SIEMENS CERT
08/11/2020
Products that include the Siemens PROFINET-IO (PNIO) stack in versions prior V06.00 are potentially affected by a denial-of-service vulnerability when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface. Siemens has released updates for several affected products, and recommends that customers update to the new version. Siemens is …
SIEMENS CERT
08/11/2020
SSA-604937 (Last Update: 2020-08-11): Multiple Web Server Vulnerabilities in Opcenter Execution Core
Opcenter Execution Core (formerly known as Camstar Enterprise Platform) contains a Cross-Site-Scripting, an SQL injection and an information disclosure vulnerability. Siemens recommends to update to the latest version of Opcenter Execution Core that fixes two vulnerabilities and recommends specific countermeasures for the remaining vulnerability.
SIEMENS CERT
08/11/2020
The firmware for SCALANCE S-600 family devices contains multiple web vulnerabilities. The vulnerabilities could allow an remote attacker to conduct Denial-of-Service attacks or perform Cross-Site Scripting attacks. Siemens recommends specific countermeasures for products where updates are not, or not yet available.
SIEMENS CERT
08/11/2020
Various industrial products use the Discovery Service of the OPC UA protocol stack by the OPC foundation https://github.com/OPCFoundation/UA-.NETStandard and could therefore be affected by the remote resource consumption attacks (CVE-2017-12069).
SIEMENS CERT
08/11/2020
A vulnerability in the affected devices could allow an unauthorized attacker with network access to the webserver of an affected device to perform a denial-of-service attack. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing further updates and recommends specific …
SIEMENS CERT
08/11/2020
Several industrial devices are affected by two vulnerabilities that could allow an attacker to cause a Denial-of-Service condition via PROFINET DCP network packets under certain circumstances. The precondition for this scenario is a direct layer 2 access to the affected products. PROFIBUS interfaces are not affected. Siemens has released updates …
SIEMENS CERT
07/14/2020
A clear text transmission vulnerability in SIMATIC HMI panels could allow an attacker to access sensitive information under certain circumstances. Siemens recommends specific countermeasures to mitigate this vulnerability.
SIEMENS CERT
07/14/2020
There is an access mode used during manufacturing of SIMATIC S7-1200 and S7-200 SMART CPUs that allows additional diagnostic functionality. Using this functionality requires physical access to the CPU during boot process. If additional protection from unauthorized use is needed Siemens provides specific countermeasures via an update of the device …