November 2020
Titel
Real Time Automation EtherNet/IP
Veröffentlicht
17. November 2020 16:05
Text
This advisory contains mitigations for a Stack-based Buffer Overflow vulnerability in Real Time Automation 499ES EtherNet/IP Adaptor Source Code, a TCP/IP stack.
Titel
Schneider Electric Interactive Graphical SCADA System (IGSS)
Veröffentlicht
17. November 2020 16:00
Text
This advisory contains mitigations for Improper Restriction of Operations within the Bounds of a Memory Buffer, Out-of-bounds Write, and Out-of-bounds Read vulnerabilities in Schneider Electric's Interactive Graphical SCADA System (IGSS).
Titel
BD Alaris 8015 PC Unit and BD Alaris Systems Manager
Veröffentlicht
12. November 2020 16:05
Text
This advisory contains mitigations for an Improper Authentication vulnerability in BD Alaris 8015 PC Unit and BD Alaris Systems Manager. BD Alaris is an infusion pump system.
Titel
SSA-431802 (Last Update: 2020-11-10): Multiple Vulnerabilities in SCALANCE W1750D
Veröffentlicht
10. November 2020 01:00
Text
Siemens SCALANCE W1750D is a brandlabled device. Aruba has released a related security advisory (ARUBA-PSA-2016-004) [0] disclosing vulnerabilities in its Aruba Instant product line. The advisory contains multiple related vulnerabilities that are summarized in CVE-2016-2031. This advisory is a reminder to customers that the PAPI protocol is not a secure ...
Titel
SSA-455843 (Last Update: 2020-11-10): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens and Siemens Energy Products
Veröffentlicht
10. November 2020 01:00
Text
CISA and WIBU Systems disclosed six vulnerabilities in different versions of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens and Siemens Energy products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2020-14509, CVE-2020-14513, CVE-2020-14515, ...
Titel
SSA-841348 (Last Update: 2020-11-10): Multiple Vulnerabilities in the UMC Stack
Veröffentlicht
10. November 2020 01:00
Text
The latest update for the below listed products fixes two security vulnerabilities that could allow an attacker to cause a partial Denial-of-Service on the UMC component of the affected devices under certain circumstances, and one vulnerability that could allow an attacker to locally escalate privileges from a user with administrative ...
Titel
SSB-439005 (Last Update: 2020-11-10): Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP
Veröffentlicht
10. November 2020 01:00
Text
Titel
SSA-381684 (Last Update: 2020-11-10): Improper Password Protection during Authentication in SIMATIC S7-300 and S7-400 CPUs and Derived Products
Veröffentlicht
10. November 2020 01:00
Text
A vulnerability has been identified in SIMATIC S7-300 and S7-400 CPU families and derived products, which could result in credential disclosure. Siemens recommends countermeasures as there are currently no fixes available.
Titel
SSA-492828 (Last Update: 2020-11-10): Denial-of-Service Vulnerability in SIMATIC S7-300 CPUs and SINUMERIK Controller
Veröffentlicht
10. November 2020 01:00
Text
A vulnerability in S7-300 might allow an attacker to cause a Denial-of-Service condition on port 102 of the affected devices by sending specially crafted packets. Siemens is preparing updates and recommends specific countermeasures until fixes are available.
Titel
Mitsubishi Electric GT14 Model of GOT1000 Series
Veröffentlicht
5. November 2020 16:10
Text
This advisory contains mitigations for Improper Restriction of Operations within the Bounds of a Memory Buffer, Session Fixation, NULL Pointer Dereference, Improper Access Control, Argument Injection, and Resource Management Errors vulnerabilities in Mitsubishi Electric GT14 model of GOT1000 Series graphic operation terminals.
Titel
Mitsubishi Electric Factory Automation Engineering Products (Update A)
Veröffentlicht
5. November 2020 16:05
Text
This updated advisory is a follow-up to the original advisory titled ICSA-20-212-04 Mitsubishi Electric Factory Automation Engineering Products that was published July 30, 2020, to the ICS webpage to us-cert.cisa.gov. This advisory contains mitigations for an Unquoted Search Path or Element vulnerability in Mitsubishi Electric Factory Automation Engineering products.
Titel
Mitsubishi Electric MELSEC iQ-R Series (Update B)
Veröffentlicht
5. November 2020 16:00
Text
This updated advisory is a follow-up to the advisory update titled ICSA-20-161-02 Mitsubishi Electric MELSEC iQ-R Series (Update A) that was published June 16, 2020 to the ICS webpage to us-cert.cisa.gov. This advisory contains mitigations for a resource exhaustion vulnerability in the Mitsubishi Electric MELSEC iQ-R series programmable logic controllers.
Titel
WAGO Series 750-88x and 750-352
Veröffentlicht
3. November 2020 16:10
Text
This advisory contains mitigations for an Uncontrolled Resource Consumption vulnerability in the WAGO Fieldbus Ethernet coupler.
Titel
NEXCOM NIO50
Veröffentlicht
3. November 2020 16:05
Text
This advisory contains mitigations for Improper Input Validation, and Cleartext Transmission of Sensitive Information vulnerabilities in NEXCOM's NIO50 IoT Gateway.
Titel
ARC Informatique PcVue
Veröffentlicht
3. November 2020 16:00
Text
This advisory contains mitigations for Deserialization of Untrusted Data, Access to Critical Private Variable via Public Method, and Information Exposure of Sensitive Information to an Unauthorized Actor vulnerabilities in ARC Information PcVue SCADA products.
Oktober 2020
Titel
AA20-304A: Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data
Veröffentlicht
30. Oktober 2020 19:11
Text
Original release date: October 30, 2020 | Last revised: November 3, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 8 framework. See the ATT&CK for Enterprise version 8 for all referenced threat actor techniques. This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure ...
Titel
Mitsubishi Electric MELSEC iQ-R, Q and L Series
Veröffentlicht
29. Oktober 2020 15:15
Text
This advisory contains mitigations for an Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric's MELSEC iQ-R, Q and L Series programmable logic controllers.
Titel
Mitsubishi Electric MELSEC iQ-R
Veröffentlicht
29. Oktober 2020 15:10
Text
This advisory contains mitigations for Improper Restriction of Operations within the Bounds of a Memory Buffer, Session Fixation, NULL Pointer Dereference, Improper Access Control, Argument Injection, and Resource Management Errors vulnerabilities in Mitsubishi Electric's iQ-R programmable logic controllers.
Titel
Mitsubishi Electric MELSEC iQ-R Series (Update A)
Veröffentlicht
29. Oktober 2020 15:05
Text
This updated advisory is a follow-up to the original advisory titled ICSA-20-282-02 Mitsubishi Electric MELSEC iQ-R Series that was published October 8, 2020, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for an Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R Series modules.
Titel
AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector
Veröffentlicht
29. Oktober 2020 00:07
Text
Original release date: October 28, 2020 | Last revised: November 2, 2020SummaryThis advisory was updated to include information on Conti, TrickBot, and BazarLoader, including new IOCs and Yara Rules for detection. This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for ...
Titel
AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky
Veröffentlicht
27. Oktober 2020 18:00
Text
Original release date: October 27, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the ...
Titel
AA20-296B: Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems
Veröffentlicht
22. Oktober 2020 18:00
Text
Original release date: October 22, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that Iranian advanced persistent threat (APT) actors are likely intent on influencing and interfering with the U.S. elections to sow discord among voters and undermine public confidence in the ...
Titel
B. Braun OnlineSuite
Veröffentlicht
22. Oktober 2020 16:05
Text
This advisory contains mitigations for Relative Path Traversal, Uncontrolled Search Path Element, and Improper Neutralization of Formula Elements in a CSV File vulnerabilities in B. Braun's OnlineSuite.
Titel
B. Braun SpaceCom, Battery Pack SP with Wi-Fi, and Data module compactplus
Veröffentlicht
22. Oktober 2020 16:00
Text
This advisory contains mitigations for Cross-site Scripting, Open Redirect, XPath Injection, Session Fixation, Use of a One-way Hash without a Salt, Relative Path Traversal, Improper Verification of Cryptographic Signature, Improper Privilege Management, Use of Hard-coded Credentials, Active Debug Code, and Improper Access Control vulnerabilities in B. Braun's SpaceCom, Battery Pack ...
Titel
AA20-296A: Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets
Veröffentlicht
22. Oktober 2020 14:44
Text
Original release date: October 22, 2020SummaryThis joint cybersecurity advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor tactics and techniques This joint cybersecurity advisory—written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure ...

Letzte Updates

BOSCH PSIRT
31.10.2024
SIEMENS CERT
22.11.2024
US CERT
08.11.2024
US CERT (ICS)
21.11.2024

Nach Quelle

Archiv

2024
2023
2022
2021
2020
2019
2018
2017

Feeds