DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

Siemens Central Plant Clocks to Attack

DigitalCIO Bureau by DigitalCIO Bureau
July 7, 2018
in Tech News
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Siemens informed that some of its SICLOCK central plant clocks are affected by several vulnerabilities, including ones that have been rated “critical.”Siemens SICLOCK devices are used to synchronize time in industrial plants. The central plant clock ensures stability in case of a failure or loss of reception at the primary time source.

According to the German industrial giant, SICLOCK systems are affected by a total of six vulnerabilities. Three of the flaws have been classified as critical. One of them allows an attacker with access to the network to cause the targeted device to enter a denial-of-service (DoS) condition and possibly reboot by sending it specially crafted packets.

“The core functionality of the device could be impacted. The time serving functionality recovers when time synchronization with GPS devices or other NTP servers are completed,” Siemens wrote in its advisory. “The vulnerability could impact the availability of the device, and could impact the integrity of the time service functionality of the device.”

Another critical vulnerability can be exploited by an attacker with access to UDP port 69 to modify the firmware on a targeted SICLOCK device. Access to the same port is also required for the exploitation of a different critical flaw that allows an attacker to modify the administrative client stored on the device and execute arbitrary code.

A high severity flaw disclosed by Siemens can allow a network attacker to bypass authentication, but exploitation requires the hacker to obtain specific information about the targeted device.

The remaining security holes are a medium severity issue that allows a man-in-the-middle (MitM) attacker to intercept unencrypted passwords stored in client configuration files, and a low severity bug that can be exploited by an attacker with admin access to the management interface to lock out legitimate users.

Four of the six vulnerabilities can be exploited without any user interaction. Siemens says it’s not aware of any instances where these flaws have been exploited for malicious purposes.

 

 

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

NetApp Teams Up with Google Cloud to Strengthen Data Infrastructure for Distributed Cloud

by DigitalCIO Bureau
April 17, 2026
0
NetApp Teams Up with Google Cloud to Strengthen Data Infrastructure for Distributed Cloud

NetApp announced a 4‑year Enterprise Agreement with Google Cloud to accelerate deployment of NetApp storage solutions within Google Distributed Cloud air‑gapped, Google’s sovereign cloud platform delivered in partnership...

Read moreDetails

Elastic Appoints Atul Ahuja as Area Vice President and General Manager for India

by DigitalCIO Bureau
April 17, 2026
0
Elastic Appoints Atul Ahuja as Area Vice President and General Manager for India

Elastic has named Atul Ahuja as its new Area Vice President and General Manager for India. Atul announced his appointment via LinkedIn post he steps into the role...

Read moreDetails

TCS and University of Cincinnati Announce ‘My First AI Job’ Program to Prepare Students for Entry-Level AI Careers

by DigitalCIO Bureau
April 16, 2026
0
TCS and University of Cincinnati Announce ‘My First AI Job’ Program to Prepare Students for Entry-Level AI Careers

The Exclusive Program Aims to Train Students in AI Skills to Help Build a Future-Ready American Workforce  Tata Consultancy Services has unveiled its new TCS My First AI...

Read moreDetails

HID’s 2026 State of Security and Identity Report: Identity Convergence Drives New Focus on Trust, Protection and User Choice

by DigitalCIO Bureau
April 16, 2026
0
HID’s 2026 State of Security and Identity Report: Identity Convergence Drives New Focus on Trust, Protection and User Choice

New research highlights seven trends shaping identity, access and trust, alongside rising ethical and privacy concerns HIDreleased its 2026 State of Security and Identity Report, revealing how organisations...

Read moreDetails

Adobe Teams Up with Tesco to Personalise Experiences and Reward Loyalty for Tesco’s Customers

by DigitalCIO Bureau
April 14, 2026
0
Adobe Teams Up with Tesco to Personalise Experiences and Reward Loyalty for Tesco’s Customers

Adobe and Tesco have announced a new strategic AI partnership aimed at delivering more personalised, timely and relevant shopping experiences to Tesco customers across digital channels. The deal...

Read moreDetails
Next Post

Canon Inc. completes acquisition of BriefCam Ltd.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Accenture Acquires Customer Management IT and SirfinPA

Accenture Acquires Faculty to Expand its AI Capabilities

January 8, 2026
Deloitte And AWS To Deepen Generative AI Driven Innovations For Indian Enterprises

Netskope Revolutionises SaaS Security Leveraging Power of Generative AI

June 8, 2024
Ascendion Leads The Charge in Generative AI

Ascendion Leads The Charge in Generative AI

August 3, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Infosys Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tata Consultancy Services TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?