• 1 (current)
  • 2
Freitag, 18.12.2020
Titel
ctrlX Products affected by OpenSSL Vulnerability CVE-2020-1971
Veröffentlicht
18. Dezember 2020 01:00
Text

BOSCH-SA-274557: The OpenSSL Software Foundation has published information [1] for OpenSSL versions prior to 1.1.1i (1.1.1 – 1.1.1h) and 1.0.2x (1.0.2 – 1.0.2w) regarding a weakness in the `GENERAL_NAME_cmp` function. The vulnerability could allow an attacker to provoke a null pointer dereference, potentially leading to a denial of service. Multiple ...

Donnerstag, 17.12.2020
Titel
AA20-352A: Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations
Veröffentlicht
17. Dezember 2020 16:00
Text
Original release date: December 17, 2020 | Last revised: January 7, 2021SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises of U.S. government agencies, critical infrastructure entities, and private sector organizations by an advanced persistent threat (APT) actor beginning in at least March 2020. This APT actor has ...
Mittwoch, 16.12.2020
Titel
Denial of Service in PLC Runtime affecting Rexroth IndraMotion Products
Veröffentlicht
16. Dezember 2020 01:00
Text

BOSCH-SA-152060: The control systems IndraMotion MTX, MLC and MLD sold by Bosch Rexroth contain technology from CODESYS GmbH. The manufacturer published security bulletins [1], [2] about weaknesses in the communication interface of the PLC runtime. By exploiting these vulnerabilities, the control device can be put into a state in which ...

Titel
Multiple Vulnerabilities in 3S CODESYS Runtime in Rexroth PRC7000
Veröffentlicht
16. Dezember 2020 01:00
Text

BOSCH-SA-387388: The PRC7000 welding timer sold by Bosch Rexroth AG contains a CODESYS Soft-PLC Runtime from 3S. The manufacturer published security reports [1] about several weaknesses. By exploiting those weaknesses, an attacker can cause denial-of-service conditions or acquire user credentials. The vulnerabilities affect all firmware versions up to 1.11.3, and ...

Donnerstag, 10.12.2020
Titel
AA20-345A: Cyber Actors Target K-12 Distance Learning Education to Cause Disruptions and Steal Data
Veröffentlicht
10. Dezember 2020 18:00
Text
Original release date: December 10, 2020SummaryThis Joint Cybersecurity Advisory was coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC). The FBI, CISA, and MS-ISAC assess malicious cyber actors are targeting kindergarten through twelfth grade (K-12) ...
Dienstag, 08.12.2020
Titel
SSA-700697 V1.0: Denial-of-Service Vulnerability in Web Server of SIMATIC Controllers
Veröffentlicht
8. Dezember 2020 01:00
Text
SIMATIC ET 200SP Open Controller V20.8 and SIMATIC S7-1500 Software Controller V20.8 are affected by a denial-of-service vulnerability in the web server. Siemens has released updates for the affected products and recommends to update to the latest version.
Titel
SSA-712690 V1.0: Vulnerabilities in XHQ Operations Intelligence
Veröffentlicht
8. Dezember 2020 01:00
Text
Multiple vulnerabilities have been identified in the XHQ Operations Intelligence product line. These vulnerabilities could allow for data injection in the XHQ’s web interfaces. Siemens recommends to update XHQ Operations Intelligence product line to the newest version.
Titel
SSA-87240 V1.2 (Last Update: 2020-12-08): Vulnerabilities in SIEMENS LOGO!
Veröffentlicht
8. Dezember 2020 01:00
Text
Two vulnerabilities have been identified in SIEMENS LOGO!8 BM devices. The most severe vulnerability could allow an attacker to hijack existing web sessions. Siemens has released updates for the affected products and recommends that customers update to the latest version.
Titel
SSA-102144 V1.1 (Last Update: 2020-12-08): Code Execution Vulnerability in LOGO! Soft Comfort
Veröffentlicht
8. Dezember 2020 01:00
Text
A vulnerability was identified in LOGO! Soft Comfort. The vulnerability could allow an attacker to execute arbitrary code if the attacker tricks a legitimate user to open a manipulated project. Siemens has released an update for the LOGO! Soft Comfort and recommends that customers update to the latest version.
Titel
SSA-102233 V1.3 (Last Update: 2020-12-08): SegmentSmack in VxWorks-based Industrial Devices
Veröffentlicht
8. Dezember 2020 01:00
Text
The products listed below contain a vulnerability that could allow remote attackers to affect the availability of the devices under certain conditions. The underlying TCP stack can be forced to make very computation expensive calls for every incoming packet which can lead to a Denial-of-Service. Siemens is working on software ...
Titel
SSA-181018 V1.6 (Last Update: 2020-12-08): Heap Overflow Vulnerability in SCALANCE X switches, RUGGEDCOM Win, RFID 181EIP, and SIMATIC RF182C
Veröffentlicht
8. Dezember 2020 01:00
Text
SCALANCE X switches, RUGGEDCOM Win, RFID 181EIP, and SIMATIC RF182C are affected by a vulnerability that could allow an unprivileged attacker located in the same local network segment (OSI Layer 2) to gain system privileges by sending a specially crafted DHCP response to a client’s DHCP request. Siemens has released ...
Titel
SSA-312271 V1.4 (Last Update: 2020-12-08): Unquoted Search Path Vulnerabilities in Windows-based Industrial Software Applications
Veröffentlicht
8. Dezember 2020 01:00
Text
The latest update for affected products fix local privilege escalation vulnerabilities that could allow authorized local users with administrative privileges to execute custom code with SYSTEM level privileges. Siemens has released updates for some of the affected products, and is working on further updates. For the remaining affected products, Siemens ...
Titel
SSA-381684 V1.3 (Last Update: 2020-12-08): Improper Password Protection during Authentication in SIMATIC S7-300 and S7-400 CPUs and Derived Products
Veröffentlicht
8. Dezember 2020 01:00
Text
A vulnerability has been identified in SIMATIC S7-300 and S7-400 CPU families and derived products, which could result in credential disclosure. Siemens recommends countermeasures as there are currently no fixes available.
Titel
SSB-439005 V3.0 (Last Update: 2020-12-08): Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP
Veröffentlicht
8. Dezember 2020 01:00
Text
Titel
SSA-462066 V2.1 (Last Update: 2020-12-08): Vulnerability known as TCP SACK PANIC in Industrial Products
Veröffentlicht
8. Dezember 2020 01:00
Text
Multiple industrial products are affected by a vulnerability in the kernel known as TCP SACK PANIC. The vulnerability could allow a remote attacker to cause a denial of service condition. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing further ...
Titel
SSA-480230 V2.1 (Last Update: 2020-12-08): Denial-of-Service in Webserver of Industrial Products
Veröffentlicht
8. Dezember 2020 01:00
Text
A vulnerability in the affected devices could allow an unauthorized attacker with network access to the webserver of an affected device to perform a denial-of-service attack. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing further updates and recommends specific ...
Titel
SSA-534763 V1.2 (Last Update: 2020-12-08): Special Register Buffer Data Sampling (SRBDS) aka Crosstalk in Industrial Products
Veröffentlicht
8. Dezember 2020 01:00
Text
Security researchers published information on a vulnerability known as Crosstalk (INTEL-SA-00320). This vulnerability affects modern Intel processors to a varying degree. Several Siemens Industrial Products contain processors that are affected by the vulnerability. Siemens is preparing updates and recommends specific countermeasures until fixes are available.
Titel
SSA-542525 V1.2 (Last Update: 2020-12-08): Authentication Vulnerabilities in SIMATIC HMI Products
Veröffentlicht
8. Dezember 2020 01:00
Text
SIMATIC HMI Products are affected by two vulnerabilities that could allow a remote attacker to discover user passwords and obtain access to the Sm@rt Server via a brute-force attack. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Titel
SSA-542701 V1.2 (Last Update: 2020-12-08): Vulnerabilities in SIEMENS LOGO!
Veröffentlicht
8. Dezember 2020 01:00
Text
Multiple vulnerabilities have been identified in SIEMENS LOGO!8 BM devices. The most severe vulnerability could lead to an attacker reading and modifying the device configuration if the attacker has access to port 10005/tcp. Siemens has released an update for the LOGO! 8 BM (incl. SIPLUS variants) and recommends that customers ...
Titel
SSA-616472 V1.7 (Last Update: 2020-12-08): ZombieLoad and Microarchitectural Data Sampling Vulnerabilities in Industrial Products
Veröffentlicht
8. Dezember 2020 01:00
Text
Security researchers published information on vulnerabilities known as ZombieLoad and Microarchitectural Data Sampling (MDS). These vulnerabilities affect many modern processors from different vendors to a varying degree. Several Siemens Industrial Products contain processors that are affected by the vulnerabilities.
Titel
SSA-689942 V1.2 (Last Update: 2020-12-08): Denial-of-Service and DLL Hijacking Vulnerabilities in Multiple SIMATIC Software Products
Veröffentlicht
8. Dezember 2020 01:00
Text
Multiple SIMATIC Software products are affected by two vulnerabilities that could allow an attacker to manipulate project files that may lead to Remote Code Execution or Denial-of-Service attacks. Siemens has released updates to some of the affected products and recommends that customers update to the latest version. Siemens is preparing ...
Titel
SSA-712518 V1.1 (Last Update: 2020-12-08): Information Disclosure Vulnerability (Kr00k) in Industrial Wi-Fi Products
Veröffentlicht
8. Dezember 2020 01:00
Text
An information disclosure vulnerability (CVE-2019-15126, also known as Kr00k) could allow an attacker to read a discrete set of traffic over the air after a Wi-Fi device state change. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Titel
SSA-780073 V1.6 (Last Update: 2020-12-08): Denial-of-Service Vulnerability in PROFINET Devices via DCE-RPC Packets
Veröffentlicht
8. Dezember 2020 01:00
Text
Products that include the Siemens PROFINET-IO (PNIO) stack in versions prior V06.00 are potentially affected by a denial-of-service vulnerability when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing ...
Titel
SSA-817401 V1.1 (Last Update: 2020-12-08): Missing Authentication Vulnerability in SIEMENS LOGO!
Veröffentlicht
8. Dezember 2020 01:00
Text
A missing authentication vulnerability has been identified in SIEMENS LOGO!8 BM devices. The vulnerability could lead to an attacker reading and modifying the device configuration and obtain project files from the devices if the attacker has access to port 135/tcp.
Titel
SSA-841348 V1.4 (Last Update: 2020-12-08): Multiple Vulnerabilities in the UMC Stack
Veröffentlicht
8. Dezember 2020 01:00
Text
The latest update for the below listed products fixes two security vulnerabilities that could allow an attacker to cause a partial Denial-of-Service on the UMC component of the affected devices under certain circumstances, and one vulnerability that could allow an attacker to locally escalate privileges from a user with administrative ...
  • 1 (current)
  • 2

Letzte Updates

BOSCH PSIRT
31.10.2024
SIEMENS CERT
22.11.2024
US CERT
08.11.2024
US CERT (ICS)
21.11.2024

Nach Quelle

Archiv

2024
2023
2022
2021
2020
2019
2018
2017

Feeds