November 2024
Titel
SSA-629254 V1.2 (Last Update: 2024-11-12): Remote Code Execution Vulnerability in SIMATIC SCADA and PCS 7 systems
Veröffentlicht
12. November 2024 01:00
Text
The products listed below contain a remote code execution vulnerability that could allow an unauthenticated remote attacker to execute arbitrary code with high privileges. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures ...
Titel
SSA-000297 V1.0: Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.6
Veröffentlicht
12. November 2024 01:00
Text
RUGGEDCOM CROSSBOW Station Access Controller (SAC) contains multiple vulnerabilities in the integrated SQLite component that could allow an attacker to execute arbitrary code or to create a denial of service condition. Siemens has released a new version for RUGGEDCOM CROSSBOW Station Access Controller (SAC) and recommends to update to the ...
Titel
SSA-616032 V1.0: Local Privilege Escalation Vulnerability in Spectrum Power 7 Before V24Q3
Veröffentlicht
12. November 2024 01:00
Text
Spectrum Power 7 before V24Q3 contains several root-owned SUID binaries that could allow an authenticated local attacker to escalate privileges. Siemens has released a new version for Spectrum Power 7 and recommends to update to the latest version.
Titel
SSA-265688 V1.3 (Last Update: 2024-11-12): Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1
Veröffentlicht
12. November 2024 01:00
Text
Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1. Siemens is preparing fix versions and recommends specific countermeasures for products where fixes are not, or not yet available.
Titel
SSA-871035 V1.0: Session-Memory Deserialization Vulnerability in Siemens Engineering Platforms Before V19
Veröffentlicht
12. November 2024 01:00
Text
Affected products do not properly sanitize user-controllable input when parsing files. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further ...
Titel
SSA-773256 V1.1 (Last Update: 2024-11-12): Impact of Socket.IO CVE-2024-38355 on Siemens Industrial Products
Veröffentlicht
12. November 2024 01:00
Text
A Socket.IO vulnerability affects multiple Siemens industrial products. This vulnerability consists of a specially crafted Socket.IO packet that triggers an uncaught exception on the Socket.IO server killing the Node.js process allowing a remote attacker to cause Denial-of-Service condition in the affected products. Siemens has released new versions for several affected ...
Titel
SSA-914892 V1.0: Race Condition Vulnerability in Basic Authentication Implementation of Mendix Runtime
Veröffentlicht
12. November 2024 01:00
Text
The basic authentication mechanism of Mendix Runtime contains a race condition vulnerability which could allow unauthenticated remote attackers to circumvent default account lockout measures. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where fixes are ...
Titel
SSA-962515 V1.4 (Last Update: 2024-11-12): Out of Bounds Read Vulnerability in Industrial Products
Veröffentlicht
12. November 2024 01:00
Text
Several industrial products contain an out of bounds read vulnerability that could allow an attacker to cause a Blue Screen of Death (BSOD) crash of the underlying Windows kernel, leading to denial of service condition. Siemens has released new versions for several affected products and recommends to update to the ...
Titel
SSA-883918 V1.2 (Last Update: 2024-11-12): Information Disclosure Vulnerability in SIMATIC WinCC
Veröffentlicht
12. November 2024 01:00
Text
Multiple versions of SIMATIC WinCC and SIMATIC PCS 7 do not properly handle certain requests to their web application (WinCC WebNavigator, PCS 7 Web Server, and PCS 7 Web Diagnostics Server), which may lead to the leak of privileged information. This could allow an unauthenticated remote attacker to retrieve information ...
Titel
SSA-876787 V1.1 (Last Update: 2024-11-12): Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs
Veröffentlicht
12. November 2024 01:00
Text
Several SIMATIC S7-1500 and S7-1200 CPU versions are affected by an open redirect vulnerability that could allow an attacker to make the web server of affected devices redirect a legitimate user to an attacker-chosen URL. For a successful attack, the legitimate user must actively click on an attacker-crafted link. Siemens ...
Titel
SSA-723487 V1.2 (Last Update: 2024-11-12): RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products
Veröffentlicht
12. November 2024 01:00
Text
This advisory documents the impact of CVE-2024-3596 (also dubbed “Blastradius”), a vulnerability in the RADIUS protocol, to SCALANCE, RUGGEDCOM and related products. The vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., SCALANCE or RUGGEDCOM devices) and a RADIUS server (e.g., SINEC INS), to ...
Titel
SSA-915275 V1.0: Multiple Vulnerabilities in SINEC INS Before V1.0 SP2 Update 3
Veröffentlicht
12. November 2024 01:00
Text
SINEC INS before V1.0 SP2 Update 3 is affected by multiple vulnerabilities. Siemens has released a new version for SINEC INS and recommends to update to the latest version.
Oktober 2024
Titel
SSA-333468 V1.0: Multiple Vulnerabilities in InterMesh Subscriber Devices
Veröffentlicht
23. Oktober 2024 02:00
Text
InterMesh Subscriber devices contain multiple vulnerabilities that could allow an unauthenticated remote attacker to execute arbitrary code with root privileges. Siemens has released new versions for the affected products and recommends to update to the latest versions.
Titel
SSA-438590 V1.0: Buffer Overflow Vulnerability in Siveillance Video Camera Drivers
Veröffentlicht
10. Oktober 2024 02:00
Text
Several camera device drivers in the Siveillance Video Device Pack contain a buffer overflow vulnerability that could be exploited under strict conditions. This could allow an attacker to execute code with the permissions of the Recording Server user. Siemens has released an update of the Device Pack recommends to apply ...
Titel
SSA-097435 V1.3 (Last Update: 2024-10-10): Usernames Disclosure Vulnerability in Mendix Runtime
Veröffentlicht
10. Oktober 2024 02:00
Text
Mendix Runtime contains an observable response discrepancy vulnerability when validating usernames during authentication. This could allow unauthenticated remote attackers to distinguish between valid and invalid usernames. Siemens has released a new version for Mendix Runtime V8 and recommends to update to the latest version. Siemens is preparing further fix versions ...
Titel
SSA-783481 V1.3 (Last Update: 2024-10-08): Denial-of-Service Vulnerability in LOGO! 8 BM
Veröffentlicht
8. Oktober 2024 02:00
Text
A Denial-of-Service vulnerability has been identified in LOGO! 8 BM. This vulnerability could allow an attacker to crash a device, if a user is tricked into loading a malicious project file onto an affected device. The vulnerability is related to the hardware of the product. Siemens has released new hardware ...
Titel
SSA-711309 V2.1 (Last Update: 2024-10-08): Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products
Veröffentlicht
8. Oktober 2024 02:00
Text
The OPC UA implementations (ANSI C and C++) as used in several SIMATIC products contain a denial of service vulnerability that could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate. Siemens has released new versions for several affected products and ...
Titel
SSA-844582 V1.2 (Last Update: 2024-10-08): Electromagnetic Fault Injection in LOGO! V8.3 BM Devices Results in Broken LOGO! V8.3 Product CA
Veröffentlicht
8. Oktober 2024 02:00
Text
LOGO! V8.3 BM (incl. SIPLUS variants) devices contain a vulnerability that could allow an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed ...
Titel
SSA-850560 V1.0: Use of 4-Digit PIN in SENTRON PAC3200 Devices
Veröffentlicht
8. Oktober 2024 02:00
Text
SENTRON PAC3200 only provide a 4-digit PIN to protect from administrative access via Modbus TCP interface. Attackers with access to the Modbus TCP interface could easily bypass this protection by brute-force attacks or by monitoring the Modbus cleartext communication. Siemens recommends specific countermeasures for products where fixes are not, or ...
Titel
SSA-698820 V1.3 (Last Update: 2024-10-08): Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices
Veröffentlicht
8. Oktober 2024 02:00
Text
Fortinet has published information on vulnerabilities in FORTIOS. This advisory lists the related Siemens Industrial products. Siemens has released a new version of Fortigate NGFW for RUGGEDCOM APE1808 and recommends to update to the latest version. Siemens recommends to consult and implement the workarounds provided in Fortinet’s upstream security notifications.
Titel
SSA-959281 V1.0: XML File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Veröffentlicht
8. Oktober 2024 02:00
Text
Siemens Teamcenter Visualization and JT2Go are affected by stack buffer overflow and null pointer dereference vulnerabilities that could be triggered while parsing XML file. If a user is tricked to open a malicious XML file with any of the affected products, this could cause the application to crash or potentially ...
Titel
SSA-955858 V1.3 (Last Update: 2024-10-08): Multiple Vulnerabilities in LOGO! 8 BM Devices
Veröffentlicht
8. Oktober 2024 02:00
Text
LOGO! 8 BM (incl. SIPLUS variants) contains multiple web-related vulnerabilities. These could allow an attacker to execute code remotely, put the device into a denial of service state or retrieve parts of the memory. The vulnerabilities are related to the hardware of the product. Siemens has released new hardware versions ...
Titel
SSA-921449 V1.2 (Last Update: 2024-10-08): Plaintext Storage of a Password Vulnerability in LOGO! V8.3 BM Devices
Veröffentlicht
8. Oktober 2024 02:00
Text
LOGO! V8.3 BM (incl. SIPLUS variants) devices contain a plaintext storage of a password vulnerability. This could allow an attacker with phyiscal access to an affected device to extract user-set passwords from an embedded storage IC. Siemens has released new hardware versions with the LOGO! V8.4 BM and the SIPLUS ...
Titel
SSA-999588 V1.6 (Last Update: 2024-10-08): Multiple Vulnerabilities in User Management Component (UMC) Before V2.11.2
Veröffentlicht
8. Oktober 2024 02:00
Text
Siemens User Management Component (UMC) before V2.11.2 is affected by multiple vulnerabilities where the most severe could lead to a restart of the UMC server. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends ...
Titel
SSA-876787 V1.0: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs
Veröffentlicht
8. Oktober 2024 02:00
Text
Several SIMATIC S7-1500 and S7-1200 CPU versions are affected by an open redirect vulnerability that could allow an attacker to make the web server of affected devices redirect a legitimate user to an attacker-chosen URL. For a successful attack, the legitimate user must actively click on an attacker-crafted link. Siemens ...

Letzte Updates

BOSCH PSIRT
10.06.2025
SIEMENS CERT
12.06.2025
US CERT
12.06.2025
US CERT (ICS)
12.06.2025

Nach Quelle

Archiv

2025
2024
2023
2022
2021
2020
2019
2018
2017

Feeds