![]() ![]() NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens’ operational guidelines for industrial security ( ), and following the recommendations in the product manuals.Īdditional information on industrial security by Siemens can be found at:įor more information on this vulnerability and associated software updates, please see Siemens security advisory SSA-507847 on their website: To reduce the risk, Siemens recommends users not visit other websites while being authenticated against the PLC.Īs a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. This update can be found on their website at the following location: Siemens provides a firmware update (v4.2.3) and recommends users update to the new version. Lisa Fournet and Marl Joos from P3 communications GmbH reported this vulnerability to Siemens.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |