November 2022
Titel
Cradlepoint IBR600
Veröffentlicht
17. November 2022 16:00
Text
Titel
AA22-320A: Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester
Veröffentlicht
16. November 2022 16:04
Text
Original release date: November 16, 2022SummaryFrom mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) activity. In the course of incident response activities, CISA determined that cyber threat actors exploited the Log4Shell vulnerability ...
Titel
Siemens SINEC Network Management System Logback Component
Veröffentlicht
11. November 2022 05:25
Text
Titel
Siemens Parasolid
Veröffentlicht
10. November 2022 17:35
Text
Titel
Siemens Web Server Login Page of Industrial Controllers
Veröffentlicht
10. November 2022 17:30
Text
Titel
Siemens SINUMERIK ONE and SINUMERIK MC
Veröffentlicht
10. November 2022 17:20
Text
Titel
Siemens QMS Automotive
Veröffentlicht
10. November 2022 17:10
Text
Titel
Omron NJ/NX-series Machine Automation Controllers
Veröffentlicht
10. November 2022 17:05
Text
Titel
Omron NJNX-series
Veröffentlicht
10. November 2022 17:00
Text
Titel
Siemens Teamcenter Visualization and JT2Go
Veröffentlicht
10. November 2022 16:55
Text
Titel
SSA-362164 V1.2 (Last Update: 2022-11-08): Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS
Veröffentlicht
8. November 2022 01:00
Text
The networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) use Initial Sequence Numbers for TCP-Sessions that are predictable. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not available.
Titel
SSA-120378 V1.0: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Veröffentlicht
8. November 2022 01:00
Text
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities that could be triggered when the application reads malicious TIF, CGM or PDF files. If a user is tricked to open a malicious TIF, CGM or PDF file with the affected products, this could lead the application to ...
Titel
SSA-501891 V1.1 (Last Update: 2022-11-08): Cross-Site Scripting Vulnerability in SCALANCE X-200 and X-200IRT Families
Veröffentlicht
8. November 2022 01:00
Text
There is a cross-site scripting vulnerability that affects the SCALANCE switches. This vulnerability if used by a threat actor could result in the stealing of session cookies and session hijacking. Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
SSA-478960 V1.0: Missing CSRF Protection in the Web Server Login Page of Industrial Controllers
Veröffentlicht
8. November 2022 01:00
Text
The web server login page of affected products does not apply proper origin checking. This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack.. Siemens has released updates for several affected products and recommends to update to the latest versions. ...
Titel
SSA-400332 V1.1 (Last Update: 2022-11-08): Insufficient Design IP Protection in IEEE 1735 Recommended Practice - Impact to Questa and ModelSim
Veröffentlicht
8. November 2022 01:00
Text
A security research [1] identified weaknesses in the IEEE 1735 recommended practice for encryption of Design IP, which could allow a sophisticated attacker access to unencrypted Design IP data in IEEE 1735-compliant products. This advisory addresses the specific details for the affected Siemens software products: Questa and ModelSim simulators. Siemens ...
Titel
SSA-506569 V1.0: Multiple Vulnerabilities in SCALANCE W1750D
Veröffentlicht
8. November 2022 01:00
Text
The SCALANCE W1750D device contains multiple vulnerabilities that could allow an attacker to inject commands or exploit buffer overflow vulnerabilities which could lead to denial of service, unauthenticated remote code execution or stored XSS. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not ...
Titel
SSA-459643 V1.1 (Last Update: 2022-11-08): Denial of Service Vulnerability in RUGGEDCOM ROS before V5.6.0
Veröffentlicht
8. November 2022 01:00
Text
RUGGEDCOM ROS-based devices are vulnerable to a denial of service attack (Slowloris). By sending partial HTTP requests nonstop, with none completed, the affected web servers will be waiting for the completion of each request, occupying all available HTTP connections. The web server recovers by itself once the attack ends. Siemens ...
Titel
SSA-587547 V1.0: Unencrypted Storage of User Credentials in QMS Automotive
Veröffentlicht
8. November 2022 01:00
Text
QMS Automotive contains a vulnerability that stores user credentials in plantext within the user database. This could allow an attacker to read credentials from memory. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Titel
SSA-371761 V1.0: Arbitrary Code Execution Vulnerability in the Logback Component of SINEC NMS before V1.0.3
Veröffentlicht
8. November 2022 01:00
Text
SINEC NMS versions before V1.0.3 are affected by a vulnerability in the logback component (CVE-2021-42550) that could allow attackers with write access to the logback configuration file to execute arbitrary code on the system. Siemens has released an update for SINEC NMS and recommends to update to the latest version.
Titel
SSA-570294 V1.0: Multiple Vulnerabilities in SICAM Q100 Before V2.50
Veröffentlicht
8. November 2022 01:00
Text
SICAM Q100 devices contain multiple vulnerabilities that could allow an attacker to take over the session of a logged in user or to inject custom code. Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
SSA-568428 V1.0: Weak Key Protection Vulnerability in SINUMERIK ONE and SINUMERIK MC
Veröffentlicht
8. November 2022 01:00
Text
SINUMERIK ONE and SINUMERIK MC products are affected by a weak key protection vulnerability in the integrated S7-1500 CPU. The weak key protection vulnerability in the integrated S7-1500 CPU is documented in more detail in SSA-568427 [1]. Siemens is preparing updates and recommends specific countermeasures for products where updates are ...
Titel
SSA-552702 V1.1 (Last Update: 2022-11-08): Privilege Escalation Vulnerability in the Web Interface of SCALANCE and RUGGEDCOM Products
Veröffentlicht
8. November 2022 01:00
Text
The products listed below do not properly authorize the change password function of the web interface. This could allow low privileged users to escalate their privileges. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens is preparing further updates and recommends specific ...
Titel
SSA-853037 V1.0: File Parsing Vulnerabilities in Parasolid
Veröffentlicht
8. November 2022 01:00
Text
Parasolid is affected by out of bounds read/write vulnerabilities that could be triggered when the application reads files in X_T format. If a user is tricked to open a malicious file with the affected applications, an attacker could leverage the vulnerability to perform remote code execution in the context of ...
Titel
SSA-787941 V1.0: Denial of Service Vulnerability in RUGGEDCOM ROS V4
Veröffentlicht
8. November 2022 01:00
Text
RUGGEDCOM ROS-based V4 devices are vulnerable to a denial of service attack (Slowloris). By sending partial HTTP requests nonstop, with none completed, the affected web servers will be waiting for the completion of each request, occupying all available HTTP connections. The web server recovers by itself once the attack ends. ...
Titel
SSA-764417 V1.5 (Last Update: 2022-11-08): Weak Encryption Vulnerability in RUGGEDCOM ROS Devices
Veröffentlicht
8. November 2022 01:00
Text
The SSH server on RUGGEDCOM ROS devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. Siemens is preparing updates and recommends specific countermeasures ...

Letzte Updates

BOSCH PSIRT
15.01.2025
SIEMENS CERT
17.04.2025
US CERT
01.04.2025
US CERT (ICS)
17.04.2025

Nach Quelle

Archiv

2025
2024
2023
2022
2021
2020
2019
2018
2017

Feeds