[TheRecord] NUCLEUS:13 vulnerabilities impact Siemens medical & industrial equipment

Security researchers have disclosed today a set of 13 vulnerabilities that impact a crucial Siemens software library that is included with medical devices, automotive, and industrial systems.

Named NUCLEAUS:13, the vulnerabilities impact Nucleus NET, the TCP/IP stack included with Nucleus, a real-time operating system owned by Siemens, which typically runs on system-on-a-chip (SoC) boards included inside medical devices, cars, smartphones, Internet of Things devices, industrial PLCs, and many more.

Disclosed today in a report by Forescout and Medigate Labs, the NUCLEUS:13 vulnerabilities can be used to take over, crash, or leak information from devices that run older versions of the Nucleus RTOS.

The worst of these vulnerabilities and the easiest to weaponize is CVE-2021-31886, researchers said, a remote code execution (RCE) issue that received a rare 9.8 out of 10 rating, primarily due to its severity.

Forescout said it worked with Siemens and the US ICS-CERT team to have these issues properly reported and fixed before the release of its advisory earlier today.

ICS-CERT has published a security advisory today to raise awareness for the NUCLEUS:13 vulnerabilities among US organizations, while Siemens has released security updates via its private CERT portal, to all of its customers. See PDF here.

Forescout researcher Stanislav Dashevskyi has also published a proof-of-concept demo showcasing how the NUCLEUS:13 vulnerabilities could be abused in practice to take over vulnerable devices. As Dashevskyi points out in the video, an attacker only needs to have some sort of network connection to a vulnerable device, as an attack only takes seconds to execute.

The NUCLEUS:13 vulnerabilities are the fifth and last part of a research project named Project Memoria, during which Forescout researchers analyzed popular TCP/IP stacks for security flaws.

In total, Project Memoria found 97 vulnerabilities affecting 14 TCP/IP stacks. The list includes:


The post NUCLEUS:13 vulnerabilities impact Siemens medical & industrial equipment appeared first on The Record by Recorded Future.

Source: Read More (The Record by Recorded Future)

You might be interested in …

[TheRecord] Disgruntled ransomware affiliate leaks the Conti gang’s technical manuals

A disgruntled member of the Conti ransomware program has leaked today the manuals and technical guides used by the Conti gang to train affiliate members on how to access, move laterally, and escalate access inside a hacked company and then exfiltrate its data before encrypting files. Leaked on an underground cybercrime forum named XSS earlier […]

Read More

[ZDNet] DBS Bank offers few details about hours-long service disruption

All posts, ZDNet

Customers since morning have not been able to log into or access the Singapore bank’s online and mobile services in a service outage that remains unresolved at press time. Source: Read More (Latest topics for ZDNet in Security)

Read More

[ThreatPost] Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack

All posts, ThreatPost

Visible says yes, user accounts were hijacked, but it denied a breach. As of today, users are still posting tales of forcibly changed passwords and getting stuck with bills for pricey new iPhones. Source: Read More (Threatpost)

Read More