Your review has been sent successfully

Siemens Alert

2667
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

9 March, 2022

● High

2022-4493

All

Description:

Siemens has released security alerts to address several vulnerabilities in the following products:

  • Mendix Applications using Mendix 7
  • Mendix Applications using Mendix 8
  • Mendix Applications using Mendix 9
  • COMOS
  • Simcenter STAR-CCM+ Viewer
  • SIMOTICS CONNECT 400
  • SINEC NMS
  • Climatix POL909 (AWB module)
  • Climatix POL909 (AWM module)
  • RUGGEDCOM ROS M2100
  • RUGGEDCOM ROS RMC8388 devices
  • RUGGEDCOM ROS RS416v2
  • RUGGEDCOM ROS RS900G
  • RUGGEDCOM ROS RS900G (32M)
  • RUGGEDCOM ROS RSG900 V5.X
  • RUGGEDCOM ROS RSG920P V5.X
  • RUGGEDCOM ROS RSG2100 (32M) V5.X
  • RUGGEDCOM ROS RSG2100P
  • RUGGEDCOM ROS RSG2100P (32M) V5.X
  • RUGGEDCOM ROS RSG2288 V5.X
  • RUGGEDCOM ROS RSG2300 V5.X
  • RUGGEDCOM ROS RSG2300P V5.X
  • RUGGEDCOM ROS RSG2488 V5.X
  • RUGGEDCOM ROS RSL910
  • RUGGEDCOM ROS RST916C
  • RUGGEDCOM ROS RST916P
  • RUGGEDCOM ROS RST2228
  • SINUMERIK MC
  • SINUMERIK ONE
  • SINEC INS
  • RUGGEDCOM ROX MX5000
  • RUGGEDCOM ROX RX1400
  • RUGGEDCOM ROX RX1500
  • RUGGEDCOM ROX RX1501
  • RUGGEDCOM ROX RX1510
  • RUGGEDCOM ROX RX1511
  • RUGGEDCOM ROX RX1512
  • RUGGEDCOM ROX RX1524
  • RUGGEDCOM ROX RX1536
  • RUGGEDCOM ROX RX5000
  • Polarion Subversion Webclient
  • RUGGEDCOM ROS i800
  • RUGGEDCOM ROS i801
  • RUGGEDCOM ROS i802
  • RUGGEDCOM ROS i803
  • RUGGEDCOM ROS M969
  • RUGGEDCOM ROS M2200
  • RUGGEDCOM ROS RMC
  • RUGGEDCOM ROS RMC20
  • RUGGEDCOM ROS RMC30
  • RUGGEDCOM ROS RMC40
  • RUGGEDCOM ROS RMC41
  • RUGGEDCOM ROS RMC8388
  • RUGGEDCOM ROS RP110
  • RUGGEDCOM ROS RS400
  • RUGGEDCOM ROS RS401
  • RUGGEDCOM ROS RS416
  • RUGGEDCOM ROS RS900 (32M)
  • RUGGEDCOM ROS RS900GP
  • RUGGEDCOM ROS RS900L
  • RUGGEDCOM ROS RS900W
  • RUGGEDCOM ROS RS910
  • RUGGEDCOM ROS RS910L
  • RUGGEDCOM ROS RS910W
  • RUGGEDCOM ROS RS920L
  • RUGGEDCOM ROS RS920W
  • RUGGEDCOM ROS RS930L
  • RUGGEDCOM ROS RS930W
  • RUGGEDCOM ROS RS940G
  • RUGGEDCOM ROS RS969
  • RUGGEDCOM ROS RS8000
  • RUGGEDCOM ROS RS8000A
  • RUGGEDCOM ROS RS8000H
  • RUGGEDCOM ROS RS8000T
  • RUGGEDCOM ROS RSG900
  • RUGGEDCOM ROS RSG900C
  • RUGGEDCOM ROS RSG900G
  • RUGGEDCOM ROS RSG900R
  • RUGGEDCOM ROS RSG907R
  • RUGGEDCOM ROS RSG908C
  • RUGGEDCOM ROS RSG909R
  • RUGGEDCOM ROS RSG910C
  • RUGGEDCOM ROS RSG920P
  • RUGGEDCOM ROS RSG2100
  • RUGGEDCOM ROS RSG2100 (32M)
  • RUGGEDCOM ROS RSG2100P (32M)
  • RUGGEDCOM ROS RSG2200
  • RUGGEDCOM ROS RSG2288
  • RUGGEDCOM ROS RSG2300
  • RUGGEDCOM ROS RSG2300P
  • RUGGEDCOM ROS RSG2488
Threats:

Attacker could exploit these vulnerabilities by doing the following:

  • Execute arbitrary code remotely
  • Denial of service attack (DoS)
  • Escalation of privilege
  • Cross-site scripting (XSS)
Best practice and Recommendations:
Last updated at 9 March, 2022

Rate the content

rate-icon
up icon