February 2020
Title
SSA-253230 (Last Update: 2020-02-10): Vulnerabilities in SIMATIC S7-1500 CPU family
Published
Feb. 10, 2020, 1 a.m.
Summary
Siemens has released a firmware update for the SIMATIC S7-1500 CPU family which fixes two vulnerabilities. The more severe of these vulnerabilities could allow attackers to cause a Denial-of-Service under certain conditions.
Title
SSA-456423 (Last Update: 2020-02-10): Vulnerabilities in SIMATIC S7-1500 CPU family
Published
Feb. 10, 2020, 1 a.m.
Summary
The new firmware update for the SIMATIC S7-1500 CPU firmware fixes several vulnerabilities, which may have been exploitable via network by Web application attacks or Denial-of-Service attacks with specially crafted network packets on different ports. Siemens addresses and fixes all of these issues by the new firmware update.
Title
SSA-982399 (Last Update: 2020-02-10): Missing Authentication in TIM 1531 IRC Modules
Published
Feb. 10, 2020, 1 a.m.
Summary
The latest update for TIM 1531 IRC fixes a vulnerability. The device was missing proper authentication when connecting on port 102/tcp, although configured. An attacker needs to be able to connect to port 102/tcp of an affected device in order to exploit this vulnerability. The vulnerability could allow an attacker ...
Title
SSA-347726 (Last Update: 2020-02-10): Denial-of-Service Vulnerability in SIMATIC S7-1500, SIMATIC S7-1500 Software Controller and SIMATIC ET 200SP Open Controller
Published
Feb. 10, 2020, 1 a.m.
Summary
Versions of SIMATIC S7-1500, SIMATIC S7-1500 Software Controller and SIMATIC ET200SP Open Controller are affected by a denial-of-service vulnerability. An attacker with network access to the PLC can cause a Denial-of-Service condition on the network stack.
Title
SSA-763427 (Last Update: 2020-02-10): Vulnerability in Communication Processor (CP) modules CP 343-1, TIM 3V-IE, TIM 4R-IE, and CP 443-1
Published
Feb. 10, 2020, 1 a.m.
Summary
Siemens has released updates for Communication Processor (CP) module families CP 343-1/TIM 3V-IE/TIM 4R-IE/CP 443-1 to resolve an authentication bypass vulnerability that could allow unauthenticated users to perform administrative operations under certain conditions.
Title
SSA-87240 (Last Update: 2020-02-10): Vulnerabilities in SIEMENS LOGO!
Published
Feb. 10, 2020, 1 a.m.
Summary
Two vulnerabilities have been identified in SIEMENS LOGO!8 BM devices. The most severe vulnerability could allow an attacker to hijack existing web sessions. Siemens provides LOGO!8 BM FS-05 with firmware version V1.81.2, which fixes the first vulnerability, and recommends specific mitigations for the second vulnerability.
Title
SSA-833048 (Last Update: 2020-02-10): Vulnerability in SIMATIC S7-1200 CPU Family
Published
Feb. 10, 2020, 1 a.m.
Summary
Siemens became aware that the discontinued products SIMATIC S7-1200 CPUs prior to version 4 could allow for the circumvention of user program block protection under certain conditions.
Title
SSA-592007 (Last Update: 2020-02-10): Denial-of-Service Vulnerability in Industrial Products
Published
Feb. 10, 2020, 1 a.m.
Summary
Several industrial controllers are affected by a security vulnerability that could allow an attacker to cause a Denial-of-Service condition via PROFINET DCP network packets under certain circumstances. Precondition for this scenario is a direct OSI Layer 2 access to the affected products. PROFIBUS interfaces are not affected. Siemens has released ...
Title
SSA-742938 (Last Update: 2020-02-10): Open Ports in SINAMICS S/G Firmware
Published
Feb. 10, 2020, 1 a.m.
Summary
A potential vulnerability was discovered in the SINAMICS S/G converter family which might allow attackers to access administrative functions on the device without authentication. Siemens addresses the issue by a firmware update.
Title
SSA-087240 (Last Update: 2020-02-10): Vulnerabilities in SIEMENS LOGO!
Published
Feb. 10, 2020, 1 a.m.
Summary
Two vulnerabilities have been identified in SIEMENS LOGO!8 BM devices. The most severe vulnerability could allow an attacker to hijack existing web sessions. Siemens provides LOGO!8 BM FS-05 with firmware version V1.81.2, which fixes the first vulnerability, and recommends specific mitigations for the second vulnerability.
Title
SSA-176087 (Last Update: 2020-02-10): Unauthenticated Access to Critical Services in SCALANCE X-200 Switch Family
Published
Feb. 10, 2020, 1 a.m.
Summary
A potential vulnerability was discovered in the web server authentication of SCALANCE X-200 and X-200IRT switches that might allow attackers to perform administrative operations over the network without authentication. This issue only applies to switches using older firmware versions and has been fixed from firmware V4.5.0 (non-IRT) and V5.1.0 (IRT) ...
Title
AutomationDirect C-More Touch Panels
Published
Feb. 4, 2020, 4 p.m.
Summary
This advisory contains mitigations for an insufficiently protected credentials vulnerability in AutomationDirect's C-More Touch Panels software management platform.
January 2020
Title
Medtronic Conexus Radio Frequency Telemetry Protocol (Update A)
Published
Jan. 30, 2020, 4:05 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSMA-19-080-01 Medtronic Conexus Radio Frequency Telemetry Protocol that was published March 21, 2019, on the ICS webpage on us-cert.gov. This medical advisory includes mitigations for improper access control and cleartext transmission of sensitive information vulnerabilities reported in Medtronic's proprietary ...
Title
Medtronic 2090 Carelink Programmer Vulnerabilities (Update C)
Published
Jan. 30, 2020, 4 p.m.
Summary
This updated advisory is a follow-up to the updated advisory titled ICSMA-18-058-01 Medtronic 2090 Carelink Programmer Vulnerabilities (Update B) that was published October 11, 2018, ICS webpage on us-cert.gov. This medical device advisory contains mitigation details for vulnerabilities in Medtronic’s 2090 CareLink Programmer and its accompanying software deployment network.
Title
Path Traversal in Bosch Video Management System
Published
Jan. 29, 2020, 1 a.m.
Summary

BOSCH-SA-381489-BT: A path traversal vulnerability exists in the BVMS. An authenticated BVMS user can successfully request and fetch arbitrary files from the Central Server machine using the FileTransferService. Bosch rates this vulnerability with a CVSS v3.1 Base Score of 7.7 (High) and strongly recommends customers to update vulnerable components with ...

Title
Path Traversal in Bosch Video Management System NoTouch deployment
Published
Jan. 29, 2020, 1 a.m.
Summary

BOSCH-SA-815013-BT: A path traversal vulnerability exists in the BVMS NoTouch deployment. If this vulnerability is exploited an unauthenticated attacker without local shell access to a BVMS Central Server system is able to fetch arbitrary data from the file system of the Central Server computer. Under specific circumstances an attack can ...

Title
Deserialization of Untrusted Data in Bosch BVMS Mobile Video Service
Published
Jan. 29, 2020, 1 a.m.
Summary

BOSCH-SA-885551-BT: A recently discovered security vulnerability affects the BVMS Mobile Video Service (BVMS MVS). The vulnerability is exploitable via the network interface. Bosch rates this vulnerability with a CVSS v3.1 Base Score of 10.0 (Critical) and recommends customers to update the vulnerable components with fixed software versions. The vulnerability was ...

Title
Missing Authentication for Critical Function in Bosch Video Streaming Gateway
Published
Jan. 29, 2020, 1 a.m.
Summary

BOSCH-SA-260625-BT: A recently discovered security vulnerability affects the Bosch Video Streaming Gateway (VSG). The vulnerability is exploitable via the network interface. An unauthorized attacker can retrieve and set arbitrary configuration data of the VSG. Bosch rates this vulnerability with a CVSS v3.1 Base Score of 10.0 (Critical) and strongly recommends ...

Title
GE CARESCAPE, ApexPro, and Clinical Information Center systems
Published
Jan. 23, 2020, 5 p.m.
Summary
This advisory contains mitigations for multiple vulnerabilities in the GE CARESCAPE ApexPro and Clinical Information Center (CIC) healthcare monitoring platforms.
Title
Honeywell Maxpro VMS & NVR
Published
Jan. 21, 2020, 4 p.m.
Summary
This advisory contains mitigations for deserialization of untrusted data and SQL injection vulnerabilities in Honeywell's MAXPRO VMS & NVR video management systems.
Title
GE PACSystems RX3i
Published
Jan. 14, 2020, 11:25 p.m.
Summary
This advisory contains mitigations for an improper input validation vulnerability in GE's PACSystems RX3i controllers.
Title
Siemens SINEMA Server
Published
Jan. 14, 2020, 11:20 p.m.
Summary
This advisory contains mitigations for an incorrect privilege assignment vulnerability in Siemens' SINEMA server network management software.
Title
Siemens SINAMICS PERFECT HARMONY GH180
Published
Jan. 14, 2020, 11:10 p.m.
Summary
This advisory contains mitigations for a protection mechanism failure vulnerability in Siemens' Sinamics Perfect Harmony GH180 voltage converter.
Title
Siemens TIA Portal
Published
Jan. 14, 2020, 11:05 p.m.
Summary
This advisory contains mitigations for a path traversal vulnerability in the Siemens TIA Portal engineering framework.
Title
Siemens EN100 Ethernet Module (Update A)
Published
Jan. 14, 2020, 2:45 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-19-344-07 Siemens EN100 Ethernet Module that was published December 10, 2019, to the ICS webpage on us-cert.gov. This advisory contains mitigations for improper restriction of operations within the bounds of a memory buffer, cross-site scripting, and relative path traversal ...

Last Updates

BOSCH PSIRT
25.04.2025
SIEMENS CERT
14.05.2025
US CERT
20.05.2025
US CERT (ICS)
20.05.2025

By Source

Archive

2025
2024
2023
2022
2021
2020
2019
2018
2017

Feeds