• 1
  • 2 (current)
Tuesday, 13.06.2023
Title
SSA-968170 V1.0: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products
Published
June 13, 2023, 2 a.m.
Summary
SIMATIC STEP 7 and PCS 7 contain a database management system that could allow remote users with low privileges to use embedded functions of the database (local or in a network share) that have impact on the server. An attacker with network access to the server network could leverage these ...
Title
SSA-942865 V1.0: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products
Published
June 13, 2023, 2 a.m.
Summary
Several SINAMICS MV (medium voltage) products are affected by multiple vulnerabilities in the integrated SCALANCE S615 device, as documented in SSA-419740 (https://cert-portal.siemens.com/productcert/html/ssa-419740.html). Siemens recommends to update the firmware of the integrated SCALANCE S615 device to the latest version. Siemens recommends specific countermeasures for products where the firmware update is not, ...
Title
SSA-914026 V1.0: Local Code Execution Vulnerability in SIMATIC WinCC V7
Published
June 13, 2023, 2 a.m.
Summary
SIMATIC WinCC V7 is affected by a vulnerability that could allow a local attacker to inject arbitrary code and escalate privileges, if a non-default installation path was chosen during installation. Siemens has released an update for SIMATIC WinCC and recommends to update to the latest version.
Title
SSA-887249 V1.0: Multiple Vulnerabilities in the Web Interface of SICAM Q200 Devices
Published
June 13, 2023, 2 a.m.
Summary
Multiple vulnerabilities were identified in the webserver of Q200 devices. These include Cross Site Request Forgery (CSRF), session fixation, missing secure flags in HTTP cookies and memory corruption issues due to missing input validation that could lead to remote code execution. Siemens has released an update for POWER METER SICAM ...
Title
SSA-851884 V1.1 (Last Update: 2023-06-13): Authentication Bypass Vulnerability in Mendix SAML Module
Published
June 13, 2023, 2 a.m.
Summary
The Mendix SAML module insufficiently verifies the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application. Mendix has provided fix releases for the Mendix SAML module and recommends to update to the latest version. Note: For compatibility reasons, fix versions are introduced ...
Title
SSA-831302 V1.0: Vulnerabilities in the BIOS of the SIMATIC S7-1500 TM MFP V1.0
Published
June 13, 2023, 2 a.m.
Summary
Multiple vulnerabilities have been identified in the BIOS of the SIMATIC S7-1500 TM MFP V1.0. Siemens is preparing updates and recommends countermeasures for products where updates are not, or not yet available.
Title
SSA-824231 V1.4 (Last Update: 2023-06-13): Unauthenticated Firmware Upload Vulnerability in Desigo PX Controllers
Published
June 13, 2023, 2 a.m.
Summary
Several Desigo PXC/PXM devices contain a vulnerability that could allow unauthenticated remote attackers to upload malicious firmware without prior authentication. Siemens has released updates for the affected products and recommends to update to the latest versions.
Title
SSA-794697 V1.0: Vulnerabilities in the Linux Kernel of the SIMATIC S7-1500 TM MFP V1.0
Published
June 13, 2023, 2 a.m.
Summary
Multiple vulnerabilities have been identified in the Linux Kernel of the SIMATIC S7-1500 TM MFP V1.0. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Title
SSA-731916 V1.0: Multiple Vulnerabilities in CPCI85 Firmware of SICAM A8000 Devices
Published
June 13, 2023, 2 a.m.
Summary
The CPCI85 firmware of SICAM A8000 CP-8031 and CP-8050 is affected by multiple vulnerabilities such as authenticated remote command injection, exposure of serial UART interface, and hard coded credentials (for UART login). Siemens has released updates for the affected products and recommends to update to the latest versions.
Title
SSA-712929 V2.1 (Last Update: 2023-06-13): Denial of Service Vulnerability in OpenSSL (CVE-2022-0778) Affecting Industrial Products
Published
June 13, 2023, 2 a.m.
Summary
A vulnerability in the openSSL component (CVE-2022-0778, [0]) could allow an attacker to create a denial of service condition by providing specially crafted elliptic curve certificates to products that use a vulnerable version of openSSL. Siemens has released updates for several affected products and recommends to update to the latest ...
Title
SSA-691715 V1.1 (Last Update: 2023-06-13): Vulnerability in OPC Foundation Local Discovery Server Affecting Siemens Products
Published
June 13, 2023, 2 a.m.
Summary
A vulnerability was identified in OPC Foundation Local Discovery Server which also affects Siemens products that could allow an attacker to escalate privileges under certain circumstances. Siemens has released an update for SIMATIC WinCC and recommends to update to the latest version. Siemens is preparing further updates and recommends specific ...
Title
SSA-572005 V1.2 (Last Update: 2023-06-13): Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices
Published
June 13, 2023, 2 a.m.
Summary
Session fixation and multiple incorrect parameter parsing vulnerabilities that could potentially lead to remote code execution were identified in the web server of SICAM P850 and SICAM P855 devices. Siemens has released updates for the affected products and recommends to update to the latest versions.
Title
SSA-538795 V1.0: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Published
June 13, 2023, 2 a.m.
Summary
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities that could be triggered when the application reads malicious CGM files. If a user is tricked to open a malicious CGM file with the affected products, this could lead the application to crash or potentially lead to arbitrary ...
Title
SSA-508677 V1.0: Use of Obsolete Function Vulnerability in SIMATIC WinCC before V8
Published
June 13, 2023, 2 a.m.
Summary
Before SIMATIC WinCC V8, legacy OPC services (OPC DA (Data Access), OPC HDA (Historical Data Access), and OPC AE (Alarms & Events)) were used per default. These services were designed on top of the Windows ActiveX and DCOM mechanisms and do not implement state-of-the-art security mechanisms for authentication and encryption ...
Title
SSA-482956 V1.0: Information Disclosure Vulnerability in SIMOTION before V5.5
Published
June 13, 2023, 2 a.m.
Summary
SIMOTION contains an information disclosure vulnerability that could allow an unauthenticated attacker to extract confidential technology object (TO) configuration from the device. Siemens has released updates for the affected products and recommends to update to the latest versions.
Title
SSA-120378 V1.2 (Last Update: 2023-06-13): Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Published
June 13, 2023, 2 a.m.
Summary
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities that could be triggered when the application reads malicious TIF, CGM or PDF files. If a user is tricked to open a malicious TIF, CGM or PDF file with the affected products, this could lead the application to ...
Title
SSA-042050 V1.0: Know-How Protection Mechanism Failure in TIA Portal
Published
June 13, 2023, 2 a.m.
Summary
The know-how protection feature in Totally Integrated Automation Portal (TIA Portal) does not properly update the encryption of existing program blocks when a project file is updated. This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the ...
Monday, 12.06.2023
Title
Understanding Ransomware Threat Actors: LockBit
Published
June 12, 2023, 6:22 p.m.
Summary
SUMMARY In 2022, LockBit was the most deployed ransomware variant across the world and continues to be prolific in 2023. Since January 2020, affiliates using LockBit have attacked organizations of varying sizes across an array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency ...
Thursday, 08.06.2023
Title
​Sensormatic Electronics Illustra Pro Gen 4
Published
June 8, 2023, 2 p.m.
Summary
1. EXECUTIVE SUMMARY ​CVSS v3 8.3 ​ATTENTION: Exploitable via adjacent network ​Vendor: Sensormatic Electronics, a subsidiary of Johnson Controls, Inc. ​Equipment: Illustra Pro Gen 4 ​Vulnerability: Active Debug Code 2. RISK EVALUATION ​Successful exploitation of this vulnerability could allow an attacker to compromise device credentials over a long period of ...
Title
Atlas Copco Power Focus 6000
Published
June 8, 2023, 2 p.m.
Summary
1. EXECUTIVE SUMMARY CVSS v3 6.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Atlas Copco Equipment: Power Focus 6000 Vulnerabilities: Cleartext Storage of Sensitive Information, Small Space of Random Values, Cleartext Transmission of Sensitive Information 2. RISK EVALUATION Successful exploitation of these vulnerabilities could cause a loss of sensitive information and ...
Tuesday, 06.06.2023
Title
#StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability
Published
June 6, 2023, 10:58 p.m.
Summary
SUMMARY Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations ...
Title
Mitsubishi Electric MELSEC iQ-R Series/iQ-F Series
Published
June 6, 2023, 2 p.m.
Summary
1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Equipment: MELSEC iQ-R Series/iQ-F Series EtherNet/IP Modules and EtherNet/IP Configuration tool Vulnerabilities: Weak Password Requirements, Use of Hard-coded Password, Missing Password Field Masking, Unrestricted Upload of File with Dangerous Type 2. RISK EVALUATION Successful exploitation of ...
Title
Delta Electronics CNCSoft-B DOPSoft
Published
June 6, 2023, 2 p.m.
Summary
1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Delta Electronics Equipment: CNCSoft-B DOPSoft Vulnerabilities: Stack-based Buffer Overflow, Heap-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to exploit a buffer overflow condition and remotely execute arbitrary code. 3. TECHNICAL DETAILS 3.1 ...
Thursday, 01.06.2023
Title
HID Global SAFE
Published
June 1, 2023, 2 p.m.
Summary
1. EXECUTIVE SUMMARY CVSS v3 7.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: HID Global Equipment: SAFE Vulnerabilities: Modification of Assumed-Immutable Data 2. RISK EVALUATION Successful exploitation of this vulnerability could result in exposure of personal data or create a denial-of-service condition. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions ...
  • 1
  • 2 (current)

Last Updates

BOSCH PSIRT
31.10.2024
SIEMENS CERT
26.11.2024
US CERT
08.11.2024
US CERT (ICS)
05.12.2024

By Source

Archive

2024
2023
2022
2021
2020
2019
2018
2017

Feeds