Februar 2021
Titel
SSA-541017 V1.1 (Last Update: 2021-02-09): Embedded TCP/IP Stack Vulnerabilities (AMNESIA:33) in SIRIUS 3RW5 Modbus TCP and SENTRON PAC / 3VA Devices
Veröffentlicht
9. Februar 2021 01:00
Text
Security researchers discovered and disclosed 33 vulnerabilities in several open-source TCP/IP stacks for embedded devices, also known as “AMNESIA:33” vulnerabilities. The Siemens products mentioned below are affected by one of these vulnerabilities (CVE-2020-13988). Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens ...
Titel
SSA-534763 V1.3 (Last Update: 2021-02-09): Special Register Buffer Data Sampling (SRBDS) aka Crosstalk in Industrial Products
Veröffentlicht
9. Februar 2021 01:00
Text
Security researchers published information on a vulnerability known as Crosstalk (INTEL-SA-00320). This vulnerability affects modern Intel processors to a varying degree. Several Siemens Industrial Products contain processors that are affected by the vulnerability. Siemens is preparing updates and recommends specific countermeasures until fixes are available.
Titel
SSA-455843 V1.4 (Last Update: 2021-02-09): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens and Siemens Energy Products
Veröffentlicht
9. Februar 2021 01:00
Text
CISA and WIBU Systems disclosed six vulnerabilities in different versions of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens and Siemens Energy products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2020-14509, CVE-2020-14513, CVE-2020-14515, ...
Titel
SSB-439005 V3.1 (Last Update: 2021-02-09): Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP
Veröffentlicht
9. Februar 2021 01:00
Text
Titel
SSA-398519 V1.5 (Last Update: 2021-02-09): Vulnerabilities in Intel CPUs (November 2019)
Veröffentlicht
9. Februar 2021 01:00
Text
Intel has published information on vulnerabilities in Intel products in November 2019. In this advisory Siemens only explicitly mentions the vulnerabilities from the “Intel® CPU Security Advisory” and one vulnerability from “Intel® CSME, Intel® SPS, Intel® TXE, Intel® AMT, Intel® PTT and Intel® DAL Advisory” and lists the Siemens IPC ...
Titel
SSA-349422 V1.5 (Last Update: 2021-02-09): Denial-of-Service in Industrial Real-Time (IRT) Devices
Veröffentlicht
9. Februar 2021 01:00
Text
A vulnerability in the affected products could allow an unauthorized attacker with network access to perform a denial-of-service attack resulting in loss of real-time synchronization. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens is preparing further updates and recommends specific countermeasures ...
Titel
SSA-274900 V1.1 (Last Update: 2021-02-09): Use of hardcoded key in Scalance X devices under certain conditions
Veröffentlicht
9. Februar 2021 01:00
Text
Scalance X devices might not generate a unique random key after factory reset, and use a private key shipped with the firmware Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens is preparing further updates and recommends specific countermeasures for products where ...
Titel
SSA-139628 V1.1 (Last Update: 2021-02-09): Vulnerabilities in Web Server for Scalance X Products
Veröffentlicht
9. Februar 2021 01:00
Text
Several SCALANCE X switches contain vulnerabilities in the web server of the affected devices. An unauthenticated attacker could reboot, cause denial-of-service conditions and potentially impact the system by other means through heap and buffer overflow vulnerabilities. Siemens has released updates for several affected products and recommends to update to the ...
Titel
SSA-102233 V1.5 (Last Update: 2021-02-09): SegmentSmack in VxWorks-based Industrial Devices
Veröffentlicht
9. Februar 2021 01:00
Text
The products listed below contain a vulnerability that could allow remote attackers to affect the availability of the devices under certain conditions. The underlying TCP stack can be forced to make very computation expensive calls for every incoming packet which can lead to a Denial-of-Service. Siemens has released an update ...
Titel
SSA-100232 V1.2 (Last Update: 2021-02-09): Denial-of-Service vulnerability in SCALANCE X Switches
Veröffentlicht
9. Februar 2021 01:00
Text
A vulnerability in several SCALANCE X devices could allow an unauthenticated attacker with network access to an affected device to perform a denial-of-service. Siemens has released an update for SCALANCE X-200IRT and recommends to update to the latest version. Siemens recommends specific countermeasures for products where updates are not, or ...
Titel
SSA-944678 V1.0: Potential Password Protection Bypass in SIMATIC WinCC
Veröffentlicht
9. Februar 2021 01:00
Text
A vulnerability in the SIMATIC WinCC Graphics Designer tool could allow an attacker that has physical access to a machine running the software to get access to the user’s private password-protected pictures. Siemens has released an update for SIMATIC WinCC and recommends to update to the latest version. Siemens recommends ...
Titel
SSA-794542 V1.0: Insecure Folder Permissions in SIMARIS configuration
Veröffentlicht
9. Februar 2021 01:00
Text
The installation of SIMARIS configuration causes insecure folder permissions that could allow vertical privilege escalation. Siemens is preparing updates and recommends specific countermeasures until fixes are available.
Titel
SSA-686152 V1.0: Denial-of-Service Vulnerability in ARP Protocol of SCALANCE W780 and W740
Veröffentlicht
9. Februar 2021 01:00
Text
A Denial-of-Service vulnerability was found affecting the ARP protocol on older firmware versions of the SCALANCE W780 and W740 (IEEE 802.11n) devices. Siemens recommends to update to the latest version.
Titel
SSA-663999 V1.0: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.1.0.1
Veröffentlicht
9. Februar 2021 01:00
Text
Siemens has released version V13.1.0.1 for JT2Go and Teamcenter Visualization to fix multiple vulnerabilities that could be triggered when the products read files in different file formats (PAR, BMP, TIFF, CGM, TGA, PCT, HPG, PLT, RAS, ASM, DGN, DXF, DWG). If a user is tricked to opening of a malicious ...
Titel
SSA-536315 V1.0: Privilege escalation vulnerability in DIGSI 4
Veröffentlicht
9. Februar 2021 01:00
Text
A vertical privilege escalation vulnerability exists in DIGSI 4. Siemens has released an update for DIGSI 4 and recommends to update to the latest version.
Titel
SSA-428051 V1.0: Privilege Escalation Vulnerability in TIA Administrator
Veröffentlicht
9. Februar 2021 01:00
Text
The latest update for TIA Administrator, installed together with TIA Portal and PCS neo, fixes a privilege escalation vulnerability that could allow local users to escalate privileges and execute code as local SYSTEM user. Siemens has released an update for TIA Portal and recommends that customers update to the latest ...
Titel
SSA-362164 V1.0: Predictable Initial Sequence Numbers in Mentor Nucleus TCP stack
Veröffentlicht
9. Februar 2021 01:00
Text
Some versions of Mentor Nucleus ReadyStart and Nucleus NET use Initial Sequence Numbers for TCP- Sessions that are predictable. Siemens has released updates for the affected products and recommends to update to the latest version(s).
Titel
SSA-156833 V1.0: Zip-Slip Directory Traversal Vulnerability in SINEMA Server and SINEC NMS
Veröffentlicht
9. Februar 2021 01:00
Text
There exists a directory traversal vulnerability which allows arbitrary file upload to an affected system. This type of vulnerability is also known as ‘Zip-Slip’. An authenticated attacker could exploit this vulnerability to gain arbitrary code execution by uploading a new or modifying an existing file to an affected system. Siemens ...
Januar 2021
Titel
SSA-520004 V1.0: Telnet Authentication Vulnerability in SIMATIC HMI Comfort Panels
Veröffentlicht
28. Januar 2021 01:00
Text
SIMATIC HMI Panels are affected by a vulnerability that could allow a remote attacker to gain full access to the device(s), if the telnet service is enabled. Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
Denial of Service in Rexroth ID 200/C-ETH using EtherNet/IP Protocol
Veröffentlicht
27. Januar 2021 01:00
Text

BOSCH-SA-775371: The ID 200/C-ETH (Rexroth No. 3842 410 060) sold by Bosch Rexroth contains communication technology (499ES EtherNet/IP) from Real Time Automation (RTA) in which a critical vulnerability has been discovered. By exploiting the vulnerability an attacker can send a specially crafted packet that may result in a denial-of-service condition ...

Titel
Two Vulnerabilities in Bosch Fire Monitoring System (FSM)
Veröffentlicht
21. Januar 2021 01:00
Text

BOSCH-SA-332072-BT: Two vulnerabilties have been discovered affecting the Bosch Fire Monitoring System (FSM-2500 and FSM-5000). The critical issue applies to FSM systems with versions 5.2 and lower. Bosch rates these vulnerabilities with a CVSS v3.1 Base Score of 4.4 and 10.0 (medium and critical) and strongly recommends customers to update ...

Titel
SSA-646763 V1.0: DNSpooq - Dnsmasq Vulnerabilities in SCALANCE and RUGGEDCOM Devices
Veröffentlicht
19. Januar 2021 01:00
Text
Security researchers discovered and disclosed seven vulnerabilities in the open-source DNS component “dnsmasq”, also known as “DNSpooq” vulnerabilities (CVE-2020-25681 through CVE-2020-25687). Three vulnerabilities (CVE-2020-25684 through CVE-2020-25686) affect the validation of DNS responses and impact several SCALANCE and RUGGEDCOM devices as listed below. Siemens is preparing updates and recommends countermeasures for ...
Titel
SSA-979834 V1.1 (Last Update: 2021-01-15): Multiple vulnerabilities in Solid Edge
Veröffentlicht
15. Januar 2021 01:00
Text
Solid Edge is affected by multiple vulnerabilities that could allow arbitrary code execution on an affected system. Siemens has released an update for Solid Edge and recommends to update to the latest version.
Titel
SOOIL Dana Diabecare RS Products
Veröffentlicht
12. Januar 2021 17:00
Text
This advisory contains mitigations for Use of Hard Coded Credentials, Insufficiently Protected Credentials, Use of Insufficiently Random Values, Use of Client-side Authentication, Client-side Enforcement of Server-side Security, Authentication Bypass by Capture-Replay, Unprotected Transport of Credentials, Key Exchange Without Entity Authentication, and Authentication Bypass by Spoofing vulnerabilities in SOOIL Dana Diabecare ...
Titel
Schneider Electric EcoStruxure Power Build-Rapsody
Veröffentlicht
12. Januar 2021 16:55
Text
This advisory contains mitigations for an Unrestricted Upload of File with Dangerous Type vulnerability in the Schneider Electric EcoStruxure Power Build-Rapsody software.

Letzte Updates

BOSCH PSIRT
14.08.2025
SIEMENS CERT
26.08.2025
US CERT
25.08.2025
US CERT (ICS)
04.09.2025

Nach Quelle

Archiv

2025
2024
2023
2022
2021
2020
2019
2018
2017

Feeds