industrial routers used to provide remote access to distributed field equipment in water utilities, electric utilities, and manufacturing plants. Affected devices include the SCALANCE M-series mobile routers (M874, M876, M804, M812, M816, M826 models), SCALANCE MUM and S-series, and RUGGEDCOM RM1224 LTE devices. These are critical infrastructure gateway devices.
How it could be exploited
An attacker sends a specially crafted network request to the router that exploits a command injection flaw in one of the third-party components. The router processes the malicious input and executes arbitrary commands with device privileges, allowing the attacker to alter router configuration, intercept traffic, or shut down network connectivity.
Prerequisites
  • Network access to the SCALANCE or RUGGEDCOM router on the affected firmware version
  • No authentication required for exploitation of the third-party component flaws
Remotely exploitableNo authentication requiredLow complexity attackActively exploited in the wild (KEV)Critical CVSS score (9.8)Very high EPSS score (88.3%)Affects network gateway to critical operationsMultiple attack vectors via third-party components
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (20)
20 with fix
ProductAffected VersionsFix Status
SCALANCE M874-3<V7.27.2
SCALANCE M876-3 (EVDO)<V7.27.2
SCALANCE M876-3 (ROK)<V7.27.2
SCALANCE M876-4<V7.27.2
SCALANCE M876-4 (EU)<V7.27.2
Remediation & Mitigation
0/4
Do now
0/4
HOTFIXUpdate all affected SCALANCE and RUGGEDCOM devices to firmware version 7.2 or later
HARDENINGIsolate SCALANCE and RUGGEDCOM routers from the Internet and business networks; place behind firewall with restricted inbound access
HARDENINGRestrict network access to these devices to only authorized management stations and required field device connections
HARDENINGMonitor network traffic to these devices for suspicious command patterns or connections from unexpected sources
CVEs (65)
↑↓ Navigate · Esc Close
API: /api/v1/advisories/4bb47ab8-b499-4a15-81f4-49158e757a8e