October 2020
Title
SSA-689071 (Last Update: 2020-10-13): DNSMasq Vulnerabilities in SCALANCE W1750D, SCALANCE M-800 / S615 and RUGGEDCOM RM1224
Published
Oct. 13, 2020, 2 a.m.
Summary
Multiple vulnerabilities have been identified in SCALANCE W1750D, SCALANCE M-800 / S615 and RUGGEDCOM RM1224 devices. The highest scored vulnerability could allow a remote attacker to crash the DNS service or execute arbitrary code. The attacker must be able to craft malicious DNS responses and inject them into the network ...
Title
AA20-283A: APT Actors Chaining Vulnerabilities Against SLTT, Critical Infrastructure, and Elections Organizations
Published
Oct. 9, 2020, 10:21 p.m.
Summary
Original release date: October 9, 2020 | Last revised: October 24, 2020SummaryThis joint cybersecurity advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. Note: the analysis in this joint cybersecurity advisory is ongoing, and the ...
Title
AA20-280A: Emotet Malware
Published
Oct. 6, 2020, 7 p.m.
Summary
Original release date: October 6, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This product was written by the Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center ...
Title
AA20-275A: Potential for China Cyber Response to Heightened U.S.–China Tensions
Published
Oct. 1, 2020, 6 p.m.
Summary
Original release date: October 1, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. In light of heightened tensions between the United States and China, the Cybersecurity and Infrastructure Security Agency (CISA) is providing ...
Title
Wibu-Systems CodeMeter (Update B)
Published
Oct. 1, 2020, 4 p.m.
Summary
This updated advisory is a follow-up to the advisory update titled ICSA-20-203-01 Wibu-Systems CodeMeter (Update A) that was published September 17, 2020, to the ICS webpage on us-cert.gov. This advisory contains mitigations for Buffer Access with Incorrect Length Value, Inadequate Encryption Strength, Origin Validation Error, Improper Input Validation, Improper Verification ...
September 2020
Title
MB Connect line mbCONNECT24, mymbCONNECT24
Published
Sept. 29, 2020, 4:10 p.m.
Summary
This advisory contains mitigations for SQL Injection, Cross-site Request Forgery, and Command Injection vulnerabilities in the MB connect line mymbCONNECT24 and mbCONNECT24 software.
Title
Yokogawa WideField3
Published
Sept. 29, 2020, 4:05 p.m.
Summary
This advisory contains mitigations for a Buffer Copy Without Checking Size of Input vulnerability in the Yokogawa WideField3 PLC programming tool.
Title
B&R Automation SiteManager and GateManager
Published
Sept. 29, 2020, 4 p.m.
Summary
This advisory contains mitigations for Path Traversal, Uncontrolled Resource Consumption, Information Exposure, Improper Authentication, and Information Disclosure vulnerabilities in B&R Automation SiteManager and GateManager products.
Title
Vulnerabilities in Bosch PRAESIDEO and PRAESENSA
Published
Sept. 28, 2020, 2 a.m.
Summary

BOSCH-SA-538331-BT: Two security vulnerabilities have been uncovered in the web based management interface of the PRAESIDEO Network Controller and the PRAESENSA System Controller. The vulnerabilities will allow a Cross-Site Request Forgery (CSRF) attack and a Cross-site Scripting (XSS) attack. For PRAESIDEO a third vulnerability will allow a replay attack with ...

Title
WIBU Systems CodeMeter Runtime Vulnerabilities in Rexroth Products
Published
Sept. 25, 2020, 2 a.m.
Summary

BOSCH-SA-231483: A set of 6 vulnerabilities affect multiple versions of the WIBU Systems CodeMeter Runtime Software. This software is used by multiple Rexroth Products and Bosch Rexroth customers for license management. In order to successfully exploit these vulnerabilities an attacker requires access to the network or system. One vulnerability (CVE-2020-14509) ...

Title
3S CoDeSys (Update A)
Published
Sept. 24, 2020, 4 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-13-011-01 3S CoDeSys that was published January 10, 2013, to the ICS webpage on us-cert.gov. This advisory contains mitigations for Improper Access Control, and Relative Path Traversal vulnerabilities in 3S-Smart Software Solutions software.
Title
AA20-266A: LokiBot Malware
Published
Sept. 22, 2020, 5 p.m.
Summary
Original release date: September 22, 2020 | Last revised: September 23, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for all referenced threat actor techniques. This product was written by the Cybersecurity and Infrastructure Security Agency (CISA) with contributions ...
Title
GE Digital APM Classic
Published
Sept. 22, 2020, 4:05 p.m.
Summary
This advisory contains mitigations for Authorization Bypass Through User-controlled Key, and Use of a One-Way Hash Without a Salt vulnerabilities in GE's APM Classic module, a data analysis and processing tool.
Title
GE Reason S20 Ethernet Switch
Published
Sept. 22, 2020, 4 p.m.
Summary
This advisory contains mitigations for Cross-site Scripting vulnerabilities in GE's Reason S20 Ethernet Switch.
Title
Philips Clinical Collaboration Platform
Published
Sept. 17, 2020, 4:10 p.m.
Summary
This advisory contains mitigations for Cross-site Request Forgery, Improper Neutralization of Script in Attributes in a Web Page, Protection Mechanism Failure, Algorithm Downgrade, and Configuration vulnerabilities in Philips Clinical Collaboration Platform HMI data management software.
Title
AA20-259A: Iran-Based Threat Actor Exploits VPN Vulnerabilities
Published
Sept. 15, 2020, 6 p.m.
Summary
Original release date: September 15, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This product was written by the Cybersecurity and Infrastructure Security Agency (CISA) with contributions from the Federal Bureau of Investigation ...
Title
ENTTEC Lighting Controllers (Update A)
Published
Sept. 15, 2020, 4 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-20-177-01 ENTTEC Lighting Controllers that was published June 25, 2020, to the ICS webpage on us-cert.gov. This advisory contains mitigations for Use of Hard-coded Cryptographic Key, Cross-site Scripting, Improper Access Control, and Incorrect Permission Assignment for Critical Resource vulnerabilities ...
Title
AA20-258A: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity
Published
Sept. 14, 2020, 3 p.m.
Summary
Original release date: September 14, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics, techniques, and procedures (TTPs) to target U.S. Government agencies. CISA has observed these—and other threat actors with ...
Title
SSA-770698 (Last Update: 2020-09-08): User Information Disclosure Vulnerability in Siveillance Video Client
Published
Sept. 8, 2020, 2 a.m.
Summary
The Siveillance Video Client contains an information disclosure vulnerability that could allow an attacker to obtain valid adminstrator login names and use this information to launch further attacks. Siemens recommends specific countermeasures and provides patches for released versions of the Siveillance Video Client.
Title
SSA-841348 (Last Update: 2020-09-08): Multiple Vulnerabilities in the UMC Stack
Published
Sept. 8, 2020, 2 a.m.
Summary
The latest update for the below listed products fixes two security vulnerabilities that could allow an attacker to cause a partial Denial-of-Service on the UMC component of the affected devices under certain circumstances, and one vulnerability that could allow an attacker to locally escalate privileges from a user with administrative ...
Title
SSA-780073 (Last Update: 2020-09-08): Denial-of-Service Vulnerability in PROFINET Devices via DCE-RPC Packets
Published
Sept. 8, 2020, 2 a.m.
Summary
Products that include the Siemens PROFINET-IO (PNIO) stack in versions prior V06.00 are potentially affected by a denial-of-service vulnerability when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing ...
Title
SSA-480230 (Last Update: 2020-09-08): Denial-of-Service in Webserver of Industrial Products
Published
Sept. 8, 2020, 2 a.m.
Summary
A vulnerability in the affected devices could allow an unauthorized attacker with network access to the webserver of an affected device to perform a denial-of-service attack. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing further updates and recommends specific ...
Title
SSA-473245 (Last Update: 2020-09-08): Denial-of-Service Vulnerability in Profinet Devices
Published
Sept. 8, 2020, 2 a.m.
Summary
A vulnerability in affected devices could allow an attacker to perform a denial-of-service attack if a large amount of specially crafted UDP packets are sent to the device. Siemens has released updates for several affected products, and recommends that customers update to the new version. Siemens is preparing further updates ...
Title
SSA-462066 (Last Update: 2020-09-08): Vulnerability known as TCP SACK PANIC in Industrial Products
Published
Sept. 8, 2020, 2 a.m.
Summary
Multiple industrial products are affected by a vulnerability in the kernel known as TCP SACK PANIC. The vulnerability could allow a remote attacker to cause a denial of service condition. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing further ...
Title
SSB-439005 (Last Update: 2020-09-08): Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP
Published
Sept. 8, 2020, 2 a.m.
Summary

Last Updates

BOSCH PSIRT
15.01.2025
SIEMENS CERT
11.02.2025
US CERT
15.01.2025
US CERT (ICS)
13.02.2025

By Source

Archive

2025
2024
2023
2022
2021
2020
2019
2018
2017

Feeds