November 2021
Titel
Delta Electronics CNCSoft
Veröffentlicht
30. November 2021 16:20
Text
This advisory contains mitigations for a Stack-based Buffer Overflow vulnerability in the Delta Electronics CNCSoft sofware management platform.
Titel
Johnson Controls CEM Systems AC2000
Veröffentlicht
30. November 2021 16:15
Text
This advisory contains mitigations for an Off-by-one Error vulnerability in the Johnson Controls CEM Systems AC2000 access control system.
Titel
Hitachi Energy Retail Operations and CSB Software
Veröffentlicht
30. November 2021 16:10
Text
This advisory contains mitigations for an Improper Access Control vulnerability in Hitachi Energy Retail Operations and CSB Software systems.
Titel
InHand Networks IR615 Router (Update A)
Veröffentlicht
30. November 2021 16:05
Text
This updated advisory is a follow-up to the original advisory titled ICSA-21-280-05 InHand Networks IR615 Router that was published October 7, 2021, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for numerous vulnerabilities in the InHand Networks IR615 Router.
Titel
Multiple RTOS (Update D)
Veröffentlicht
30. November 2021 16:00
Text
This updated advisory is a follow-up to the advisory update titled ICSA-21-119-04 Multiple RTOS (Update C) that was published August 17, 2021, to the ICS webpage on us-cert.cisa.gov. CISA is aware of a public report, known as “BadAlloc” that details vulnerabilities found in multiple real-time operating systems (RTOS) and supporting ...
Titel
Philips IntelliBridge EC 40 and EC 80 Hub
Veröffentlicht
18. November 2021 16:25
Text
This advisory contains mitigations for Use of Hard-coded Credentials, and Authentication Bypass Using an Alternate Path or Channel vulnerabilities in Philips IntelliBridge EC 40 and EC 80 Hub medical device interfacing modules.
Titel
Philips Patient Information Center iX (PIC iX) and Efficia CM Series
Veröffentlicht
18. November 2021 16:20
Text
This advisory contains mitigations for Improper Input Validation, Use of Hard-coded Cryptographic Key, and Use of a Broken or Risky Cryptographic Algorithm vulnerabilities in Philips Patient Information Center iX (PIC iX) and Efficia CM Series products.
Titel
Trane Symbio (Update A)
Veröffentlicht
18. November 2021 16:15
Text
The updated advisory is a follow-up to the original advisory titled ICSA-21-266-01 Trane Symbio that was published on September 23, 2021, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for a Code Injection vulnerability in Trane Symbio 700 and Symbio 800 controllers.
Titel
Philips Patient Monitoring Devices (Update B)
Veröffentlicht
18. November 2021 16:10
Text
This updated advisory is a follow-up to the advisory update titled ICSMA-20-254-01 Philips Patient Monitoring Devices (Update A) that was published August 31, 2020, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for Improper Neutralization of Formula Elements in a CSV File, Cross-site Scripting, Improper Authentication, Improper Check ...
Titel
Mitsubishi Electric Factory Automation Engineering Products (Update E)
Veröffentlicht
18. November 2021 16:05
Text
This updated advisory is a follow-up to the advisory update titled ICSA-20-212-04 Mitsubishi Electric Factory Automation Engineering Products (Update D) that was published July 27, 2021, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for an Unquoted Search Path or Element vulnerability in Mitsubishi Electric Factory Automation Engineering ...
Titel
VISAM Automation Base (VBASE) (Update B)
Veröffentlicht
18. November 2021 16:00
Text
This updated advisory is a follow-up to the advisory update titled ICSA-20-084-01 VISAM Automation Base (VBASE) (Update A) that was published July 8, 2021, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for Relative Path Traversal, Incorrect Default Permissions, Inadequate Encryption Strength, Insecure Storage of Sensitive Information, and ...
Titel
AA21-321A: Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities
Veröffentlicht
17. November 2021 15:00
Text
Original release date: November 17, 2021 | Last revised: November 19, 2021SummaryActions to Take Today to Protect Against Iranian State-Sponsored Malicious Cyber Activity • Immediately patch software affected by the following vulnerabilities: CVE-2021-34473, 2018-13379, 2020-12812, and 2019-5591. • Implement multi-factor authentication. • Use strong, unique passwords. Note: this advisory uses ...
Titel
Mitsubishi Electric GOT products
Veröffentlicht
16. November 2021 16:05
Text
This advisory contains mitigations for an Improper Input Validation vulnerability in Mitsubishi Electric human-machine interface (HMI) products.
Titel
Mitsubishi Electric FA Engineering Software Products (Update C)
Veröffentlicht
16. November 2021 16:00
Text
This updated advisory is a follow-up to the advisory update titled ICSA-21-049-02 Mitsubishi Electric FA Engineering Software Products (Update B) that was published July 29, 2021, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for Heap-based Buffer Overflow, and Improper Handling of Length Parameter Inconsistency vulnerabilities in Mitsubishi ...
Titel
Philips MRI 1.5T and 3T
Veröffentlicht
9. November 2021 16:35
Text
This advisory contains mitigations for Improper Access Control, Incorrect Ownership Assignment, and Exposure of Sensitive Information to an Unauthorized Actor vulnerabilities in Philips MRI 1.5T and 3T products.
Titel
Schneider Electric NMC cards and Embedded Devices
Veröffentlicht
9. November 2021 16:30
Text
This advisory contains mitigations for Cross-site Scripting, and Exposure of Sensitive Information to an Unauthorized Actor vulnerabilities in Schneider Electric NMC cards and Embedded Devices.
Titel
Schneider Electric GUIcon
Veröffentlicht
9. November 2021 16:25
Text
This advisory contains mitigations for Out-of-bounds Write, Use After Free, and Out-of-bounds Read vulnerabilities in Schneider Electric GUIcon software.
Titel
Siemens Nucleus RTOS TCP/IP Stack
Veröffentlicht
9. November 2021 16:20
Text
This advisory contains mitigations for several vulnerabilities found in Siemens Nucleus Net, Nucleus ReadyStart, and Capital VSTAR products. These vulnerabilities are related to real-time operating system (RTOS) networking and related services, including the TCP/IP stack.
Titel
mySCADA myDESIGNER
Veröffentlicht
9. November 2021 16:15
Text
This advisory contains mitigations for a Relative Path Traversal vulnerability in mySCADA myDESIGNER project creation software.
Titel
Advantech WebAccess HMI Designer (Update A)
Veröffentlicht
9. November 2021 16:00
Text
This updated advisory is a follow-up to the original advisory titled ICSA-21-173-01 Advantech WebAccess HMI Designer that was published June 22, 2021, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigation for Heap-based Buffer overflow, Out-of-bounds Write, and Improper Restriction of Operation Within the Bounds of a Memory Buffer ...
Titel
SSA-044112 V1.0: Multiple Vulnerabilities (NUCLEUS:13) in the TCP/IP Stack of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
The TCP/IP stack and related services (FTP, TFTP) of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contain several vulnerabilities, also known as “NUCLEUS:13” and as documented below. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends countermeasures ...
Titel
SSA-324955 V1.6 (Last Update: 2021-11-09): SAD DNS Attack in Linux Based Products
Veröffentlicht
9. November 2021 01:00
Text
A vulnerability made public under the name SAD DNS affects Domain Name System resolvers due to a vulnerability in the Linux kernel when handling ICMP packets. The Siemens products which are affected are listed below. For more information please see https://www.saddns.net/. Siemens has released updates for several affected products and ...
Titel
SSA-772220 V1.3 (Last Update: 2021-11-09): OpenSSL Vulnerabilities in Industrial Products
Veröffentlicht
9. November 2021 01:00
Text
OpenSSL has published a security advisory [0] about a vulnerability in OpenSSL versions 1.1.1 < 1.1.1k, that allows an unauthenticated attacker to cause a Denial-of-Service (DoS) if a maliciously crafted renegotiation message is sent. Siemens has released updates for several affected products and recommends to update to the latest versions. ...
Titel
SSA-705111 V1.1 (Last Update: 2021-11-09): Multiple Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
Security researchers discovered and disclosed 9 vulnerabilities in several DNS implementations, also known as “NAME:WRECK” vulnerabilities. The vulnerabilities described in this advisory are from this set. The DNS client of affected products contains multiple vulnerabilities related to the handling of DNS responses and requests. The most severe could allow an ...
Titel
SSA-675303 V1.2 (Last Update: 2021-11-09): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products
Veröffentlicht
9. November 2021 01:00
Text
WIBU Systems published information about two vulnerabilities and an associated fix release version of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2021-20093 and CVE-2021-20094. ...

Letzte Updates

BOSCH PSIRT
31.10.2024
SIEMENS CERT
26.11.2024
US CERT
08.11.2024
US CERT (ICS)
26.11.2024

Nach Quelle

Archiv

2024
2023
2022
2021
2020
2019
2018
2017

Feeds