OTPulse

Siemens SIMATIC

Act Now9.8ICS-CERT ICSA-24-074-07Mar 14, 2024
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

Multiple vulnerabilities in SIMATIC RF160B RFID readers (versions below V2.2) could allow an attacker to execute arbitrary code within the context of a privileged process. The vulnerabilities span memory corruption (CWE-119, CWE-125, CWE-190, CWE-191, CWE-787, CWE-416), insufficient input validation (CWE-20, CWE-665), weak authentication and authorization (CWE-287, CWE-862, CWE-863), insecure cryptography (CWE-326, CWE-330, CWE-295), and other issues (CWE-74, CWE-116, CWE-120, CWE-502, CWE-610, CWE-681, CWE-668, CWE-281, CWE-835, CWE-1188, and others). The affected device is the SIMATIC RF160B firmware versions below V2.2.

What this means
What could happen
An attacker could execute arbitrary code on the SIMATIC RF160B reader with elevated privileges, potentially allowing them to modify RFID read/write operations, alter process data, or disrupt industrial processes that depend on RFID identification and authentication.
Who's at risk
Manufacturing facilities and warehouses using Siemens SIMATIC RF160B RFID readers for product identification, tracking, and authentication in automated processes. This includes discrete manufacturing, food/beverage production, and logistics operations where RFID-based process control is critical.
How it could be exploited
An attacker with network access to the SIMATIC RF160B can send specially crafted requests that exploit memory corruption or input validation weaknesses to inject and execute arbitrary code in a privileged process context. The vulnerability is remotely exploitable without requiring authentication or user interaction.
Prerequisites
  • Network access to the SIMATIC RF160B device
  • No authentication required
  • No special configuration or user interaction needed
Remotely exploitableNo authentication requiredLow complexity attackActively exploited (KEV)High EPSS score (62.7%)Affects industrial process controlCode execution in privileged context
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (1)
ProductAffected VersionsFix Status
SIMATIC RF160B (6GT2003-0FA00): <V2.2<V2.2V2.2
Remediation & Mitigation
0/3
Do now
0/2
HOTFIXUpdate SIMATIC RF160B firmware to version V2.2 or later
WORKAROUNDRestrict network access to SIMATIC RF160B devices using firewall rules and network segmentation (allow only authorized engineering workstations and control systems)
Long-term hardening
0/1
HARDENINGImplement defense-in-depth network architecture with proper access controls and monitoring for ICS environment per Siemens operational guidelines
CVEs (157)
CVE-2017-14491CVE-2017-18509CVE-2020-0338CVE-2020-0417CVE-2020-10768CVE-2020-11301CVE-2020-14305CVE-2020-14381CVE-2020-15436CVE-2020-24587CVE-2020-25705CVE-2020-26555CVE-2020-26558CVE-2020-29660CVE-2020-29661CVE-2021-0302CVE-2021-0305CVE-2021-0325CVE-2021-0326CVE-2021-0327CVE-2021-0328CVE-2021-0329CVE-2021-0330CVE-2021-0331CVE-2021-0333CVE-2021-0334CVE-2021-0336CVE-2021-0337CVE-2021-0339CVE-2021-0341CVE-2021-0390CVE-2021-0391CVE-2021-0392CVE-2021-0393CVE-2021-0394CVE-2021-0396CVE-2021-0397CVE-2021-0399CVE-2021-0400CVE-2021-0429CVE-2021-0431CVE-2021-0433CVE-2021-0434CVE-2021-0435CVE-2021-0436CVE-2021-0437CVE-2021-0438CVE-2021-0443CVE-2021-0444CVE-2021-0471CVE-2021-0473CVE-2021-0474CVE-2021-0476CVE-2021-0478CVE-2021-0480CVE-2021-0481CVE-2021-0484CVE-2021-0506CVE-2021-0507CVE-2021-0508CVE-2021-0509CVE-2021-0510CVE-2021-0511CVE-2021-0512CVE-2021-0513CVE-2021-0514CVE-2021-0515CVE-2021-0516CVE-2021-0519CVE-2021-0520CVE-2021-0521CVE-2021-0522CVE-2021-0584CVE-2021-0585CVE-2021-0586CVE-2021-0587CVE-2021-0588CVE-2021-0589CVE-2021-0591CVE-2021-0593CVE-2021-0594CVE-2021-0596CVE-2021-0597CVE-2021-0598CVE-2021-0599CVE-2021-0600CVE-2021-0601CVE-2021-0604CVE-2021-0640CVE-2021-0641CVE-2021-0642CVE-2021-0646CVE-2021-0650CVE-2021-0651CVE-2021-0652CVE-2021-0653CVE-2021-0682CVE-2021-0683CVE-2021-0684CVE-2021-0687CVE-2021-0688CVE-2021-0689CVE-2021-0690CVE-2021-0692CVE-2021-0695CVE-2021-0704CVE-2021-0706CVE-2021-0708CVE-2021-0870CVE-2021-0919CVE-2021-0920CVE-2021-0926CVE-2021-0928CVE-2021-0929CVE-2021-0930CVE-2021-0931CVE-2021-0933CVE-2021-0952CVE-2021-0953CVE-2021-0961CVE-2021-0963CVE-2021-0964CVE-2021-0965CVE-2021-0967CVE-2021-0968CVE-2021-0970CVE-2021-1972CVE-2021-1976CVE-2021-29647CVE-2021-33909CVE-2021-38204CVE-2021-39621CVE-2021-39623CVE-2021-39626CVE-2021-39627CVE-2021-39629CVE-2021-39633CVE-2021-39634CVE-2022-20127CVE-2022-20130CVE-2022-20227CVE-2022-20229CVE-2022-20355CVE-2022-20411CVE-2022-20421CVE-2022-20422CVE-2022-20423CVE-2022-20462CVE-2022-20466CVE-2022-20468CVE-2022-20469CVE-2022-20472CVE-2022-20473CVE-2022-20476CVE-2022-20483CVE-2022-20498CVE-2022-20500
↑↓ Navigate · Esc Close
API: /api/v1/advisories/ba9d2be7-9bb1-4fec-935b-40172e8d3e61
Siemens SIMATIC | CVSS 9.8 - OTPulse