November 2020
Title
Real Time Automation EtherNet/IP
Published
Nov. 17, 2020, 4:05 p.m.
Summary
This advisory contains mitigations for a Stack-based Buffer Overflow vulnerability in Real Time Automation 499ES EtherNet/IP Adaptor Source Code, a TCP/IP stack.
Title
Schneider Electric Interactive Graphical SCADA System (IGSS)
Published
Nov. 17, 2020, 4 p.m.
Summary
This advisory contains mitigations for Improper Restriction of Operations within the Bounds of a Memory Buffer, Out-of-bounds Write, and Out-of-bounds Read vulnerabilities in Schneider Electric's Interactive Graphical SCADA System (IGSS).
Title
BD Alaris 8015 PC Unit and BD Alaris Systems Manager
Published
Nov. 12, 2020, 4:05 p.m.
Summary
This advisory contains mitigations for an Improper Authentication vulnerability in BD Alaris 8015 PC Unit and BD Alaris Systems Manager. BD Alaris is an infusion pump system.
Title
SSA-431802 (Last Update: 2020-11-10): Multiple Vulnerabilities in SCALANCE W1750D
Published
Nov. 10, 2020, 1 a.m.
Summary
Siemens SCALANCE W1750D is a brandlabled device. Aruba has released a related security advisory (ARUBA-PSA-2016-004) [0] disclosing vulnerabilities in its Aruba Instant product line. The advisory contains multiple related vulnerabilities that are summarized in CVE-2016-2031. This advisory is a reminder to customers that the PAPI protocol is not a secure ...
Title
SSA-455843 (Last Update: 2020-11-10): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens and Siemens Energy Products
Published
Nov. 10, 2020, 1 a.m.
Summary
CISA and WIBU Systems disclosed six vulnerabilities in different versions of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens and Siemens Energy products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2020-14509, CVE-2020-14513, CVE-2020-14515, ...
Title
SSA-841348 (Last Update: 2020-11-10): Multiple Vulnerabilities in the UMC Stack
Published
Nov. 10, 2020, 1 a.m.
Summary
The latest update for the below listed products fixes two security vulnerabilities that could allow an attacker to cause a partial Denial-of-Service on the UMC component of the affected devices under certain circumstances, and one vulnerability that could allow an attacker to locally escalate privileges from a user with administrative ...
Title
SSB-439005 (Last Update: 2020-11-10): Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP
Published
Nov. 10, 2020, 1 a.m.
Summary
Title
SSA-381684 (Last Update: 2020-11-10): Improper Password Protection during Authentication in SIMATIC S7-300 and S7-400 CPUs and Derived Products
Published
Nov. 10, 2020, 1 a.m.
Summary
A vulnerability has been identified in SIMATIC S7-300 and S7-400 CPU families and derived products, which could result in credential disclosure. Siemens recommends countermeasures as there are currently no fixes available.
Title
SSA-492828 (Last Update: 2020-11-10): Denial-of-Service Vulnerability in SIMATIC S7-300 CPUs and SINUMERIK Controller
Published
Nov. 10, 2020, 1 a.m.
Summary
A vulnerability in S7-300 might allow an attacker to cause a Denial-of-Service condition on port 102 of the affected devices by sending specially crafted packets. Siemens is preparing updates and recommends specific countermeasures until fixes are available.
Title
Mitsubishi Electric GT14 Model of GOT1000 Series
Published
Nov. 5, 2020, 4:10 p.m.
Summary
This advisory contains mitigations for Improper Restriction of Operations within the Bounds of a Memory Buffer, Session Fixation, NULL Pointer Dereference, Improper Access Control, Argument Injection, and Resource Management Errors vulnerabilities in Mitsubishi Electric GT14 model of GOT1000 Series graphic operation terminals.
Title
Mitsubishi Electric Factory Automation Engineering Products (Update A)
Published
Nov. 5, 2020, 4:05 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-20-212-04 Mitsubishi Electric Factory Automation Engineering Products that was published July 30, 2020, to the ICS webpage to us-cert.cisa.gov. This advisory contains mitigations for an Unquoted Search Path or Element vulnerability in Mitsubishi Electric Factory Automation Engineering products.
Title
Mitsubishi Electric MELSEC iQ-R Series (Update B)
Published
Nov. 5, 2020, 4 p.m.
Summary
This updated advisory is a follow-up to the advisory update titled ICSA-20-161-02 Mitsubishi Electric MELSEC iQ-R Series (Update A) that was published June 16, 2020 to the ICS webpage to us-cert.cisa.gov. This advisory contains mitigations for a resource exhaustion vulnerability in the Mitsubishi Electric MELSEC iQ-R series programmable logic controllers.
Title
WAGO Series 750-88x and 750-352
Published
Nov. 3, 2020, 4:10 p.m.
Summary
This advisory contains mitigations for an Uncontrolled Resource Consumption vulnerability in the WAGO Fieldbus Ethernet coupler.
Title
NEXCOM NIO50
Published
Nov. 3, 2020, 4:05 p.m.
Summary
This advisory contains mitigations for Improper Input Validation, and Cleartext Transmission of Sensitive Information vulnerabilities in NEXCOM's NIO50 IoT Gateway.
Title
ARC Informatique PcVue
Published
Nov. 3, 2020, 4 p.m.
Summary
This advisory contains mitigations for Deserialization of Untrusted Data, Access to Critical Private Variable via Public Method, and Information Exposure of Sensitive Information to an Unauthorized Actor vulnerabilities in ARC Information PcVue SCADA products.
October 2020
Title
AA20-304A: Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data
Published
Oct. 30, 2020, 7:11 p.m.
Summary
Original release date: October 30, 2020 | Last revised: November 3, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 8 framework. See the ATT&CK for Enterprise version 8 for all referenced threat actor techniques. This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure ...
Title
Mitsubishi Electric MELSEC iQ-R, Q and L Series
Published
Oct. 29, 2020, 3:15 p.m.
Summary
This advisory contains mitigations for an Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric's MELSEC iQ-R, Q and L Series programmable logic controllers.
Title
Mitsubishi Electric MELSEC iQ-R
Published
Oct. 29, 2020, 3:10 p.m.
Summary
This advisory contains mitigations for Improper Restriction of Operations within the Bounds of a Memory Buffer, Session Fixation, NULL Pointer Dereference, Improper Access Control, Argument Injection, and Resource Management Errors vulnerabilities in Mitsubishi Electric's iQ-R programmable logic controllers.
Title
Mitsubishi Electric MELSEC iQ-R Series (Update A)
Published
Oct. 29, 2020, 3:05 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-20-282-02 Mitsubishi Electric MELSEC iQ-R Series that was published October 8, 2020, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for an Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R Series modules.
Title
AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector
Published
Oct. 29, 2020, 12:07 a.m.
Summary
Original release date: October 28, 2020 | Last revised: November 2, 2020SummaryThis advisory was updated to include information on Conti, TrickBot, and BazarLoader, including new IOCs and Yara Rules for detection. This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for ...
Title
AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky
Published
Oct. 27, 2020, 6 p.m.
Summary
Original release date: October 27, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the ...
Title
AA20-296B: Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems
Published
Oct. 22, 2020, 6 p.m.
Summary
Original release date: October 22, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that Iranian advanced persistent threat (APT) actors are likely intent on influencing and interfering with the U.S. elections to sow discord among voters and undermine public confidence in the ...
Title
B. Braun OnlineSuite
Published
Oct. 22, 2020, 4:05 p.m.
Summary
This advisory contains mitigations for Relative Path Traversal, Uncontrolled Search Path Element, and Improper Neutralization of Formula Elements in a CSV File vulnerabilities in B. Braun's OnlineSuite.
Title
B. Braun SpaceCom, Battery Pack SP with Wi-Fi, and Data module compactplus
Published
Oct. 22, 2020, 4 p.m.
Summary
This advisory contains mitigations for Cross-site Scripting, Open Redirect, XPath Injection, Session Fixation, Use of a One-way Hash without a Salt, Relative Path Traversal, Improper Verification of Cryptographic Signature, Improper Privilege Management, Use of Hard-coded Credentials, Active Debug Code, and Improper Access Control vulnerabilities in B. Braun's SpaceCom, Battery Pack ...
Title
AA20-296A: Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets
Published
Oct. 22, 2020, 2:44 p.m.
Summary
Original release date: October 22, 2020SummaryThis joint cybersecurity advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor tactics and techniques This joint cybersecurity advisory—written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure ...

Last Updates

BOSCH PSIRT
31.10.2024
SIEMENS CERT
22.11.2024
US CERT
08.11.2024
US CERT (ICS)
21.11.2024

By Source

Archive

2024
2023
2022
2021
2020
2019
2018
2017

Feeds