Siemens Alert
2667Warning Date
Severity Level
Warning Number
Target Sector
9 March, 2022
● High
2022-4493
All
Siemens has released security alerts to address several vulnerabilities in the following products:
- Mendix Applications using Mendix 7
- Mendix Applications using Mendix 8
- Mendix Applications using Mendix 9
- COMOS
- Simcenter STAR-CCM+ Viewer
- SIMOTICS CONNECT 400
- SINEC NMS
- Climatix POL909 (AWB module)
- Climatix POL909 (AWM module)
- RUGGEDCOM ROS M2100
- RUGGEDCOM ROS RMC8388 devices
- RUGGEDCOM ROS RS416v2
- RUGGEDCOM ROS RS900G
- RUGGEDCOM ROS RS900G (32M)
- RUGGEDCOM ROS RSG900 V5.X
- RUGGEDCOM ROS RSG920P V5.X
- RUGGEDCOM ROS RSG2100 (32M) V5.X
- RUGGEDCOM ROS RSG2100P
- RUGGEDCOM ROS RSG2100P (32M) V5.X
- RUGGEDCOM ROS RSG2288 V5.X
- RUGGEDCOM ROS RSG2300 V5.X
- RUGGEDCOM ROS RSG2300P V5.X
- RUGGEDCOM ROS RSG2488 V5.X
- RUGGEDCOM ROS RSL910
- RUGGEDCOM ROS RST916C
- RUGGEDCOM ROS RST916P
- RUGGEDCOM ROS RST2228
- SINUMERIK MC
- SINUMERIK ONE
- SINEC INS
- RUGGEDCOM ROX MX5000
- RUGGEDCOM ROX RX1400
- RUGGEDCOM ROX RX1500
- RUGGEDCOM ROX RX1501
- RUGGEDCOM ROX RX1510
- RUGGEDCOM ROX RX1511
- RUGGEDCOM ROX RX1512
- RUGGEDCOM ROX RX1524
- RUGGEDCOM ROX RX1536
- RUGGEDCOM ROX RX5000
- Polarion Subversion Webclient
- RUGGEDCOM ROS i800
- RUGGEDCOM ROS i801
- RUGGEDCOM ROS i802
- RUGGEDCOM ROS i803
- RUGGEDCOM ROS M969
- RUGGEDCOM ROS M2200
- RUGGEDCOM ROS RMC
- RUGGEDCOM ROS RMC20
- RUGGEDCOM ROS RMC30
- RUGGEDCOM ROS RMC40
- RUGGEDCOM ROS RMC41
- RUGGEDCOM ROS RMC8388
- RUGGEDCOM ROS RP110
- RUGGEDCOM ROS RS400
- RUGGEDCOM ROS RS401
- RUGGEDCOM ROS RS416
- RUGGEDCOM ROS RS900 (32M)
- RUGGEDCOM ROS RS900GP
- RUGGEDCOM ROS RS900L
- RUGGEDCOM ROS RS900W
- RUGGEDCOM ROS RS910
- RUGGEDCOM ROS RS910L
- RUGGEDCOM ROS RS910W
- RUGGEDCOM ROS RS920L
- RUGGEDCOM ROS RS920W
- RUGGEDCOM ROS RS930L
- RUGGEDCOM ROS RS930W
- RUGGEDCOM ROS RS940G
- RUGGEDCOM ROS RS969
- RUGGEDCOM ROS RS8000
- RUGGEDCOM ROS RS8000A
- RUGGEDCOM ROS RS8000H
- RUGGEDCOM ROS RS8000T
- RUGGEDCOM ROS RSG900
- RUGGEDCOM ROS RSG900C
- RUGGEDCOM ROS RSG900G
- RUGGEDCOM ROS RSG900R
- RUGGEDCOM ROS RSG907R
- RUGGEDCOM ROS RSG908C
- RUGGEDCOM ROS RSG909R
- RUGGEDCOM ROS RSG910C
- RUGGEDCOM ROS RSG920P
- RUGGEDCOM ROS RSG2100
- RUGGEDCOM ROS RSG2100 (32M)
- RUGGEDCOM ROS RSG2100P (32M)
- RUGGEDCOM ROS RSG2200
- RUGGEDCOM ROS RSG2288
- RUGGEDCOM ROS RSG2300
- RUGGEDCOM ROS RSG2300P
- RUGGEDCOM ROS RSG2488
Attacker could exploit these vulnerabilities by doing the following:
- Execute arbitrary code remotely
- Denial of service attack (DoS)
- Escalation of privilege
- Cross-site scripting (XSS)
The CERT team encourages users to review Amazon security advisory:
- https://cert-portal.siemens.com/productcert/txt/ssa-764417.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-594438.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-562051.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-415938.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-406691.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-389290.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-337210.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-256353.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-252466.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-250085.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-223353.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-166747.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-155599.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-148641.txt
- https://cert-portal.siemens.com/productcert/txt/ssa-134279.txt