Februar 2020
Titel
SSA-763427 (Last Update: 2020-02-10): Vulnerability in Communication Processor (CP) modules CP 343-1, TIM 3V-IE, TIM 4R-IE, and CP 443-1
Veröffentlicht
10. Februar 2020 01:00
Text
Siemens has released updates for Communication Processor (CP) module families CP 343-1/TIM 3V-IE/TIM 4R-IE/CP 443-1 to resolve an authentication bypass vulnerability that could allow unauthenticated users to perform administrative operations under certain conditions.
Titel
SSA-635659 (Last Update: 2020-02-10): Heartbleed Vulnerability in Siemens Industrial Products
Veröffentlicht
10. Februar 2020 01:00
Text
The "Heartbleed" vulnerability in the OpenSSL cryptographic software library (CVE-2014-0160) affects several Siemens industrial products. Siemens has resolved the issue in all affected industrial products and provides updates which fix this vulnerability.
Titel
SSA-542701 (Last Update: 2020-02-10): Vulnerabilities in SIEMENS LOGO!
Veröffentlicht
10. Februar 2020 01:00
Text
Multiple vulnerabilities have been identified in SIEMENS LOGO!8 BM devices. The most severe vulnerability could lead to an attacker reading and modifying the device configuration if the attacker has access to port 10005/tcp.
Titel
SSA-168644 (Last Update: 2020-02-10): Spectre and Meltdown Vulnerabilities in Industrial Products
Veröffentlicht
10. Februar 2020 01:00
Text
Security researchers published information on vulnerabilities known as Spectre and Meltdown. These vulnerabilities affect many modern processors from different vendors to a varying degree. Several Industrial Products include affected processors and are affected by the vulnerabilities.
Titel
SSA-731239 (Last Update: 2020-02-10): Vulnerabilities in SIMATIC S7-300 and S7-400 CPUs
Veröffentlicht
10. Februar 2020 01:00
Text
Two vulnerabilities have been identified in SIMATIC S7-300 and S7-400 CPU families. One vulnerability could lead to a Denial-of-Service, the other vulnerability could result in credential disclosure. Siemens recommends specific mitigations. Siemens will update this advisory when new information becomes available.
Titel
SSA-087240 (Last Update: 2020-02-10): Vulnerabilities in SIEMENS LOGO!
Veröffentlicht
10. Februar 2020 01:00
Text
Two vulnerabilities have been identified in SIEMENS LOGO!8 BM devices. The most severe vulnerability could allow an attacker to hijack existing web sessions. Siemens provides LOGO!8 BM FS-05 with firmware version V1.81.2, which fixes the first vulnerability, and recommends specific mitigations for the second vulnerability.
Titel
SSA-134003 (Last Update: 2020-02-10): Web Vulnerability in SIMATIC S7-1200 Family
Veröffentlicht
10. Februar 2020 01:00
Text
The latest firmware update for SIMATIC S7-1200 CPUs fixes a vulnerability that could allow an attacker to perform a CSRF (Cross-Site Request Forgery) attack under certain conditions.
Titel
SSA-130874 (Last Update: 2020-02-10): Multiple Security Vulnerabilities in SCALANCE X Switches
Veröffentlicht
10. Februar 2020 01:00
Text
A denial of service vulnerability was found in several Siemens Scalance X switches. Siemens addresses the vulnerability by two firmware upgrades. The web server of the vulnerable switches is susceptible to a remote denial of service attack. If the attack is executed, it causes a reboot of the device and ...
Titel
SSA-253230 (Last Update: 2020-02-10): Vulnerabilities in SIMATIC S7-1500 CPU family
Veröffentlicht
10. Februar 2020 01:00
Text
Siemens has released a firmware update for the SIMATIC S7-1500 CPU family which fixes two vulnerabilities. The more severe of these vulnerabilities could allow attackers to cause a Denial-of-Service under certain conditions.
Titel
SSA-623229 (Last Update: 2020-02-10): DROWN Vulnerability in Industrial Products
Veröffentlicht
10. Februar 2020 01:00
Text
The disclosed attack called DROWN (Decrypting RSA with Obsolete and Weakened eNcryption), also known as CVE-2016-0800, could potentially allow the decryption of SSL/TLS sessions of some Siemens industrial products under certain conditions. Siemens has released firmware updates and solutions to resolve the vulnerability
Titel
SSA-456423 (Last Update: 2020-02-10): Vulnerabilities in SIMATIC S7-1500 CPU family
Veröffentlicht
10. Februar 2020 01:00
Text
The new firmware update for the SIMATIC S7-1500 CPU firmware fixes several vulnerabilities, which may have been exploitable via network by Web application attacks or Denial-of-Service attacks with specially crafted network packets on different ports. Siemens addresses and fixes all of these issues by the new firmware update.
Titel
SSA-982399 (Last Update: 2020-02-10): Missing Authentication in TIM 1531 IRC Modules
Veröffentlicht
10. Februar 2020 01:00
Text
The latest update for TIM 1531 IRC fixes a vulnerability. The device was missing proper authentication when connecting on port 102/tcp, although configured. An attacker needs to be able to connect to port 102/tcp of an affected device in order to exploit this vulnerability. The vulnerability could allow an attacker ...
Titel
SSA-833048 (Last Update: 2020-02-10): Vulnerability in SIMATIC S7-1200 CPU Family
Veröffentlicht
10. Februar 2020 01:00
Text
Siemens became aware that the discontinued products SIMATIC S7-1200 CPUs prior to version 4 could allow for the circumvention of user program block protection under certain conditions.
Titel
SSA-293562 (Last Update: 2020-02-10): Vulnerabilities in Industrial Products
Veröffentlicht
10. Februar 2020 01:00
Text
Several industrial devices are affected by two vulnerabilities that could allow an attacker to cause a Denial-of-Service condition via PROFINET DCP network packets under certain circumstances. The precondition for this scenario is a direct layer 2 access to the affected products. PROFIBUS interfaces are not affected. Siemens has released updates ...
Titel
SSA-625789 (Last Update: 2020-02-10): Security Vulnerabilities in Siemens SIMATIC S7-1200 CPU
Veröffentlicht
10. Februar 2020 01:00
Text
Security experts have examined the SIMATIC S7-1200 Programmable Logic Controller (PLC). This research has revealed some weaknesses in the SIMATIC S71200 CPU communication and authentication functions. Once the automation network is compromised it is possible to demonstrate the following weaknesses using a remote exploit: - Trigger CPU functions by record ...
Titel
SSA-592007 (Last Update: 2020-02-10): Denial-of-Service Vulnerability in Industrial Products
Veröffentlicht
10. Februar 2020 01:00
Text
Several industrial controllers are affected by a security vulnerability that could allow an attacker to cause a Denial-of-Service condition via PROFINET DCP network packets under certain circumstances. Precondition for this scenario is a direct OSI Layer 2 access to the affected products. PROFIBUS interfaces are not affected. Siemens has released ...
Titel
SSA-742938 (Last Update: 2020-02-10): Open Ports in SINAMICS S/G Firmware
Veröffentlicht
10. Februar 2020 01:00
Text
A potential vulnerability was discovered in the SINAMICS S/G converter family which might allow attackers to access administrative functions on the device without authentication. Siemens addresses the issue by a firmware update.
Titel
AutomationDirect C-More Touch Panels
Veröffentlicht
4. Februar 2020 16:00
Text
This advisory contains mitigations for an insufficiently protected credentials vulnerability in AutomationDirect's C-More Touch Panels software management platform.
Januar 2020
Titel
Medtronic Conexus Radio Frequency Telemetry Protocol (Update A)
Veröffentlicht
30. Januar 2020 16:05
Text
This updated advisory is a follow-up to the original advisory titled ICSMA-19-080-01 Medtronic Conexus Radio Frequency Telemetry Protocol that was published March 21, 2019, on the ICS webpage on us-cert.gov. This medical advisory includes mitigations for improper access control and cleartext transmission of sensitive information vulnerabilities reported in Medtronic's proprietary ...
Titel
Medtronic 2090 Carelink Programmer Vulnerabilities (Update C)
Veröffentlicht
30. Januar 2020 16:00
Text
This updated advisory is a follow-up to the updated advisory titled ICSMA-18-058-01 Medtronic 2090 Carelink Programmer Vulnerabilities (Update B) that was published October 11, 2018, ICS webpage on us-cert.gov. This medical device advisory contains mitigation details for vulnerabilities in Medtronic’s 2090 CareLink Programmer and its accompanying software deployment network.
Titel
Path Traversal in Bosch Video Management System
Veröffentlicht
29. Januar 2020 01:00
Text

BOSCH-SA-381489-BT: A path traversal vulnerability exists in the BVMS. An authenticated BVMS user can successfully request and fetch arbitrary files from the Central Server machine using the FileTransferService. Bosch rates this vulnerability with a CVSS v3.1 Base Score of 7.7 (High) and strongly recommends customers to update vulnerable components with ...

Titel
Deserialization of Untrusted Data in Bosch BVMS Mobile Video Service
Veröffentlicht
29. Januar 2020 01:00
Text

BOSCH-SA-885551-BT: A recently discovered security vulnerability affects the BVMS Mobile Video Service (BVMS MVS). The vulnerability is exploitable via the network interface. Bosch rates this vulnerability with a CVSS v3.1 Base Score of 10.0 (Critical) and recommends customers to update the vulnerable components with fixed software versions. The vulnerability was ...

Titel
Path Traversal in Bosch Video Management System NoTouch deployment
Veröffentlicht
29. Januar 2020 01:00
Text

BOSCH-SA-815013-BT: A path traversal vulnerability exists in the BVMS NoTouch deployment. If this vulnerability is exploited an unauthenticated attacker without local shell access to a BVMS Central Server system is able to fetch arbitrary data from the file system of the Central Server computer. Under specific circumstances an attack can ...

Titel
Missing Authentication for Critical Function in Bosch Video Streaming Gateway
Veröffentlicht
29. Januar 2020 01:00
Text

BOSCH-SA-260625-BT: A recently discovered security vulnerability affects the Bosch Video Streaming Gateway (VSG). The vulnerability is exploitable via the network interface. An unauthorized attacker can retrieve and set arbitrary configuration data of the VSG. Bosch rates this vulnerability with a CVSS v3.1 Base Score of 10.0 (Critical) and strongly recommends ...

Titel
GE CARESCAPE, ApexPro, and Clinical Information Center systems
Veröffentlicht
23. Januar 2020 17:00
Text
This advisory contains mitigations for multiple vulnerabilities in the GE CARESCAPE ApexPro and Clinical Information Center (CIC) healthcare monitoring platforms.

Letzte Updates

BOSCH PSIRT
10.06.2025
SIEMENS CERT
18.07.2025
US CERT
12.06.2025
US CERT (ICS)
17.07.2025

Nach Quelle

Archiv

2025
2024
2023
2022
2021
2020
2019
2018
2017

Feeds