Mai 2023
Titel
SSA-473245 V2.6 (Last Update: 2023-05-09): Denial of Service Vulnerability in Profinet Devices
Veröffentlicht
9. Mai 2023 02:00
Text
A vulnerability in affected devices could allow an attacker to perform a denial of service attack if a large amount of specially crafted UDP packets are sent to the device. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures ...
Titel
SSA-552874 V1.1 (Last Update: 2023-05-09): Denial of Service Vulnerability in SIPROTEC 5 Devices
Veröffentlicht
9. Mai 2023 02:00
Text
Devices of the SIPROTEC 5 family contain a vulnerability related to secure client-initiated renegotiation. This could allow an unauthenticated attacker to cause a denial of service condition for the duration of the attack. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens ...
Titel
SSA-632164 V1.1 (Last Update: 2023-05-09): External Entity Injection Vulnerability in Polarion ALM
Veröffentlicht
9. Mai 2023 02:00
Text
Polarion ALM is vulnerable to XML External Entity (XXE) injection attack that could allow an attacker to potentially disclose confidential data. Siemens has released an update for Polarion ALM and recommends to update to the latest version.
Titel
SSA-892048 V1.0: Third-Party Component Vulnerabilities in SINEC NMS before V1.0.3.1
Veröffentlicht
9. Mai 2023 02:00
Text
Multiple vulnerabilities affecting third-party components libexpat and libcurl of SINEC NMS before V1.0.3.1 could allow an attacker to impact SINEC NMS confidentiality, integrity and availability. Siemens has released an update for SINEC NMS and recommends to update to the latest version.
Titel
SSA-640968 V1.1 (Last Update: 2023-05-09): Untrusted Search Path Vulnerability in TIA Project-Server formerly known as TIA Multiuser Server
Veröffentlicht
9. Mai 2023 02:00
Text
TIA Project-Server formerly known as TIA Multiuser Server contains an untrusted search path vulnerability that could allow an attacker to escalate privileges, when tricking a legitimate user to start the service from an attacker controlled path. Siemens has released updates for several affected products and recommends to update to the ...
Titel
SSA-325383 V1.0: Multiple Vulnerabilities in SCALANCE LPE9403 before V2.1
Veröffentlicht
9. Mai 2023 02:00
Text
SCALANCE LPE9403 is affected by multiple vulnerabilities that could allow an attacker to impact its confidentiality, integrity and availability. Siemens has released an update for the SCALANCE LPE9403 and recommends to update to the latest version.
Titel
SSA-322980 V1.1 (Last Update: 2023-05-09): Denial of Service Vulnerability in SIPROTEC 5 Devices
Veröffentlicht
9. Mai 2023 02:00
Text
SIPROTEC 5 devices contain a null pointer dereference vulnerability in the web service. This could allow an attacker to send unauthenticated maliciously crafted http request that could cause denial of service condition of the device. Siemens has released updates for several affected products and recommends to update to the latest ...
Titel
SSA-309571 V1.8 (Last Update: 2023-05-09): IPU 2021.1 Vulnerabilities in Siemens Industrial Products using Intel CPUs (June 2021)
Veröffentlicht
9. Mai 2023 02:00
Text
Intel has published information on vulnerabilities in Intel products in June 2021. This advisory lists the related Siemens Industrial products affected by these vulnerabilities that can be patched by applying the corresponding BIOS update. In this advisory we summarize: “2021.1 IPU – Intel® CSME, SPS and LMS Advisory” Intel-SA-00459, “2021.1 ...
Titel
SSA-113131 V1.5 (Last Update: 2023-05-09): Denial of Service Vulnerabilities in SIMATIC S7-400 CPUs
Veröffentlicht
9. Mai 2023 02:00
Text
Two vulnerabilities have been identified in the SIMATIC S7-400 CPU family that could allow an attacker to cause a denial of service condition. In order to exploit the vulnerabilities, an attacker must have access to the affected devices on port 102/tcp via Ethernet, PROFIBUS or Multi Point Interfaces (MPI). Siemens ...
Titel
SSA-116924 V1.1 (Last Update: 2023-05-09): Path Traversal Vulnerability in TIA Portal
Veröffentlicht
9. Mai 2023 02:00
Text
TIA Portal contains a path traversal vulnerability that could allow the creation or overwrite of arbitrary files in the engineering system. If the user is tricked to open a malicious PC system configuration file, an attacker could exploit this vulnerability to achieve arbitrary code execution. Siemens has released an update ...
Titel
SSA-592007 V2.1 (Last Update: 2023-05-09): Denial of Service Vulnerability in Industrial Products
Veröffentlicht
9. Mai 2023 02:00
Text
Several industrial controllers are affected by a security vulnerability that could allow an attacker to cause a denial of service condition via PROFINET DCP network packets under certain circumstances. Precondition for this scenario is a direct OSI Layer 2 access to the affected products. PROFIBUS interfaces are not affected. Siemens ...
Titel
SSA-382653 V1.3 (Last Update: 2023-05-09): Multiple Denial of Service Vulnerabilities in Industrial Products
Veröffentlicht
9. Mai 2023 02:00
Text
Affected SIMATIC firmware contains multiple vulnerabilities that could allow an unauthenticated attacker to perform a denial of service attack under certain conditions. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens is preparing further updates and recommends countermeasures for products where updates ...
Titel
SSA-349422 V2.0 (Last Update: 2023-05-09): Denial of Service Vulnerability in Industrial Real-Time (IRT) Devices
Veröffentlicht
9. Mai 2023 02:00
Text
A vulnerability in the affected products could allow an unauthorized attacker with network access to perform a denial-of-service attack resulting in loss of real-time synchronization. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are ...
Titel
Hunting Russian Intelligence “Snake” Malware
Veröffentlicht
8. Mai 2023 23:02
Text
SUMMARY The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive targets. To conduct operations using this tool, the FSB created a covert peer-to-peer (P2P) network of numerous Snake-infected computers worldwide. ...
Titel
Mitsubishi Electric Factory Automation Products
Veröffentlicht
2. Mai 2023 14:00
Text
1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Low attack complexity Vendor: Mitsubishi Electric Equipment: Factory Automation (FA) Products Vulnerabilities: Dependency on Vulnerable Third-Party Component 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a malicious attacker to escalate privileges, disclose parameter information in the affected products, and cause a ...
April 2023
Titel
Use of Telnet in the interface module SLC-0-GPNT00300
Veröffentlicht
28. April 2023 02:00
Text

BOSCH-SA-387640: The SLC-0-GPNT00300 from Bosch Rexroth contains technology from SICK AG. The manufacturer has published a security bulletin \[1\] regarding the availability of a Telnet interface for debugging.The SLC-0-GPNT00300 provides a Telnet interface for debugging, which is enabled by factory default.\No password is set in the default configuration.\If the password ...

Titel
Insecure authentication in B420 legacy communication module
Veröffentlicht
26. April 2023 02:00
Text

BOSCH-SA-341298-BT: An authentication vulnerability was found in the B420 Ethernet communication module from Bosch Security Systems. This is a legacy product which is currently obsolete and was announced to reach End on Life (EoL) on 2013. The B420 was last sold in July 2013 and was replaced by the B426. ...

Titel
Scada-LTS Third Party Component
Veröffentlicht
25. April 2023 14:00
Text
1. EXECUTIVE SUMMARY CVSS v3 6.5 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Scada-LTS Equipment: Scada-LTS Vulnerability: Cross-site Scripting 2. RISK EVALUATION Successful exploitation of this vulnerability could allow loss of sensitive information and execution of arbitrary code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of ...
Titel
Keysight N8844A Data Analytics Web Service
Veröffentlicht
25. April 2023 14:00
Text
1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Keysight Equipment: N8844A Data Analytics Web Service Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could lead to remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Keysight reports this vulnerability affects the ...
Titel
INEA ME RTU
Veröffentlicht
20. April 2023 14:00
Text
1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: INEA Equipment: ME RTU Vulnerability: OS Command Injection 2. RISK EVALUATION Successful exploitation of this vulnerability could allow remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of ME RTU, a remote terminal unit, are ...
Titel
Schneider Electric Easy UPS Online Monitoring Software
Veröffentlicht
18. April 2023 14:00
Text
1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: APC Easy UPS Online Monitoring Software, Schneider Electric Easy UPS Online Monitoring Software Vulnerabilities: Missing Authentication for Critical Function, Improper Handling of Case Sensitivity 2. RISK EVALUATION Successful exploitation of these vulnerabilities could result in ...
Titel
Omron CS/CJ Series
Veröffentlicht
18. April 2023 14:00
Text
1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Omron Equipment: SYSMAC CS/CJ Series Vulnerability: Missing Authentication for Critical Function 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to access sensitive information in the file system and memory. 3. TECHNICAL DETAILS 3.1 AFFECTED ...
Titel
APT28 Exploits Known Vulnerability to Carry Out Reconnaissance and Deploy Malware on Cisco Routers
Veröffentlicht
17. April 2023 22:32
Text
APT28 accesses poorly maintained Cisco routers and deploys malware on unpatched devices using CVE-2017-6742. Overview and Context The UK National Cyber Security Centre (NCSC), the US National Security Agency (NSA), US Cybersecurity and Infrastructure Security Agency (CISA) and US Federal Bureau of Investigation (FBI) are releasing this joint advisory to ...
Titel
Siemens SCALANCE X-200, X-200IRT, and X-300 Switch Families BadAlloc Vulnerabilities
Veröffentlicht
13. April 2023 14:00
Text
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). 1. EXECUTIVE SUMMARY CVSS v3 ...
Titel
Siemens SCALANCE XCM332
Veröffentlicht
13. April 2023 14:00
Text
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). 1. EXECUTIVE SUMMARY CVSS v3 ...

Letzte Updates

BOSCH PSIRT
21.08.2024
SIEMENS CERT
12.09.2024
US CERT
19.09.2024
US CERT (ICS)
19.09.2024

Nach Quelle

Archiv

2024
2023
2022
2021
2020
2019
2018
2017

Feeds