October 2024
Title
SSA-054046 V1.0: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs
Published
Oct. 8, 2024, 2 a.m.
Summary
Several SIMATIC S7-1500 CPU versions are affected by an authentication bypass vulnerability that could allow an unauthenticated remote attacker to gain knowledge about actual and configured maximum cycle times and communication load of the CPU. Siemens has released new versions for several affected products and recommends to update to the ...
Title
SSA-852501 V1.0: Multiple Memory Corruption Vulnerabilities in Simcenter Nastran Before 2406.5000
Published
Oct. 8, 2024, 2 a.m.
Summary
Simcenter Nastran contains multiple memory corruption vulnerabilities that could be triggered when the application reads files in BDF file formats. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code execution. ...
Title
SSA-850560 V1.0: Use of 4-Digit PIN in SENTRON PAC3200 Devices
Published
Oct. 8, 2024, 2 a.m.
Summary
SENTRON PAC3200 only provide a 4-digit PIN to protect from administrative access via Modbus TCP interface. Attackers with access to the Modbus TCP interface could easily bypass this protection by brute-force attacks or by monitoring the Modbus cleartext communication. Siemens recommends specific countermeasures for products where fixes are not, or ...
Title
SSA-783481 V1.3 (Last Update: 2024-10-08): Denial-of-Service Vulnerability in LOGO! 8 BM
Published
Oct. 8, 2024, 2 a.m.
Summary
A Denial-of-Service vulnerability has been identified in LOGO! 8 BM. This vulnerability could allow an attacker to crash a device, if a user is tricked into loading a malicious project file onto an affected device. The vulnerability is related to the hardware of the product. Siemens has released new hardware ...
Title
SSA-844582 V1.2 (Last Update: 2024-10-08): Electromagnetic Fault Injection in LOGO! V8.3 BM Devices Results in Broken LOGO! V8.3 Product CA
Published
Oct. 8, 2024, 2 a.m.
Summary
LOGO! V8.3 BM (incl. SIPLUS variants) devices contain a vulnerability that could allow an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed ...
Title
SSA-148641 V1.3 (Last Update: 2024-10-08): XPath Constraint Vulnerability in Mendix Runtime
Published
Oct. 8, 2024, 2 a.m.
Summary
A XPath Constraint vulnerability in the Mendix Runtime was discovered, that can affect the running applications. The vulnerability could allow a malicious user to deduce contents of inaccessible attributes and modify sensitive data. Siemens has released new versions for the affected products and recommends to update to the latest versions.
Title
SSA-959281 V1.0: XML File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Published
Oct. 8, 2024, 2 a.m.
Summary
Siemens Teamcenter Visualization and JT2Go are affected by stack buffer overflow and null pointer dereference vulnerabilities that could be triggered while parsing XML file. If a user is tricked to open a malicious XML file with any of the affected products, this could cause the application to crash or potentially ...
Title
SSA-955858 V1.3 (Last Update: 2024-10-08): Multiple Vulnerabilities in LOGO! 8 BM Devices
Published
Oct. 8, 2024, 2 a.m.
Summary
LOGO! 8 BM (incl. SIPLUS variants) contains multiple web-related vulnerabilities. These could allow an attacker to execute code remotely, put the device into a denial of service state or retrieve parts of the memory. The vulnerabilities are related to the hardware of the product. Siemens has released new hardware versions ...
Title
SSA-921449 V1.2 (Last Update: 2024-10-08): Plaintext Storage of a Password Vulnerability in LOGO! V8.3 BM Devices
Published
Oct. 8, 2024, 2 a.m.
Summary
LOGO! V8.3 BM (incl. SIPLUS variants) devices contain a plaintext storage of a password vulnerability. This could allow an attacker with phyiscal access to an affected device to extract user-set passwords from an embedded storage IC. Siemens has released new hardware versions with the LOGO! V8.4 BM and the SIPLUS ...
Title
SSA-097435 V1.2 (Last Update: 2024-10-08): Usernames Disclosure Vulnerability in Mendix Runtime
Published
Oct. 8, 2024, 2 a.m.
Summary
Mendix Runtime contains an observable response discrepancy vulnerability when validating usernames during authentication. This could allow unauthenticated remote attackers to distinguish between valid and invalid usernames. Siemens has released new versions for the affected products and recommends to update to the latest versions.
Title
SSA-364175 V1.2 (Last Update: 2024-10-08): Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1
Published
Oct. 8, 2024, 2 a.m.
Summary
Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds ...
Title
SSA-321292 V1.6 (Last Update: 2024-10-08): Denial of Service in the OPC Foundation Local Discovery Server (LDS) in Industrial Products
Published
Oct. 8, 2024, 2 a.m.
Summary
A vulnerability has been identified in the OPC Foundation Local Discovery Server (LDS) [0] of several industrial products. The vulnerability could cause a denial of service condition on the service or the device. Siemens has released new versions for several affected products and recommends to update to the latest versions. ...
Title
SSA-254396 V1.0: Vulnerability in Nozomi Guardian/CMC Before 24.3.1 on RUGGEDCOM APE1808 Devices
Published
Oct. 8, 2024, 2 a.m.
Summary
Nozomi Networks has published information on vulnerabilities in Nozomi Guardian/CMC before 24.2.0. This advisory lists the related Siemens Industrial products affected by these vulnerabilities. Siemens has released new versions for the affected products and recommends to update to the latest versions.
Title
SSA-039007 V1.1 (Last Update: 2024-10-08): Heap-based Buffer Overflow Vulnerability in User Management Component (UMC)
Published
Oct. 8, 2024, 2 a.m.
Summary
Siemens User Management Component (UMC) is affected by a heap-based buffer overflow vulnerability which could allow an unauthenticated remote attacker arbitrary code execution. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures for ...
Title
SSA-876787 V1.0: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs
Published
Oct. 8, 2024, 2 a.m.
Summary
Several SIMATIC S7-1500 and S7-1200 CPU versions are affected by an open redirect vulnerability that could allow an attacker to make the web server of affected devices redirect a legitimate user to an attacker-chosen URL. For a successful attack, the legitimate user must actively click on an attacker-crafted link. Siemens ...
Title
TEM Opera Plus FM Family Transmitter
Published
Oct. 3, 2024, 2 p.m.
Summary
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: TEM Equipment: Opera Plus FM Family Transmitter Vulnerabilities: Missing Authentication for Critical Function, Cross-Site Request Forgery (CSRF) 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to perform remote code ...
Title
Multiple vulnerabilites in libexpat affecting PRC7000
Published
Oct. 2, 2024, 2 a.m.
Summary

BOSCH-SA-200802: Multiple vulnerabilities were discovered in the open source library \"libexpat\", affecting the XML parser functionality. These vulnerabilities allow for integer overflows and invalid negative values for buffer sizes. As this may affect the \"Import\" and \"Restore\" functionality - which use libexpat to parse XML files - of the device, ...

Title
Mitsubishi Electric MELSEC iQ-F FX5-OPC
Published
Oct. 1, 2024, 2 p.m.
Summary
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Equipment: MELSEC iQ-F FX5-OPC Vulnerability: NULL Pointer Dereference 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a remote attacker to cause a Denial-of-Service (DoS) condition on the product by getting a legitimate ...
Title
Optigo Networks ONS-S8 Spectra Aggregation Switch
Published
Oct. 1, 2024, 2 p.m.
Summary
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/Low attack complexity Vendor: Optigo Networks Equipment: ONS-S8 - Spectra Aggregation Switch Vulnerabilities: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion'), Weak Authentication 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an ...
Title
Sensitive information disclosure in Bosch Configuration Manager
Published
Oct. 1, 2024, 2 a.m.
Summary

BOSCH-SA-981803-BT: A vulnerability was discovered during internal testing of the Bosch Configuration Manager, which may temporarily store sensitive information of the configured system.

September 2024
Title
Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations
Published
Sept. 30, 2024, 6:28 p.m.
Summary
Summary The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC) are releasing this joint Cybersecurity Advisory to warn network defenders ...
Title
goTenna Pro X and Pro X2
Published
Sept. 26, 2024, 2 p.m.
Summary
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Low attack complexity Vendor: goTenna Equipment: Pro series Vulnerabilities: Weak Password Requirements, Insecure Storage of Sensitive Information, Missing Support for Integrity Check, Cleartext Transmission of Sensitive Information, Improper Restriction of Communication Channel to Intended Endpoints, Use of Cryptographically Weak Pseudo-Random Number ...
Title
Advantech ADAM-5630
Published
Sept. 26, 2024, 2 p.m.
Summary
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Advantech Equipment: ADAM-5630 Vulnerabilities: Use of Persistent Cookies Containing Sensitive Information 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to hijack a legitimate user's session, perform cross-site request forgery, or cause a denial-of-service ...
Title
goTenna Pro X and Pro X2 (Update A)
Published
Sept. 26, 2024, 2 p.m.
Summary
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Low attack complexity Vendor: goTenna Equipment: Pro series Vulnerabilities: Weak Password Requirements, Insecure Storage of Sensitive Information, Missing Support for Integrity Check, Cleartext Transmission of Sensitive Information, Improper Restriction of Communication Channel to Intended Endpoints, Use of Cryptographically Weak Pseudo-Random Number ...
Title
Advantech ADAM-5550
Published
Sept. 26, 2024, 2 p.m.
Summary
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Low attack complexity Vendor: Advantech Equipment: ADAM-5550 Vulnerabilities: Weak Encoding for Password, Cross-site Scripting 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a remote attacker to intercept the easily decodable credentials of a legitimate user to gain full access ...

Last Updates

BOSCH PSIRT
14.08.2025
SIEMENS CERT
26.08.2025
US CERT
25.08.2025
US CERT (ICS)
04.09.2025

By Source

Archive

2025
2024
2023
2022
2021
2020
2019
2018
2017

Feeds