August 2020
Titel
SSA-809841 (Last Update: 2020-08-11): Buffer Overflow Vulnerability in Third-Party Component pppd
Veröffentlicht
11. August 2020 02:00
Text
The latest update for SCALANCE M-800 / S615 and RUGGEDCOM RM1224 devices fixes a buffer overflow vulnerability in the third party component pppd that could allow an attacker with network access to an affected device to execute custom code on the device. Siemens has released updates for affected devices and ...
Titel
SSA-312271 (Last Update: 2020-08-11): Unquoted Search Path Vulnerabilities in Windows-based Industrial Software Applications
Veröffentlicht
11. August 2020 02:00
Text
The latest update for affected products fix local privilege escalation vulnerabilities that could allow authorized local users with administrative privileges to execute custom code with SYSTEM level privileges. Siemens has released updates for some of the affected products, and is working on further updates. For the remaining affected products, Siemens ...
Titel
SSA-293562 (Last Update: 2020-08-11): Vulnerabilities in Industrial Products
Veröffentlicht
11. August 2020 02:00
Text
Several industrial devices are affected by two vulnerabilities that could allow an attacker to cause a Denial-of-Service condition via PROFINET DCP network packets under certain circumstances. The precondition for this scenario is a direct layer 2 access to the affected products. PROFIBUS interfaces are not affected. Siemens has released updates ...
Titel
SSA-346262 (Last Update: 2020-08-11): Denial-of-Service in Industrial Products
Veröffentlicht
11. August 2020 02:00
Text
Several industrial products are affected by a vulnerability that could allow remote attackers to conduct a Denial-of-Service (DoS) attack by sending specially crafted packets to port 161/udp (SNMP). Siemens has released updates for several affected products, and recommends that customers update to the new version. Siemens is preparing further updates ...
Titel
SSA-349422 (Last Update: 2020-08-11): Denial-of-Service in Industrial Real-Time (IRT) Devices
Veröffentlicht
11. August 2020 02:00
Text
A vulnerability in the affected products could allow an unauthorized attacker with network access to perform a denial-of-service attack resulting in loss of real-time synchronization. Siemens has released updates for several affected products, and recommends that customers update to the new version. Siemens is preparing further updates and recommends specific ...
Titel
SSA-102233 (Last Update: 2020-08-11): SegmentSmack in VxWorks-based Industrial Devices
Veröffentlicht
11. August 2020 02:00
Text
The latest updates for the affected products fix a vulnerability that could allow remote attackers to affect the availability of the devices under certain conditions. The underlying TCP stack can be forced to make very computation expensive calls for every incoming packet which can lead to a Denial-of-Service. Siemens is ...
Titel
SSA-370042 (Last Update: 2020-08-11): Cross-Site-Scripting (XSS) in SICAM A8000 RTUs
Veröffentlicht
11. August 2020 02:00
Text
The latest update for SICAM A8000 RTUs fixes a vulnerability that could allow attackers with network access to the device’s web server to perform a stored Cross-Site-Scripting attack. Siemens has released an update for SICAM A8000 RTUs and recommends to update as soon as possible.
Titel
SSA-388646 (Last Update: 2020-08-11): Local Privilege Escalation in Automation License Manager
Veröffentlicht
11. August 2020 02:00
Text
The latest update for Automation License Manager (ALM) fixes a vulnerability that could allow local users to locally escalate privileges and modify files that should be protected against writing. Siemens has released an update for ALM 6 and recommends that customers update to the latest version. Siemens recommends specific countermeasures ...
Titel
SSA-712518 (Last Update: 2020-08-11): Information Disclosure Vulnerability (Kr00k) in Industrial Wi-Fi Products
Veröffentlicht
11. August 2020 02:00
Text
An information disclosure vulnerability (CVE-2019-15126, also known as Kr00k) could allow an attacker to read a discrete set of traffic over the air after a Wi-Fi device state change. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Titel
SSA-786743 (Last Update: 2020-08-11): Code Injection Vulnerability in Advanced Reporting for Desigo CC and Desigo CC Compact
Veröffentlicht
11. August 2020 02:00
Text
The extension module Advanced Reporting for Desigo CC and Desigo CC Compact contains a code injection vulnerability, which could be exploited if the extension module is installed on the server and configured. Siemens has released patches for the affected products and recommends specific countermeasures for unpatched systems.
Titel
Robot Motion Servers
Veröffentlicht
4. August 2020 16:10
Text
This Alert contains a public report of a Remote Code Execution vulnerability affecting robot motion servers written in OEM exclusive programming languages running on the robot controller.
Titel
Treck TCP/IP Stack (Update F)
Veröffentlicht
4. August 2020 16:00
Text
This updated advisory is a follow-up to the original advisory titled ICSA-20-168-01 Treck TCP/IP Stack (Update E) that was published July 21, 2020, to the ICS webpage on us-cert.gov. This advisory contains mitigations for Improper Handling of Length Parameter Inconsistency, Improper Input Validation, Double Free, Out-of-bounds Read, Integer Overflow or ...
Juli 2020
Titel
Philips DreamMapper
Veröffentlicht
30. Juli 2020 16:20
Text
This advisory contains mitigations for an Insertion of Sensitive Information into Log File vulnerability in Philips DreamMapper mobile app.
Titel
Inductive Automation Ignition 8
Veröffentlicht
30. Juli 2020 16:15
Text
This advisory contains mitigations for a Missing Authorization vulnerability in #Inductive Automation Ignition 8 software.
Titel
Mitsubishi Electric Multiple Factory Automation Engineering Software Products
Veröffentlicht
30. Juli 2020 16:10
Text
This advisory contains mitigations for a Permission Issues vulnerability in Mitsubishi Electric Factory Automation Engineering software products.
Titel
Mitsubishi Electric Factory Automation Products Path Traversal
Veröffentlicht
30. Juli 2020 16:05
Text
This advisory contains mitigations for a Path Traversal vulnerability in Mitsubishi Electric Factory Automation products.
Titel
Mitsubishi Electric Factory Automation Engineering Products
Veröffentlicht
30. Juli 2020 16:00
Text
This advisory contains mitigations for an Unquoted Search Path or Element vulnerability in Mitsubishi Electric Factory Automation Engineering products.
Titel
Secomea GateManager
Veröffentlicht
28. Juli 2020 16:15
Text
This advisory contains mitigations for Improper Neutralization of Null Byte or NUL Character, Off-by-one Error, Use of Hard-coded Credentials, Use of Password Hash with Insufficient Computational Effort vulnerabilities in Secomea GateManager, a VPN server.
Titel
Softing Industrial Automation OPC
Veröffentlicht
28. Juli 2020 16:10
Text
This advisory contains mitigations for a Heap-based Buffer Overflow, and Uncontrolled Resource Consumption vulnerabilities in Softing Industrial Automation's OPC products.
Titel
HMS Industrial Networks eCatcher
Veröffentlicht
28. Juli 2020 16:05
Text
This advisory contains mitigations for a Stack-based Buffer Overflow vulnerability in HMS Industrial Networks eCatcher VPN client.
Titel
Delta Industrial Automation DOPSoft (Update A)
Veröffentlicht
28. Juli 2020 16:00
Text
This updated advisory is a follow-up to the original advisory titled ICSA-20-182-01 Delta Industrial Automation DOPSoft that was published June 30, 2020, on the ICS webpage on us-cert.gov. This advisory contains mitigations for out-of-bounds read and heap-based buffer overflow vulnerabilities in Delta Industrial Automation DOPSoft products.
Titel
AA20-209A: Potential Legacy Risk from Malware Targeting QNAP NAS Devices
Veröffentlicht
27. Juli 2020 14:20
Text
Original release date: July 27, 2020SummaryThis is a joint alert from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). CISA and NCSC are investigating a strain of malware known as QSnatch, which attackers used in late 2019 to target Network ...
Titel
AA20-206A: Threat Actor Exploitation of F5 BIG-IP CVE-2020-5902
Veröffentlicht
24. Juli 2020 12:59
Text
Original release date: July 24, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) is issuing this alert in response to recently disclosed exploits that target F5 BIG-IP devices that are vulnerable to CVE-2020-5902. F5 Networks, Inc. (F5) released a patch for CVE-2020-5902 on June 30, 2020.[1] Unpatched F5 BIG-IP devices are ...
Titel
AA20-205A: NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems
Veröffentlicht
23. Juli 2020 16:29
Text
Original release date: July 23, 2020SummaryNote: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise and ATT&CK for Industrial Control Systems frameworks for all referenced threat actor techniques and mitigations. Over recent months, cyber actors have demonstrated their continued willingness ...
Titel
Schneider Electric Triconex TriStation and Tricon Communication Module
Veröffentlicht
23. Juli 2020 16:00
Text
This advisory contains mitigations for Cleartext Transmission of Sensitive Information, Uncontrolled Resource Consumption, Hidden Functionality, and Improper Access Control vulnerabilities in Schneider Electric's Triconex TriStation and Tricon Communication Module products.

Letzte Updates

BOSCH PSIRT
10.06.2025
SIEMENS CERT
24.06.2025
US CERT
12.06.2025
US CERT (ICS)
01.07.2025

Nach Quelle

Archiv

2025
2024
2023
2022
2021
2020
2019
2018
2017

Feeds