Siemens is aware of the nine malicious NuGet packages reported recently by Socket researchers.
- MyDbRepository (Last updated on May 13, 2023),
- MCDbRepository (Last updated on June 5, 2024),
- Sharp7Extend (Last updated on August 14, 2024),
- SqlDbRepository (Last updated on October 24, 2024),
- SqlRepository (Last updated on October 25, 2024),
- SqlUnicornCoreTest (Last updated on October 26, 2024),
- SqlUnicornCore (Last updated on October 26, 2024),
- SqlUnicorn.Core (Last updated on October 27, 2024), and
- SqlLiteRepository (Last updated on October 28, 2024).
Siemens has investigated these NuGet packages aimed at disrupting industrial operations. The malicious nature of the software seems to be only relevant to yet unknown, non-Siemens software which includes these packages. If this software implements a client to communicates with Siemens PLCs via legacy PUT/GET protocol, the manipulations can randomly close the connection to the device and/or cause silent failures when writing data to the PLC. The integrity of the PLC software is not affected.
Our internal analysis has confirmed that no Siemens products use any of these NuGet packages. Furthermore, these NuGet packages have not compromised any Siemens products.
Siemens will update this Siemens Security News article when new information becomes available.