Security News > 2020 > June > Critical Vulnerabilities Expose Siemens LOGO! Controllers to Attacks

Critical Vulnerabilities Expose Siemens LOGO! Controllers to Attacks
2020-06-12 12:36

Siemens' LOGO! programmable logic controllers are affected by critical vulnerabilities that can be exploited remotely to launch denial-of-service attacks and modify the device's configuration.

According to Siemens, the vulnerabilities impact all versions of its LOGO!8 BM devices, which are designed for basic control tasks.

Siemens says an unauthenticated attacker who has network access to TCP port 135 can exploit the vulnerabilities to read and modify a device's configuration and obtain project files, without user interaction.

While the advisories published this week by Siemens and CISA mention a single vulnerability, Cisco's Talos threat intelligence and research group, which the vendor has credited for the findings, says there are actually three missing authentication flaws tracked under the same CVE identifier, CVE-2020-7589.

According to advisories published by Talos, all three vulnerabilities are related to the TDE text display functionality of LOGO! products, and they can all be exploited by sending specially crafted packets to the targeted system.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/4uhe87t28k8/critical-vulnerabilities-expose-siemens-logo-controllers-attacks

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-06-10 CVE-2020-7589 Missing Authentication for Critical Function vulnerability in Siemens Logo! 8 BM Firmware
A vulnerability has been identified in LOGO! 8 BM (incl.
network
low complexity
siemens CWE-306
6.4

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Siemens 2359 113 835 602 151 1701