內容說明:
西門子與施耐德電氣釋出112年3月份安全性更新,其中西門子發布7個安全公告,共修補77個安全漏洞,但多數為受第三方元件影響,而非產品本身;施耐德電氣發布3個安全公告,共修補10個安全漏洞。
影響平台:
以下為安全公告對應之受影響平台,詳細版本請參考官方網站安全公告內容。
1.西門子
|
安全公告編號
|
受影響平台
|
|
SSA-851884
|
Mendix SAML Module
|
|
SSA-726834
|
SIPROTEC 5
|
|
SSA-565386
|
SCALANCE W-700 IEEE 802.11ax
|
|
SSA-419740
|
RUGGEDCOM與SCALANCE
|
|
SSA-320629
|
RUGGEDCOM CROSSBOW V5.3
|
|
SSA-260625
|
RUGGEDCOM CROSSBOW V5.2
|
|
SSA-203374
|
SCALANCE W1750D
|
2.施耐德電氣
|
安全公告編號
|
受影響平台
|
|
SEVD-2023-073-01
|
EcoStruxure™ Power Monitoring Expert 2022
|
|
SEVD-2023-073-02
|
PowerLogic™ HDPM6000(0.58.6(含)以下版本)
|
|
SEVD-2023-073-04
|
IGSS Data Server(IGSSdataServer.exe) V16.0.0.23040(含)以下版本
IGSS Dashboard(DashBoard.exe) V16.0.0.23040(含)以下版本
Custom Reports(RMS16.dll) V16.0.0.23040(含)以下版本
|
處置建議:
目前官方已針對弱點釋出修復更新及緩解措施,請各機關可聯絡系統維護廠商或參考以下官網並對應安全公告:
https://new.siemens.com/global/en/products/services/cert.html#SecurityPublications
https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp
CVE編號:
1.西門子釋出修補程式對應之CVE編號
CVE-2018-12886
CVE-2018-25032
CVE-2019-1125
CVE-2021-4034
CVE-2021-4149
CVE-2021-26401
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
CVE-2022-0001
CVE-2022-0002
CVE-2022-0494
CVE-2022-0547
CVE-2022-1011
CVE-2022-1016
CVE-2022-1198
CVE-2022-1199
CVE-2022-1292
CVE-2022-1304
CVE-2022-1343
CVE-2022-1353
CVE-2022-1473
CVE-2022-1516
CVE-2022-1652
CVE-2022-1729
CVE-2022-1734
CVE-2022-1974
CVE-2022-1975
CVE-2022-2380
CVE-2022-2588
CVE-2022-2639
CVE-2022-4304
CVE-2022-4450
CVE-2022-20158
CVE-2022-23036
CVE-2022-23037
CVE-2022-23038
CVE-2022-23039
CVE-2022-23040
CVE-2022-23041
CVE-2022-23042
CVE-2022-23308
CVE-2022-23395
CVE-2022-26490
CVE-2022-28356
CVE-2022-28390
CVE-2022-30065
CVE-2022-30594
CVE-2022-32205
CVE-2022-32206
CVE-2022-32207
CVE-2022-32208
CVE-2022-32296
CVE-2022-32981
CVE-2022-33981
CVE-2022-35252
CVE-2022-36879
CVE-2022-36946
CVE-2022-38767
CVE-2023-0215
CVE-2023-0286
CVE-2023-25957
CVE-2023-27309
CVE-2023-27310
CVE-2023-27462
CVE-2023-27463
2.施耐德電氣釋出修補程式對應之CVE編號
CVE-2023-27977
CVE-2023-27978
CVE-2023-27979
CVE-2023-27980
CVE-2023-27981
CVE-2023-27982
CVE-2023-27983
CVE-2023-27984
CVE-2023-28003
CVE-2023-28004
參考資料:
1.https://www.securityweek.com/ics-patch-tuesday-siemens-schneider-electric-address-over-100-vulnerabilities/?web_view=true
2.https://new.siemens.com/global/en/products/services/cert.html#SecurityPublications
3.https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp
4.https://cert-portal.siemens.com/productcert/html/ssa-851884.html
5.https://cert-portal.siemens.com/productcert/html/ssa-726834.html
6.https://cert-portal.siemens.com/productcert/html/ssa-565386.html
7.https://cert-portal.siemens.com/productcert/html/ssa-419740.html
8.https://cert-portal.siemens.com/productcert/html/ssa-320629.html
9.https://cert-portal.siemens.com/productcert/html/ssa-260625.html
10.https://cert-portal.siemens.com/productcert/html/ssa-203374.html
11.https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-073-01&p_File_Name=SEVD-2023-073-01.pdf
12.https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-073-02&p_File_Name=SEVD-2023-073-02.pdf
13.https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-073-04&p_File_Name=SEVD-2023-073-04.pdf