[Nulled] » Information security » Red Balloon Security researchers have discovered
January 16 2023

Red Balloon Security researchers have discovered

web3 16-01-2023, 12:57 Information security 179

Red Balloon Security researchers have discovered a potentially serious unpatched vulnerability affecting many Siemens PLC models.

Having an average severity rating of CVE-2022-38773 can allow an attacker to bypass the functions of secure boot, change the working code and data of the controller.

According to the Red Balloon Security resellers, the error is caused by architectural problems affecting the Siemens Simatic and Siplus S7-1500 processors.

The specialized Siemens SoC system does not install RoT during the early boot process, causing the absence of asymmetric signature checks for all stages of the bootloader and firmware before execution.

The inability to install Root of Trust on the device allows attackers to download a modified bootloader and firmware - to perform and bypass the functions of protection against unauthorized access and integrity checks on the device.

According to Red Balloon, an attacker can decrypt the firmware of affected PLCs and create their own bootable malicious firmware on more than 100 device models.

Physical access to the target PLC is required to exploit the vulnerability. However, as the researchers noted, a hacker can use another RCE vulnerability to deploy malicious firmware on the device.

Siemens informed customers about the vulnerability, recommending that measures be taken to ensure that only trusted personnel have access to physical equipment.

At the same time, the manufacturer has separately notified customers that the vulnerability cannot be fixed with a firmware update and no fixes are planned to date. 

New hardware versions have been released that fix the problem on some affected processors, the remaining ones are under development.

Information

Visitors who are in the group Guests they can't download files.
Log in to the site under your login and password or if you are a new user go through the process registrations on the website.

Comments:

This publication has no comments yet. You can be the first!

Information the publication:

  • Author of the publication: web3
  • Date of publication: 16 January 2023 12:57
  • Publication category(s): Information security
  • Number of views of the publication: 179
  • Number of comments to the publication: 0

Related News

16 January 2023
Information security
The first January ICS

The first January ICS fixes came up with a dozen security recommendations from Siemens and Schneider Electric,

Read more
16 January 2023
Information security
Potentially serious UEFI

Potentially serious UEFI firmware vulnerabilities in Qualcomm Snapdragon chips affect many devices manufactured by

Read more
16 January 2023
Information security
The top-end dual-band

The top-end dual-band gaming router Asus RT-AX82U is subject to three critical vulnerabilities that can be used to

Read more
15 November 2022
OkayCMS script»,Modules OkayCMS
Pop-up shopping cart

A more interesting analogue is "Buy in one click", instead of thanks for the balloon:dirol:, help set up

Read more
16 January 2023
Information security
Auth0 fixed an RCE

Auth0 fixed an RCE vulnerability in the popular open source library JsonWebToken, which was used in more than

Read more

Information

Users of 🆅🅸🆂🅸🆃🅾🆁 are not allowed to comment this publication.

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    November 2024    »
MonTueWedThuFriSatSun
 123
45678910
11121314151617
18192021222324
252627282930 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +12 Total articles 6747
  • +13 Comments 4077
  • +23 Users : 5842