OTPulse

Multiple Vulnerabilities in SIMATIC eaSie

Act Now10SSA-580125Jul 12, 2022
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

SIMATIC eaSie contains multiple input validation and authentication vulnerabilities that allow an attacker to send arbitrary messages to the underlying message passing framework or crash attached applications. The vulnerability affects SIMATIC eaSie Core Package versions prior to 22.00.

What this means
What could happen
An attacker could send malicious messages to the eaSie message passing framework, potentially altering process behavior or causing application crashes that disrupt engineering workstations and system operation.
Who's at risk
Engineering and automation teams using SIMATIC eaSie for industrial automation development, configuration, and system engineering. This affects organizations running Siemens automation platforms, particularly those with eaSie deployment for PLC programming and system management.
How it could be exploited
An attacker with network access to the SIMATIC eaSie system could send crafted messages without authentication to the message passing framework, bypassing input validation checks to either inject arbitrary commands into the system's messaging layer or trigger a denial of service condition.
Prerequisites
  • Network access to SIMATIC eaSie system (typically port 102 or messaging service ports)
  • No authentication required
remotely exploitableno authentication requiredlow complexityCVSS 10 (critical)affects engineering systems that control physical operations
Exploitability
Low exploit probability (EPSS 0.5%)
Affected products (1)
ProductAffected VersionsFix Status
SIMATIC eaSie Core Package< V22.0022.00
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate SIMATIC eaSie Core Package to version 22.00 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/a916692d-2050-4924-8f1a-63030522d98e