• 1
  • 2 (current)
Tuesday, 09.11.2021
Title
SSA-755517 V1.0: Path Traversal Vulnerability in Siveillance Video DLNA Server
Published
Nov. 9, 2021, 1 a.m.
Summary
Siemens has released hotfixes for Siveillance Video DLNA Server, which fix a path traversal vulnerability that could allow an authenticated remote attacker to access sensitive information on the DLNA server. Siemens has released updates for the DLNA server and recommends to apply the update on all installations where DLNA server ...
Title
SSA-779699 V1.0: Two Incorrect Authorization Vulnerabilities in Mendix
Published
Nov. 9, 2021, 1 a.m.
Summary
Applications built with affected versions of Mendix Studio Pro do not properly control read or write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects or to retrieve the changedDate attribute of arbitrary objects. Mendix has released updates for the affected product ...
Title
SSA-840188 V1.0: Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products
Published
Nov. 9, 2021, 1 a.m.
Summary
Multiple vulnerabilities were found in SIMATIC WinCC that ultimately could allow local attackers to escalate privileges and read, write or delete critical files. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens is preparing further updates and recommends specific countermeasures for products ...
Title
SSA-917476 V1.0: Multiple Vulnerabilities in SCALANCE W1750D
Published
Nov. 9, 2021, 1 a.m.
Summary
The Scalance W1750D device contains multiple vulnerabilities that could allow an attacker to execute code on the affected device(s), read arbitrary files, or create a denial-of-service condition. Siemens has released an update for the SCALANCE W1750D and recommends to update to the latest version. Siemens is preparing further updates and ...
Title
SSA-185699 V1.1 (Last Update: 2021-11-09): Out of Bounds Write Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS
Published
Nov. 9, 2021, 1 a.m.
Summary
Security researchers discovered and disclosed 9 vulnerabilities in several DNS implementations, also known as “NAME:WRECK” vulnerabilities. The vulnerabilities described in this advisory are from this set. The DNS client of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contains two out of bounds write vulnerabilities in the ...
Title
SSA-201384 V1.1 (Last Update: 2021-11-09): Predictable UDP Port Number Vulnerability (NAME:WRECK) in the DNS Module of Nucleus RTOS
Published
Nov. 9, 2021, 1 a.m.
Summary
Security researchers discovered and disclosed 9 vulnerabilities in several DNS implementations, also known as “NAME:WRECK” vulnerabilities. The vulnerability described in this advisory is from this set. The DNS client of of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contains a vulnerability related to the handling of ...
Title
SSA-114589 V1.0: Multiple Vulnerabilities in Nucleus RTOS based APOGEE and TALON Products
Published
Nov. 9, 2021, 1 a.m.
Summary
Multiple vulnerabilities (also known as “NUCLEUS:13”) have be identified in the Nucleus RTOS (real-time operating system) and reported in the Siemens Security Advisory SSA-044112: https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf. The products listed below use affected versions of the Nucleus software and inherently contain these vulnerabilities. Siemens recommends specific countermeasures for products where updates are ...
Title
SSA-312271 V1.9 (Last Update: 2021-11-09): Unquoted Search Path Vulnerabilities in Windows-based Industrial Software Applications
Published
Nov. 9, 2021, 1 a.m.
Summary
Several industrial products as listed below contain a local privilege escalation vulnerabilities that could allow authorized local users with administrative privileges to execute custom code with SYSTEM level privileges. Siemens has released updates for the affected products and recommends to update to the latest versions.
Title
SSA-362164 V1.1 (Last Update: 2021-11-09): Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS
Published
Nov. 9, 2021, 1 a.m.
Summary
The networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) use Initial Sequence Numbers for TCP-Sessions that are predictable. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not available.
Title
SSB-439005 V3.9 (Last Update: 2021-11-09): Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP
Published
Nov. 9, 2021, 1 a.m.
Summary
Title
SSA-675303 V1.2 (Last Update: 2021-11-09): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products
Published
Nov. 9, 2021, 1 a.m.
Summary
WIBU Systems published information about two vulnerabilities and an associated fix release version of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2021-20093 and CVE-2021-20094. ...
Title
SSA-705111 V1.1 (Last Update: 2021-11-09): Multiple Vulnerabilities (NAME:WRECK) in the DNS Module of Nucleus RTOS
Published
Nov. 9, 2021, 1 a.m.
Summary
Security researchers discovered and disclosed 9 vulnerabilities in several DNS implementations, also known as “NAME:WRECK” vulnerabilities. The vulnerabilities described in this advisory are from this set. The DNS client of affected products contains multiple vulnerabilities related to the handling of DNS responses and requests. The most severe could allow an ...
Title
SSA-772220 V1.3 (Last Update: 2021-11-09): OpenSSL Vulnerabilities in Industrial Products
Published
Nov. 9, 2021, 1 a.m.
Summary
OpenSSL has published a security advisory [0] about a vulnerability in OpenSSL versions 1.1.1 < 1.1.1k, that allows an unauthenticated attacker to cause a Denial-of-Service (DoS) if a maliciously crafted renegotiation message is sent. Siemens has released updates for several affected products and recommends to update to the latest versions. ...
Title
SSA-324955 V1.6 (Last Update: 2021-11-09): SAD DNS Attack in Linux Based Products
Published
Nov. 9, 2021, 1 a.m.
Summary
A vulnerability made public under the name SAD DNS affects Domain Name System resolvers due to a vulnerability in the Linux kernel when handling ICMP packets. The Siemens products which are affected are listed below. For more information please see https://www.saddns.net/. Siemens has released updates for several affected products and ...
Title
SSA-044112 V1.0: Multiple Vulnerabilities (NUCLEUS:13) in the TCP/IP Stack of Nucleus RTOS
Published
Nov. 9, 2021, 1 a.m.
Summary
The TCP/IP stack and related services (FTP, TFTP) of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contain several vulnerabilities, also known as “NUCLEUS:13” and as documented below. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends countermeasures ...
Title
SSA-248289 V1.1 (Last Update: 2021-11-09): Denial of Service Vulnerabilities in the IPv6 Stack of Nucleus RTOS
Published
Nov. 9, 2021, 1 a.m.
Summary
The IPv6 stack of the networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) contains two vulnerabilities when processing IPv6 headers which could allow an attacker to cause a denial of service condition. Siemens has released updates for several affected products and recommends to update to the latest versions. ...
Title
SSA-145157 V1.0: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V2.12
Published
Nov. 9, 2021, 1 a.m.
Summary
SIMATIC RTLS Locating Manager before V2.12 contains multiple vulnerabilities that could allow an attacker to read sensitive data or trigger a denial-of-service condition of the application service. Siemens has released an update for the SIMATIC RTLS Locating Manager and recommends to update to the latest version.
Title
SSA-328042 V1.0: File Parsing Vulnerabilities in OBJ Translator in NX
Published
Nov. 9, 2021, 1 a.m.
Summary
Siemens NX is affected by two vulnerabilities that could be triggered when the application reads OBJ files. If a user is tricked to open a malicious file with the affected application, this could lead to an access violation, and potentially also to arbitrary code execution on the target host system. ...
Title
SSA-338732 V1.0: Information Disclosure Vulnerability in Mendix
Published
Nov. 9, 2021, 1 a.m.
Summary
Applications built with affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. This could allow a local attacker to read those documents by exploring the browser cache. Mendix has released updates for the affected product lines, ...
Title
SSA-537983 V1.0: Local Code Execution Vulnerability in SENTRON powermanager V3
Published
Nov. 9, 2021, 1 a.m.
Summary
SENTRON powermanager V3 is affected by a vulnerability that could allow a local attacker to inject arbitrary code and escalate privileges. Siemens has released a security patch for SENTRON powermanager V3.6 HF1 and recommends to update to the latest version and apply this patch.
Thursday, 04.11.2021
Title
VISAM VBASE Editor
Published
Nov. 4, 2021, 3:05 p.m.
Summary
This advisory contains mitigations for Improper Access Control, Cross-site Scripting, Using Components with Known Vulnerabilities, and Improper Restriction of XML External Entity Reference vulnerabilities in the VISAM VBASE Editor automation platform.
  • 1
  • 2 (current)

Last Updates

BOSCH PSIRT
06.12.2024
SIEMENS CERT
16.12.2024
US CERT
08.11.2024
US CERT (ICS)
19.12.2024

By Source

Archive

2024
2023
2022
2021
2020
2019
2018
2017

Feeds