November 2022
Title
Mitsubishi Electric MELSEC and MELIPC Series (Update E)
Published
Nov. 29, 2022, 4:05 p.m.
Summary
Title
Omron PLC CJ and CS Series (Update A)
Published
Nov. 29, 2022, 4 p.m.
Summary
This advisory includes information and mitigation recommendations for authentications vulnerabilities reported in the Omron PLC CJ and CS Series.
Title
AVEVA Edge
Published
Nov. 22, 2022, 4:35 p.m.
Summary
Title
Digital Alert Systems DASDEC
Published
Nov. 22, 2022, 4:30 p.m.
Summary
Title
Phoenix Contact Automation Worx
Published
Nov. 22, 2022, 4:25 p.m.
Summary
Title
GE CIMPLICITY
Published
Nov. 22, 2022, 4:20 p.m.
Summary
Title
Moxa Multiple ARM-Based Computers
Published
Nov. 22, 2022, 4:15 p.m.
Summary
Title
Mitsubishi Electric FA Engineering Software Products (Update G)
Published
Nov. 22, 2022, 4:10 p.m.
Summary
Title
Mitsubishi Electric Factory Automation Engineering Products (Update I)
Published
Nov. 22, 2022, 4:05 p.m.
Summary
Title
Hillrom Medical Device Management (Update C)
Published
Nov. 22, 2022, 4 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSMA-21-152-01 Hillrom Medical Device Management (Update B) that was published September 8, 2022, to the ICS webpage at cisa.gov/ics. This advisory contains mitigations for Out-of-bounds Write, Out-of-bounds Read vulnerabilities in Welch Allyn medical device management tools.
Title
AA22-321A: #StopRansomware: Hive Ransomware
Published
Nov. 17, 2022, 6 p.m.
Summary
Original release date: November 17, 2022SummaryActions to Take Today to Mitigate Cyber Threats from Ransomware: • Prioritize remediating known exploited vulnerabilities. • Enable and enforce multifactor authentication with strong passwords • Close unused ports and remove any application not deemed necessary for day-to-day operations. Note: This joint Cybersecurity Advisory (CSA) ...
Title
Red Lion Crimson
Published
Nov. 17, 2022, 4:10 p.m.
Summary
Title
Cradlepoint IBR600
Published
Nov. 17, 2022, 4 p.m.
Summary
Title
AA22-320A: Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester
Published
Nov. 16, 2022, 4:04 p.m.
Summary
Original release date: November 16, 2022SummaryFrom mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) activity. In the course of incident response activities, CISA determined that cyber threat actors exploited the Log4Shell vulnerability ...
Title
Siemens SINEC Network Management System Logback Component
Published
Nov. 11, 2022, 5:25 a.m.
Summary
Title
Siemens Parasolid
Published
Nov. 10, 2022, 5:35 p.m.
Summary
Title
Siemens Web Server Login Page of Industrial Controllers
Published
Nov. 10, 2022, 5:30 p.m.
Summary
Title
Siemens SINUMERIK ONE and SINUMERIK MC
Published
Nov. 10, 2022, 5:20 p.m.
Summary
Title
Siemens QMS Automotive
Published
Nov. 10, 2022, 5:10 p.m.
Summary
Title
Omron NJ/NX-series Machine Automation Controllers
Published
Nov. 10, 2022, 5:05 p.m.
Summary
Title
Omron NJNX-series
Published
Nov. 10, 2022, 5 p.m.
Summary
Title
Siemens Teamcenter Visualization and JT2Go
Published
Nov. 10, 2022, 4:55 p.m.
Summary
Title
SSA-362164 V1.2 (Last Update: 2022-11-08): Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS
Published
Nov. 8, 2022, 1 a.m.
Summary
The networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) use Initial Sequence Numbers for TCP-Sessions that are predictable. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not available.
Title
SSA-120378 V1.0: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Published
Nov. 8, 2022, 1 a.m.
Summary
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities that could be triggered when the application reads malicious TIF, CGM or PDF files. If a user is tricked to open a malicious TIF, CGM or PDF file with the affected products, this could lead the application to ...
Title
SSA-501891 V1.1 (Last Update: 2022-11-08): Cross-Site Scripting Vulnerability in SCALANCE X-200 and X-200IRT Families
Published
Nov. 8, 2022, 1 a.m.
Summary
There is a cross-site scripting vulnerability that affects the SCALANCE switches. This vulnerability if used by a threat actor could result in the stealing of session cookies and session hijacking. Siemens has released updates for the affected products and recommends to update to the latest versions.

Last Updates

BOSCH PSIRT
25.04.2025
SIEMENS CERT
17.04.2025
US CERT
01.04.2025
US CERT (ICS)
24.04.2025

By Source

Archive

2025
2024
2023
2022
2021
2020
2019
2018
2017

Feeds