Rewterz Threat Advisory – ICS: Multiple Siemens Tecnomatix Plant Simulation Vulnerabilities
February 16, 2023Rewterz Threat Advisory – ICS: Multiple Siemens Solid Edge Vulnerabilities
February 16, 2023Rewterz Threat Advisory – ICS: Multiple Siemens Tecnomatix Plant Simulation Vulnerabilities
February 16, 2023Rewterz Threat Advisory – ICS: Multiple Siemens Solid Edge Vulnerabilities
February 16, 2023Severity
High
Analysis Summary
CVE-2023-24482
Siemens COMOS is vulnerable to a Structured Exception Handler (SEH) based buffer overflow, caused by improper bounds checking by the cache validation service. By sending a specially-crafted request, a remote attacker could overflow a buffer and execute arbitrary code on the system.
Impact
- Buffer Overflow
Indicators Of Compromise
CVE
- CVE-2023-24482
Affected Vendors
Siemens
Affected Products
- Siemens COMOS 10.2
- Siemens COMOS 10.3.3.1
- Siemens COMOS 10.3.3.2
- Siemens COMOS 10.3.3.3
- Siemens COMOS 10.3.3.4
- Siemens COMOS 10.4.0.0
- Siemens COMOS 10.4.1.0
- Siemens COMOS 10.4.2.0
Remediation
Refer to Siemens Security Advisory for patch, upgrade or suggested workaround information.