November 2021
Titel
Philips Patient Monitoring Devices (Update B)
Veröffentlicht
18. November 2021 16:10
Text
This updated advisory is a follow-up to the advisory update titled ICSMA-20-254-01 Philips Patient Monitoring Devices (Update A) that was published August 31, 2020, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for Improper Neutralization of Formula Elements in a CSV File, Cross-site Scripting, Improper Authentication, Improper Check ...
Titel
Mitsubishi Electric Factory Automation Engineering Products (Update E)
Veröffentlicht
18. November 2021 16:05
Text
This updated advisory is a follow-up to the advisory update titled ICSA-20-212-04 Mitsubishi Electric Factory Automation Engineering Products (Update D) that was published July 27, 2021, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for an Unquoted Search Path or Element vulnerability in Mitsubishi Electric Factory Automation Engineering ...
Titel
VISAM Automation Base (VBASE) (Update B)
Veröffentlicht
18. November 2021 16:00
Text
This updated advisory is a follow-up to the advisory update titled ICSA-20-084-01 VISAM Automation Base (VBASE) (Update A) that was published July 8, 2021, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for Relative Path Traversal, Incorrect Default Permissions, Inadequate Encryption Strength, Insecure Storage of Sensitive Information, and ...
Titel
AA21-321A: Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities
Veröffentlicht
17. November 2021 15:00
Text
Original release date: November 17, 2021 | Last revised: November 19, 2021SummaryActions to Take Today to Protect Against Iranian State-Sponsored Malicious Cyber Activity • Immediately patch software affected by the following vulnerabilities: CVE-2021-34473, 2018-13379, 2020-12812, and 2019-5591. • Implement multi-factor authentication. • Use strong, unique passwords. Note: this advisory uses ...
Titel
Mitsubishi Electric GOT products
Veröffentlicht
16. November 2021 16:05
Text
This advisory contains mitigations for an Improper Input Validation vulnerability in Mitsubishi Electric human-machine interface (HMI) products.
Titel
Mitsubishi Electric FA Engineering Software Products (Update C)
Veröffentlicht
16. November 2021 16:00
Text
This updated advisory is a follow-up to the advisory update titled ICSA-21-049-02 Mitsubishi Electric FA Engineering Software Products (Update B) that was published July 29, 2021, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for Heap-based Buffer Overflow, and Improper Handling of Length Parameter Inconsistency vulnerabilities in Mitsubishi ...
Titel
Philips MRI 1.5T and 3T
Veröffentlicht
9. November 2021 16:35
Text
This advisory contains mitigations for Improper Access Control, Incorrect Ownership Assignment, and Exposure of Sensitive Information to an Unauthorized Actor vulnerabilities in Philips MRI 1.5T and 3T products.
Titel
Schneider Electric NMC cards and Embedded Devices
Veröffentlicht
9. November 2021 16:30
Text
This advisory contains mitigations for Cross-site Scripting, and Exposure of Sensitive Information to an Unauthorized Actor vulnerabilities in Schneider Electric NMC cards and Embedded Devices.
Titel
Schneider Electric GUIcon
Veröffentlicht
9. November 2021 16:25
Text
This advisory contains mitigations for Out-of-bounds Write, Use After Free, and Out-of-bounds Read vulnerabilities in Schneider Electric GUIcon software.
Titel
Siemens Nucleus RTOS TCP/IP Stack
Veröffentlicht
9. November 2021 16:20
Text
This advisory contains mitigations for several vulnerabilities found in Siemens Nucleus Net, Nucleus ReadyStart, and Capital VSTAR products. These vulnerabilities are related to real-time operating system (RTOS) networking and related services, including the TCP/IP stack.
Titel
mySCADA myDESIGNER
Veröffentlicht
9. November 2021 16:15
Text
This advisory contains mitigations for a Relative Path Traversal vulnerability in mySCADA myDESIGNER project creation software.
Titel
Advantech WebAccess HMI Designer (Update A)
Veröffentlicht
9. November 2021 16:00
Text
This updated advisory is a follow-up to the original advisory titled ICSA-21-173-01 Advantech WebAccess HMI Designer that was published June 22, 2021, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigation for Heap-based Buffer overflow, Out-of-bounds Write, and Improper Restriction of Operation Within the Bounds of a Memory Buffer ...
Titel
SSA-312271 V1.9 (Last Update: 2021-11-09): Unquoted Search Path Vulnerabilities in Windows-based Industrial Software Applications
Veröffentlicht
9. November 2021 01:00
Text
Several industrial products as listed below contain a local privilege escalation vulnerabilities that could allow authorized local users with administrative privileges to execute custom code with SYSTEM level privileges. Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
SSA-324955 V1.6 (Last Update: 2021-11-09): SAD DNS Attack in Linux Based Products
Veröffentlicht
9. November 2021 01:00
Text
A vulnerability made public under the name SAD DNS affects Domain Name System resolvers due to a vulnerability in the Linux kernel when handling ICMP packets. The Siemens products which are affected are listed below. For more information please see https://www.saddns.net/. Siemens has released updates for several affected products and ...
Titel
SSA-772220 V1.3 (Last Update: 2021-11-09): OpenSSL Vulnerabilities in Industrial Products
Veröffentlicht
9. November 2021 01:00
Text
OpenSSL has published a security advisory [0] about a vulnerability in OpenSSL versions 1.1.1 < 1.1.1k, that allows an unauthenticated attacker to cause a Denial-of-Service (DoS) if a maliciously crafted renegotiation message is sent. Siemens has released updates for several affected products and recommends to update to the latest versions. ...
Titel
SSA-705111 V1.1 (Last Update: 2021-11-09): Multiple Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
Security researchers discovered and disclosed 9 vulnerabilities in several DNS implementations, also known as “NAME:WRECK” vulnerabilities. The vulnerabilities described in this advisory are from this set. The DNS client of affected products contains multiple vulnerabilities related to the handling of DNS responses and requests. The most severe could allow an ...
Titel
SSA-675303 V1.2 (Last Update: 2021-11-09): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products
Veröffentlicht
9. November 2021 01:00
Text
WIBU Systems published information about two vulnerabilities and an associated fix release version of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2021-20093 and CVE-2021-20094. ...
Titel
SSB-439005 V3.9 (Last Update: 2021-11-09): Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP
Veröffentlicht
9. November 2021 01:00
Text
Titel
SSA-362164 V1.1 (Last Update: 2021-11-09): Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
The networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) use Initial Sequence Numbers for TCP-Sessions that are predictable. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not available.
Titel
SSA-248289 V1.1 (Last Update: 2021-11-09): Denial of Service Vulnerabilities in the IPv6 Stack of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
The IPv6 stack of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contains two vulnerabilities when processing IPv6 headers which could allow an attacker to cause a denial of service condition. Siemens has released updates for several affected products and recommends to update to the latest versions. ...
Titel
SSA-201384 V1.1 (Last Update: 2021-11-09): Predictable UDP Port Number Vulnerability (NAME:WRECK) in the DNS Module of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
Security researchers discovered and disclosed 9 vulnerabilities in several DNS implementations, also known as “NAME:WRECK” vulnerabilities. The vulnerability described in this advisory is from this set. The DNS client of of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contains a vulnerability related to the handling of ...
Titel
SSA-185699 V1.1 (Last Update: 2021-11-09): Out of Bounds Write Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
Security researchers discovered and disclosed 9 vulnerabilities in several DNS implementations, also known as “NAME:WRECK” vulnerabilities. The vulnerabilities described in this advisory are from this set. The DNS client of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contains two out of bounds write vulnerabilities in the ...
Titel
SSA-917476 V1.0: Multiple Vulnerabilities in SCALANCE W1750D
Veröffentlicht
9. November 2021 01:00
Text
The Scalance W1750D device contains multiple vulnerabilities that could allow an attacker to execute code on the affected device(s), read arbitrary files, or create a denial-of-service condition. Siemens has released an update for the SCALANCE W1750D and recommends to update to the latest version. Siemens is preparing further updates and ...
Titel
SSA-840188 V1.0: Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products
Veröffentlicht
9. November 2021 01:00
Text
Multiple vulnerabilities were found in SIMATIC WinCC that ultimately could allow local attackers to escalate privileges and read, write or delete critical files. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens is preparing further updates and recommends specific countermeasures for products ...
Titel
SSA-779699 V1.0: Two Incorrect Authorization Vulnerabilities in Mendix
Veröffentlicht
9. November 2021 01:00
Text
Applications built with affected versions of Mendix Studio Pro do not properly control read or write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects or to retrieve the changedDate attribute of arbitrary objects. Mendix has released updates for the affected product ...

Letzte Updates

BOSCH PSIRT
21.08.2024
SIEMENS CERT
12.09.2024
US CERT
19.09.2024
US CERT (ICS)
19.09.2024

Nach Quelle

Archiv

2024
2023
2022
2021
2020
2019
2018
2017

Feeds