• 1
  • 2 (current)
Dienstag, 13.06.2023
Titel
SSA-968170 V1.0: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products
Veröffentlicht
13. Juni 2023 02:00
Text
SIMATIC STEP 7 and PCS 7 contain a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server. An attacker with network access to the server network could leverage these ...
Titel
SSA-942865 V1.0: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products
Veröffentlicht
13. Juni 2023 02:00
Text
Several SINAMICS MV (medium voltage) products are affected by multiple vulnerabilities in the integrated SCALANCE S615 device, as documented in SSA-419740 (https://cert-portal.siemens.com/productcert/html/ssa-419740.html). Siemens recommends to update the firmware of the integrated SCALANCE S615 device to the latest version. Siemens recommends specific countermeasures for products where the firmware update is not, ...
Titel
SSA-914026 V1.0: Local Code Execution Vulnerability in SIMATIC WinCC V7
Veröffentlicht
13. Juni 2023 02:00
Text
SIMATIC WinCC V7 is affected by a vulnerability that could allow a local attacker to inject arbitrary code and escalate privileges, if a non-default installation path was chosen during installation. Siemens has released an update for SIMATIC WinCC and recommends to update to the latest version.
Titel
SSA-887249 V1.0: Multiple Vulnerabilities in the Web Interface of SICAM Q200 Devices
Veröffentlicht
13. Juni 2023 02:00
Text
Multiple vulnerabilities were identified in the webserver of Q200 devices. These include Cross Site Request Forgery (CSRF), session fixation, missing secure flags in HTTP cookies and memory corruption issues due to missing input validation that could lead to remote code execution. Siemens has released an update for POWER METER SICAM ...
Titel
SSA-851884 V1.1 (Last Update: 2023-06-13): Authentication Bypass Vulnerability in Mendix SAML Module
Veröffentlicht
13. Juni 2023 02:00
Text
The Mendix SAML module insufficiently verifies the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application. Mendix has provided fix releases for the Mendix SAML module and recommends to update to the latest version. Note: For compatibility reasons, fix versions are introduced ...
Titel
SSA-831302 V1.0: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0
Veröffentlicht
13. Juni 2023 02:00
Text
Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP V1.0. Siemens is preparing updates and recommends countermeasures for products where updates are not, or not yet available.
Titel
SSA-824231 V1.4 (Last Update: 2023-06-13): Unauthenticated Firmware Upload Vulnerability in Desigo PX Controllers
Veröffentlicht
13. Juni 2023 02:00
Text
Several Desigo PXC/PXM devices contain a vulnerability that could allow unauthenticated remote attackers to upload malicious firmware without prior authentication. Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
SSA-794697 V1.0: Vulnerabilities in the Linux Kernel of the SIMATIC S7-1500 TM MFP V1.0
Veröffentlicht
13. Juni 2023 02:00
Text
Multiple vulnerabilities have been identified in the Linux Kernel of the SIMATIC S7-1500 TM MFP V1.0. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Titel
SSA-731916 V1.0: Multiple Vulnerabilities in CPCI85 Firmware of SICAM A8000 Devices
Veröffentlicht
13. Juni 2023 02:00
Text
The CPCI85 firmware of SICAM A8000 CP-8031 and CP-8050 is affected by multiple vulnerabilities such as authenticated remote command injection, exposure of serial UART interface, and hard coded credentials (for UART login). Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
SSA-712929 V2.1 (Last Update: 2023-06-13): Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products
Veröffentlicht
13. Juni 2023 02:00
Text
A vulnerability in the openSSL component (CVE-2022-0778, [0]) could allow an attacker to create a denial of service condition by providing specially crafted elliptic curve certificates to products that use a vulnerable version of openSSL. Siemens has released updates for several affected products and recommends to update to the latest ...
Titel
SSA-691715 V1.1 (Last Update: 2023-06-13): Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products
Veröffentlicht
13. Juni 2023 02:00
Text
A vulnerability was identified in OPC Foundation Local Discovery Server which also affects Siemens products that could allow an attacker to escalate privileges under certain circumstances. Siemens has released an update for SIMATIC WinCC and recommends to update to the latest version. Siemens is preparing further updates and recommends specific ...
Titel
SSA-572005 V1.2 (Last Update: 2023-06-13): Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices
Veröffentlicht
13. Juni 2023 02:00
Text
Session fixation and multiple incorrect parameter parsing vulnerabilities that could potentially lead to remote code execution were identified in the web server of SICAM P850 and SICAM P855 devices. Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
SSA-538795 V1.0: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Veröffentlicht
13. Juni 2023 02:00
Text
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities that could be triggered when the application reads malicious CGM files. If a user is tricked to open a malicious CGM file with the affected products, this could lead the application to crash or potentially lead to arbitrary ...
Titel
SSA-508677 V1.0: Use of Obsolete Function Vulnerability in SIMATIC WinCC before V8
Veröffentlicht
13. Juni 2023 02:00
Text
Before SIMATIC WinCC V8, legacy OPC services (OPC DA (Data Access), OPC HDA (Historical Data Access), and OPC AE (Alarms & Events)) were used per default. These services were designed on top of the Windows ActiveX and DCOM mechanisms and do not implement state-of-the-art security mechanisms for authentication and encryption ...
Titel
SSA-482956 V1.0: Information Disclosure Vulnerability in SIMOTION before V5.5
Veröffentlicht
13. Juni 2023 02:00
Text
SIMOTION contains an information disclosure vulnerability that could allow an unauthenticated attacker to extract confidential technology object (TO) configuration from the device. Siemens has released updates for the affected products and recommends to update to the latest versions.
Titel
SSA-120378 V1.2 (Last Update: 2023-06-13): Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Veröffentlicht
13. Juni 2023 02:00
Text
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities that could be triggered when the application reads malicious TIF, CGM or PDF files. If a user is tricked to open a malicious TIF, CGM or PDF file with the affected products, this could lead the application to ...
Titel
SSA-042050 V1.0: Know-How Protection Mechanism Failure in TIA Portal
Veröffentlicht
13. Juni 2023 02:00
Text
The know-how protection feature in Totally Integrated Automation Portal (TIA Portal) does not properly update the encryption of existing program blocks when a project file is updated. This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the ...
Montag, 12.06.2023
Titel
Understanding Ransomware Threat Actors: LockBit
Veröffentlicht
12. Juni 2023 18:22
Text
SUMMARY In 2022, LockBit was the most deployed ransomware variant across the world and continues to be prolific in 2023. Since January 2020, affiliates using LockBit have attacked organizations of varying sizes across an array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency ...
Donnerstag, 08.06.2023
Titel
​Sensormatic Electronics Illustra Pro Gen 4
Veröffentlicht
8. Juni 2023 14:00
Text
1. EXECUTIVE SUMMARY ​CVSS v3 8.3 ​ATTENTION: Exploitable via adjacent network ​Vendor: Sensormatic Electronics, a subsidiary of Johnson Controls, Inc. ​Equipment: Illustra Pro Gen 4 ​Vulnerability: Active Debug Code 2. RISK EVALUATION ​Successful exploitation of this vulnerability could allow an attacker to compromise device credentials over a long period of ...
Titel
Atlas Copco Power Focus 6000
Veröffentlicht
8. Juni 2023 14:00
Text
1. EXECUTIVE SUMMARY CVSS v3 6.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Atlas Copco Equipment: Power Focus 6000 Vulnerabilities: Cleartext Storage of Sensitive Information, Small Space of Random Values, Cleartext Transmission of Sensitive Information 2. RISK EVALUATION Successful exploitation of these vulnerabilities could cause a loss of sensitive information and ...
Dienstag, 06.06.2023
Titel
#StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability
Veröffentlicht
6. Juni 2023 22:58
Text
SUMMARY Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations ...
Titel
Mitsubishi Electric MELSEC iQ-R Series/iQ-F Series
Veröffentlicht
6. Juni 2023 14:00
Text
1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Equipment: MELSEC iQ-R Series/iQ-F Series EtherNet/IP Modules and EtherNet/IP Configuration tool Vulnerabilities: Weak Password Requirements, Use of Hard-coded Password, Missing Password Field Masking, Unrestricted Upload of File with Dangerous Type 2. RISK EVALUATION Successful exploitation of ...
Titel
Delta Electronics CNCSoft-B DOPSoft
Veröffentlicht
6. Juni 2023 14:00
Text
1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Delta Electronics Equipment: CNCSoft-B DOPSoft Vulnerabilities: Stack-based Buffer Overflow, Heap-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to exploit a buffer overflow condition and remotely execute arbitrary code. 3. TECHNICAL DETAILS 3.1 ...
Donnerstag, 01.06.2023
Titel
HID Global SAFE
Veröffentlicht
1. Juni 2023 14:00
Text
1. EXECUTIVE SUMMARY CVSS v3 7.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: HID Global Equipment: SAFE Vulnerabilities: Modification of Assumed-Immutable Data 2. RISK EVALUATION Successful exploitation of this vulnerability could result in exposure of personal data or create a denial-of-service condition. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions ...
  • 1
  • 2 (current)

Letzte Updates

BOSCH PSIRT
31.10.2024
SIEMENS CERT
22.11.2024
US CERT
08.11.2024
US CERT (ICS)
21.11.2024

Nach Quelle

Archiv

2024
2023
2022
2021
2020
2019
2018
2017

Feeds