• 1
  • 2 (current)
Dienstag, 09.11.2021
Titel
SSA-755517 V1.0: Path Traversal Vulnerability in Siveillance Video DLNA Server
Veröffentlicht
9. November 2021 01:00
Text
Siemens has released hotfixes for Siveillance Video DLNA Server, which fix a path traversal vulnerability that could allow an authenticated remote attacker to access sensitive information on the DLNA server. Siemens has released updates for the DLNA server and recommends to apply the update on all installations where DLNA server ...
Titel
SSA-779699 V1.0: Two Incorrect Authorization Vulnerabilities in Mendix
Veröffentlicht
9. November 2021 01:00
Text
Applications built with affected versions of Mendix Studio Pro do not properly control read or write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects or to retrieve the changedDate attribute of arbitrary objects. Mendix has released updates for the affected product ...
Titel
SSA-840188 V1.0: Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products
Veröffentlicht
9. November 2021 01:00
Text
Multiple vulnerabilities were found in SIMATIC WinCC that ultimately could allow local attackers to escalate privileges and read, write or delete critical files. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens is preparing further updates and recommends specific countermeasures for products ...
Titel
SSA-917476 V1.0: Multiple Vulnerabilities in SCALANCE W1750D
Veröffentlicht
9. November 2021 01:00
Text
The Scalance W1750D device contains multiple vulnerabilities that could allow an attacker to execute code on the affected device(s), read arbitrary files, or create a denial-of-service condition. Siemens has released an update for the SCALANCE W1750D and recommends to update to the latest version. Siemens is preparing further updates and ...
Titel
SSA-185699 V1.1 (Last Update: 2021-11-09): Out of Bounds Write Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
Security researchers discovered and disclosed 9 vulnerabilities in several DNS implementations, also known as “NAME:WRECK” vulnerabilities. The vulnerabilities described in this advisory are from this set. The DNS client of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contains two out of bounds write vulnerabilities in the ...
Titel
SSA-201384 V1.1 (Last Update: 2021-11-09): Predictable UDP Port Number Vulnerability (NAME:WRECK) in the DNS Module of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
Security researchers discovered and disclosed 9 vulnerabilities in several DNS implementations, also known as “NAME:WRECK” vulnerabilities. The vulnerability described in this advisory is from this set. The DNS client of of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contains a vulnerability related to the handling of ...
Titel
SSA-114589 V1.0: Multiple Vulnerabilities in Nucleus RTOS based APOGEE and TALON Products
Veröffentlicht
9. November 2021 01:00
Text
Multiple vulnerabilities (also known as “NUCLEUS:13”) have be identified in the Nucleus RTOS (real-time operating system) and reported in the Siemens Security Advisory SSA-044112: https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf. The products listed below use affected versions of the Nucleus software and inherently contain these vulnerabilities. Siemens recommends specific countermeasures for products where updates are ...
Titel
SSA-312271 V1.9 (Last Update: 2021-11-09): Unquoted Search Path Vulnerabilities in Windows-based Industrial Software Applications
Veröffentlicht
9. November 2021 01:00
Text
Several industrial products as listed below contain a local privilege escalation vulnerabilities that could allow authorized local users with administrative privileges to execute custom code with SYSTEM level privileges. Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
SSA-362164 V1.1 (Last Update: 2021-11-09): Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
The networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) use Initial Sequence Numbers for TCP-Sessions that are predictable. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not available.
Titel
SSB-439005 V3.9 (Last Update: 2021-11-09): Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP
Veröffentlicht
9. November 2021 01:00
Text
Titel
SSA-675303 V1.2 (Last Update: 2021-11-09): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products
Veröffentlicht
9. November 2021 01:00
Text
WIBU Systems published information about two vulnerabilities and an associated fix release version of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2021-20093 and CVE-2021-20094. ...
Titel
SSA-705111 V1.1 (Last Update: 2021-11-09): Multiple Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
Security researchers discovered and disclosed 9 vulnerabilities in several DNS implementations, also known as “NAME:WRECK” vulnerabilities. The vulnerabilities described in this advisory are from this set. The DNS client of affected products contains multiple vulnerabilities related to the handling of DNS responses and requests. The most severe could allow an ...
Titel
SSA-772220 V1.3 (Last Update: 2021-11-09): OpenSSL Vulnerabilities in Industrial Products
Veröffentlicht
9. November 2021 01:00
Text
OpenSSL has published a security advisory [0] about a vulnerability in OpenSSL versions 1.1.1 < 1.1.1k, that allows an unauthenticated attacker to cause a Denial-of-Service (DoS) if a maliciously crafted renegotiation message is sent. Siemens has released updates for several affected products and recommends to update to the latest versions. ...
Titel
SSA-324955 V1.6 (Last Update: 2021-11-09): SAD DNS Attack in Linux Based Products
Veröffentlicht
9. November 2021 01:00
Text
A vulnerability made public under the name SAD DNS affects Domain Name System resolvers due to a vulnerability in the Linux kernel when handling ICMP packets. The Siemens products which are affected are listed below. For more information please see https://www.saddns.net/. Siemens has released updates for several affected products and ...
Titel
SSA-044112 V1.0: Multiple Vulnerabilities (NUCLEUS:13) in the TCP/IP Stack of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
The TCP/IP stack and related services (FTP, TFTP) of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contain several vulnerabilities, also known as “NUCLEUS:13” and as documented below. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends countermeasures ...
Titel
SSA-248289 V1.1 (Last Update: 2021-11-09): Denial of Service Vulnerabilities in the IPv6 Stack of Nucleus RTOS
Veröffentlicht
9. November 2021 01:00
Text
The IPv6 stack of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contains two vulnerabilities when processing IPv6 headers which could allow an attacker to cause a denial of service condition. Siemens has released updates for several affected products and recommends to update to the latest versions. ...
Titel
SSA-145157 V1.0: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V2.12
Veröffentlicht
9. November 2021 01:00
Text
SIMATIC RTLS Locating Manager before V2.12 contains multiple vulnerabilities that could allow an attacker to read sensitive data or trigger a denial-of-service condition of the application service. Siemens has released an update for the SIMATIC RTLS Locating Manager and recommends to update to the latest version.
Titel
SSA-328042 V1.0: File Parsing Vulnerabilities in OBJ Translator in NX
Veröffentlicht
9. November 2021 01:00
Text
Siemens NX is affected by two vulnerabilities that could be triggered when the application reads OBJ files. If a user is tricked to open a malicious file with the affected application, this could lead to an access violation, and potentially also to arbitrary code execution on the target host system. ...
Titel
SSA-338732 V1.0: Information Disclosure Vulnerability in Mendix
Veröffentlicht
9. November 2021 01:00
Text
Applications built with affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. This could allow a local attacker to read those documents by exploring the browser cache. Mendix has released updates for the affected product lines, ...
Titel
SSA-537983 V1.0: Local Code Execution Vulnerability in SENTRON powermanager V3
Veröffentlicht
9. November 2021 01:00
Text
SENTRON powermanager V3 is affected by a vulnerability that could allow a local attacker to inject arbitrary code and escalate privileges. Siemens has released a security patch for SENTRON powermanager V3.6 HF1 and recommends to update to the latest version and apply this patch.
Donnerstag, 04.11.2021
Titel
VISAM VBASE Editor
Veröffentlicht
4. November 2021 15:05
Text
This advisory contains mitigations for Improper Access Control, Cross-site Scripting, Using Components with Known Vulnerabilities, and Improper Restriction of XML External Entity Reference vulnerabilities in the VISAM VBASE Editor automation platform.
  • 1
  • 2 (current)

Letzte Updates

BOSCH PSIRT
31.10.2024
SIEMENS CERT
22.11.2024
US CERT
08.11.2024
US CERT (ICS)
21.11.2024

Nach Quelle

Archiv

2024
2023
2022
2021
2020
2019
2018
2017

Feeds