April 2021
Titel
SSA-788287 V1.0: Disclosure of Private Data
Veröffentlicht
13. April 2021 02:00
Text
Due to SmartClient Installation technology (ClickOnce) a customer/integrator needs to create a customer specific Smartclient installer. The mentioned products delivered a trusted but yet expired codesigning certificate. An attacker could have exploited the vulnerability by spoofing the code-signing certificate and signing a malicious executable resulting in having a trusted digital ...
Titel
SSA-853866 V1.0: User Credentials Disclosure Vulnerability in Siveillance Video Open Network Bridge (ONVIF)
Veröffentlicht
13. April 2021 02:00
Text
Siemens has released hotfixes for Siveillance Video Open Network Bridge (ONVIF) which fix a security vulnerability related to unsecure storage of ONVIF user credentials. The vulnerability could allow an authenticated remote attacker to retrieve and decrypt all user credentials stored on the ONVIF server. Siemens recommends to apply the hotfixes ...
Titel
SSA-185699 V1.0: Out of Bounds Write Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus Products
Veröffentlicht
13. April 2021 02:00
Text
Security researchers discovered and disclosed 9 vulnerabilities in several DNS implementations, also known as “NAME:WRECK” vulnerabilities. The vulnerabilities described in this advisories are from this set. The DNS client of affected products contains two out of bounds write vulnerabilities in the handling of DNS responses that could allow an attacker ...
Titel
SSA-669158 V1.0: DNS Client Vulnerabilities in SIMOTICS CONNECT 400
Veröffentlicht
13. April 2021 02:00
Text
SIMOTICS CONNECT 400 is affected by DNS Client vulnerabilities as initially reported in Siemens Security Advisory SSA-705111 for the Mentor DNS Module. Siemens is preparing updates and recommends countermeasures for products where updates are not, or not yet available.
Titel
SSA-983300 V1.0: Vulnerabilities in LOGO! Soft Comfort
Veröffentlicht
13. April 2021 02:00
Text
Two vulnerabilities have been identified in the LOGO! Soft Comfort software. These could allow an attacker to take over a system with the affected software installed. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
März 2021
Titel
Denial of Service in Rexroth ActiveMover using Profinet protocol
Veröffentlicht
31. März 2021 02:00
Text

BOSCH-SA-637429: The ActiveMover with Profinet communication module (Rexroth no. 3842 559 445) sold by Bosch Rexroth contains communication technology from Hilscher (PROFINET IO Device V3) in which a vulnerability with high severity has been discovered. A Denial of Service vulnerability may lead to unexpected loss of cyclic communication or interruption ...

Titel
Denial of Service in Rexroth ActiveMover using EtherNet/IP protocol
Veröffentlicht
31. März 2021 02:00
Text

BOSCH-SA-282922: The ActiveMover with the EtherNet/IP communication module (Rexroth no. 3842 559 444) sold by Bosch Rexroth contains communication technology from Hilscher (EtherNet/IP Core V2) in which a vulnerability with high severity has been discovered. A denial of service and memory corruption vulnerability could allow arbitrary code to be injected ...

Titel
Uncontrolled Search Path Element in Multiple Bosch Products
Veröffentlicht
24. März 2021 01:00
Text

BOSCH-SA-835563-BT: Multiple Bosch software applications are affected by a security vulnerability, which potentially allows an attacker to load additional code in the form of DLLs (commonly known as "DLL Hijacking" or "DLL Preloading"). This code is executed during the start of the vulnerable application and in the context of the ...

Titel
AA21-077A: Detecting Post-Compromise Threat Activity Using the CHIRP IOC Detection Tool
Veröffentlicht
18. März 2021 19:00
Text
Original release date: March 18, 2021 | Last revised: April 15, 2021SummaryUpdated April 15, 2021: The U.S. Government attributes this activity to the Russian Foreign Intelligence Service (SVR). Additional information may be found in a statement from the White House. For more information on SolarWinds-related activity, go to https://us-cert.cisa.gov/remediating-apt-compromised-networks and ...
Titel
AA21-076A: TrickBot Malware
Veröffentlicht
17. März 2021 16:00
Text
Original release date: March 17, 2021 | Last revised: May 20, 2021SummaryThis Joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 8. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructure Security Agency (CISA) and Federal ...
Titel
GE UR family
Veröffentlicht
16. März 2021 15:10
Text
This advisory contains mitigations for multiple vulnerabilities in GE UR family of protection and control relays.
Titel
Hitachi ABB Power Grids AFS Series
Veröffentlicht
16. März 2021 15:05
Text
This advisory contains mitigations for an Infinite Loop vulnerability in Hitachi ABB Power Grids AFS Series products.
Titel
BD Alaris 8015 PC Unit (Update B)
Veröffentlicht
16. März 2021 15:00
Text
This updated advisory is a follow-up to the advisory update titled ICSMA-17-017-02 BD Alaris 8015 Insufficiently Protected Credentials Vulnerabilities (Update A) that was published October 19, 2017, to the ICS webpage on us-cert.cisa.gov. This advisory contains compensating controls to reduce the risk of exploitation of insufficiently protected credentials and security ...
Titel
Siemens SIMATIC S7-PLCSIM
Veröffentlicht
9. März 2021 17:40
Text
This advisory contains mitigations for Infinite Loop, NULL Pointer Dereference, and Divide by Zero vulnerabilities in Siemens SIMATIC S7-PLCSIM software.
Titel
Siemens SCALANCE and RUGGEDCOM Devices SSH
Veröffentlicht
9. März 2021 17:35
Text
This advisory contains mitigations for a n Improper Restriction of Excessive Authentication Attempts vulnerability in Siemens SCALANCE and RUGGEDCOM industrial communication devices.
Titel
Siemens SCALANCE and RUGGEDCOM Devices
Veröffentlicht
9. März 2021 17:30
Text
This advisory contains mitigations for a Stack-based Buffer Overflow vulnerability in Siemens SCALANCE and RUGGEDCOM industrial communication devices.
Titel
Siemens LOGO! 8 BM
Veröffentlicht
9. März 2021 17:20
Text
This advisory contains mitigations for an Improper Handling of Exceptional Conditions vulnerability in Siemens LOGO! BM programmable logic controllers.
Titel
TCP/IP Stack Vulnerabilities–AMNESIA:33 in SENTRON PAC / 3VA Devices
Veröffentlicht
9. März 2021 17:15
Text
This advisory contains mitigations for Out-of-bounds Read, and Out-of-bounds Write vulnerabilities in Siemens SENTRON PAC / 3VA Devices power monitoring devices.
Titel
Siemens TCP Stack of SIMATIC MV400
Veröffentlicht
9. März 2021 17:10
Text
This advisory contains mitigations for Improper Validation of Specified Index, Position, or Offset in Input; and Use of Insufficiently Random Values vulnerabilities in Siemens SIMATIC MV400 optical code reader software.
Titel
Siemens Energy PLUSCONTROL 1st Gen
Veröffentlicht
9. März 2021 17:05
Text
This advisory contains mitigations for a Predictable Exact Value from Previous Values vulnerability in Siemens Energy PLUSCONTROL 1st Gen energy management systems.
Titel
Siemens Solid Edge File Parsing
Veröffentlicht
9. März 2021 17:00
Text
This advisory contains mitigations for a Out-of-bounds Write, Improper Restriction of XML External Entity Reference, and Out-of-bounds Read vulnerabilities in Siemens Solid Edge portfolio software tools.
Titel
SSA-783481 V1.0: Denial-of-Service Vulnerability in LOGO! 8 BM
Veröffentlicht
9. März 2021 01:00
Text
A Denial-of-Service vulnerability has been identified in LOGO! 8 BM. This vulnerability could allow an attacker to crash a device, if a user is tricked into loading a malicious project file onto an affected device. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or ...
Titel
SSA-841348 V1.6 (Last Update: 2021-03-09): Multiple Vulnerabilities in the UMC Stack
Veröffentlicht
9. März 2021 01:00
Text
The latest update for the below listed products fixes two security vulnerabilities that could allow an attacker to cause a partial Denial-of-Service on the UMC component of the affected devices under certain circumstances, and one vulnerability that could allow an attacker to locally escalate privileges from a user with administrative ...
Titel
SSA-816980 V1.1 (Last Update: 2021-03-09): Multiple Web Vulnerabilities in SIMATIC MV400 Family
Veröffentlicht
9. März 2021 01:00
Text
The SIMATIC MV400 product family is affected by two web vulnerabilities. The vulnerabilities could allow an authenticated user to escalate privileges, or might expose sensitive information to an attacker that is able to eavesdrop the communication. Siemens has released an update for the SIMATIC MV400 family and recommends to update ...
Titel
SSA-780073 V1.7 (Last Update: 2021-03-09): Denial-of-Service Vulnerability in PROFINET Devices via DCE-RPC Packets
Veröffentlicht
9. März 2021 01:00
Text
Products that include the Siemens PROFINET-IO (PNIO) stack in versions prior V06.00 are potentially affected by a denial-of-service vulnerability when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing ...

Letzte Updates

BOSCH PSIRT
14.08.2025
SIEMENS CERT
26.08.2025
US CERT
25.08.2025
US CERT (ICS)
04.09.2025

Nach Quelle

Archiv

2025
2024
2023
2022
2021
2020
2019
2018
2017

Feeds