• 1
  • 2 (current)
  • 3
Thursday, 10.10.2024
Title
Siemens Questa and ModelSim
Published
Oct. 10, 2024, 2 p.m.
Summary
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF 1. EXECUTIVE SUMMARY ...
Title
SSA-438590 V1.0: Buffer Overflow Vulnerability in Siveillance Video Camera Drivers
Published
Oct. 10, 2024, 2 a.m.
Summary
Several camera device drivers in the Siveillance Video Device Pack contain a buffer overflow vulnerability that could be exploited under strict conditions. This could allow an attacker to execute code with the permissions of the Recording Server user. Siemens has released an update of the Device Pack recommends to apply ...
Title
SSA-097435 V1.3 (Last Update: 2024-10-10): Usernames Disclosure Vulnerability in Mendix Runtime
Published
Oct. 10, 2024, 2 a.m.
Summary
Mendix Runtime contains an observable response discrepancy vulnerability when validating usernames during authentication. This could allow unauthenticated remote attackers to distinguish between valid and invalid usernames. Siemens has released a new version for Mendix Runtime V8 and recommends to update to the latest version. Siemens is preparing further fix versions ...
Tuesday, 08.10.2024
Title
Microsoft Releases October 2024 Security Updates
Published
Oct. 8, 2024, 8:41 p.m.
Summary
Microsoft released security updates to address vulnerabilities in multiple products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the following and apply necessary updates: Microsoft Security Update Guide for October
Title
SSA-054046 V1.0: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs
Published
Oct. 8, 2024, 2 a.m.
Summary
Several SIMATIC S7-1500 CPU versions are affected by an authentication bypass vulnerability that could allow an unauthenticated remote attacker to gain knowledge about actual and configured maximum cycle times and communication load of the CPU. Siemens has released new versions for several affected products and recommends to update to the ...
Title
SSA-039007 V1.1 (Last Update: 2024-10-08): Heap-based Buffer Overflow Vulnerability in User Management Component (UMC)
Published
Oct. 8, 2024, 2 a.m.
Summary
Siemens User Management Component (UMC) is affected by a heap-based buffer overflow vulnerability which could allow an unauthenticated remote attacker arbitrary code execution. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures for ...
Title
SSA-148641 V1.3 (Last Update: 2024-10-08): XPath Constraint Vulnerability in Mendix Runtime
Published
Oct. 8, 2024, 2 a.m.
Summary
A XPath Constraint vulnerability in the Mendix Runtime was discovered, that can affect the running applications. The vulnerability could allow a malicious user to deduce contents of inaccessible attributes and modify sensitive data. Siemens has released new versions for the affected products and recommends to update to the latest versions.
Title
SSA-999588 V1.6 (Last Update: 2024-10-08): Multiple Vulnerabilities in User Management Component (UMC) Before V2.11.2
Published
Oct. 8, 2024, 2 a.m.
Summary
Siemens User Management Component (UMC) before V2.11.2 is affected by multiple vulnerabilities where the most severe could lead to a restart of the UMC server. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends ...
Title
SSA-962515 V1.3 (Last Update: 2024-10-08): Out of Bounds Read Vulnerability in Industrial Products
Published
Oct. 8, 2024, 2 a.m.
Summary
Several industrial products contain an out of bounds read vulnerability that could allow an attacker to cause a Blue Screen of Death (BSOD) crash of the underlying Windows kernel, leading to denial of service condition. Siemens has released new versions for several affected products and recommends to update to the ...
Title
SSA-959281 V1.0: XML File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Published
Oct. 8, 2024, 2 a.m.
Summary
Siemens Teamcenter Visualization and JT2Go are affected by stack buffer overflow and null pointer dereference vulnerabilities that could be triggered while parsing XML file. If a user is tricked to open a malicious XML file with any of the affected products, this could cause the application to crash or potentially ...
Title
SSA-955858 V1.3 (Last Update: 2024-10-08): Multiple Vulnerabilities in LOGO! 8 BM Devices
Published
Oct. 8, 2024, 2 a.m.
Summary
LOGO! 8 BM (incl. SIPLUS variants) contains multiple web-related vulnerabilities. These could allow an attacker to execute code remotely, put the device into a denial of service state or retrieve parts of the memory. The vulnerabilities are related to the hardware of the product. Siemens has released new hardware versions ...
Title
SSA-921449 V1.2 (Last Update: 2024-10-08): Plaintext Storage of a Password Vulnerability in LOGO! V8.3 BM Devices
Published
Oct. 8, 2024, 2 a.m.
Summary
LOGO! V8.3 BM (incl. SIPLUS variants) devices contain a plaintext storage of a password vulnerability. This could allow an attacker with phyiscal access to an affected device to extract user-set passwords from an embedded storage IC. Siemens has released new hardware versions with the LOGO! V8.4 BM and the SIPLUS ...
Title
SSA-876787 V1.0: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs
Published
Oct. 8, 2024, 2 a.m.
Summary
Several SIMATIC S7-1500 and S7-1200 CPU versions are affected by an open redirect vulnerability that could allow an attacker to make the web server of affected devices redirect a legitimate user to an attacker-chosen URL. For a successful attack, the legitimate user must actively click on an attacker-crafted link. Siemens ...
Title
SSA-852501 V1.0: Multiple Memory Corruption Vulnerabilities in Simcenter Nastran Before 2406.5000
Published
Oct. 8, 2024, 2 a.m.
Summary
Simcenter Nastran contains multiple memory corruption vulnerabilities that could be triggered when the application reads files in BDF file formats. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code execution. ...
Title
SSA-850560 V1.0: Use of 4-Digit PIN in SENTRON PAC3200 Devices
Published
Oct. 8, 2024, 2 a.m.
Summary
SENTRON PAC3200 only provide a 4-digit PIN to protect from administrative access via Modbus TCP interface. Attackers with access to the Modbus TCP interface could easily bypass this protection by brute-force attacks or by monitoring the Modbus cleartext communication. Siemens recommends specific countermeasures for products where fixes are not, or ...
Title
SSA-844582 V1.2 (Last Update: 2024-10-08): Electromagnetic Fault Injection in LOGO! V8.3 BM Devices Results in Broken LOGO! V8.3 Product CA
Published
Oct. 8, 2024, 2 a.m.
Summary
LOGO! V8.3 BM (incl. SIPLUS variants) devices contain a vulnerability that could allow an electromagnetic fault injection. This could allow an attacker to dump and debug the firmware, including the manipulation of memory. Further actions could allow to inject public keys of custom created key pairs which are then signed ...
Title
SSA-783481 V1.3 (Last Update: 2024-10-08): Denial-of-Service Vulnerability in LOGO! 8 BM
Published
Oct. 8, 2024, 2 a.m.
Summary
A Denial-of-Service vulnerability has been identified in LOGO! 8 BM. This vulnerability could allow an attacker to crash a device, if a user is tricked into loading a malicious project file onto an affected device. The vulnerability is related to the hardware of the product. Siemens has released new hardware ...
Title
SSA-711309 V2.1 (Last Update: 2024-10-08): Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products
Published
Oct. 8, 2024, 2 a.m.
Summary
The OPC UA implementations (ANSI C and C++) as used in several SIMATIC products contain a denial of service vulnerability that could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate. Siemens has released new versions for several affected products and ...
Title
SSA-698820 V1.3 (Last Update: 2024-10-08): Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices
Published
Oct. 8, 2024, 2 a.m.
Summary
Fortinet has published information on vulnerabilities in FORTIOS. This advisory lists the related Siemens Industrial products. Siemens has released a new version of Fortigate NGFW for RUGGEDCOM APE1808 and recommends to update to the latest version. Siemens recommends to consult and implement the workarounds provided in Fortinet’s upstream security notifications.
Title
SSA-629254 V1.1 (Last Update: 2024-10-08): Remote Code Execution Vulnerability in SIMATIC SCADA and PCS 7 systems
Published
Oct. 8, 2024, 2 a.m.
Summary
The products listed below contain a remote code execution vulnerability that could allow an unauthenticated remote attacker to execute arbitrary code with high privileges. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures ...
Title
SSA-626178 V1.0: Stack-Based Buffer Overflow Vulnerability in JT2Go Before V2406.0003
Published
Oct. 8, 2024, 2 a.m.
Summary
Siemens JT2Go is affected by a stack-based buffer overflow vulnerability that could be triggered when the application reads files in PDF format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary ...
Title
SSA-620288 V1.2 (Last Update: 2024-10-08): Multiple Vulnerabilities (NUCLEUS:13) in Capital Embedded AR Classic
Published
Oct. 8, 2024, 2 a.m.
Summary
Multiple vulnerabilities (also known as “NUCLEUS:13”) have be identified in the Nucleus RTOS (real-time operating system) and reported in the Siemens Security Advisory SSA-044112: https://cert-portal.siemens.com/productcert/html/ssa-044112.html. Capital Embedded AR Classic uses an affected version of the Nucleus software and inherently contains several of these vulnerabilities. Siemens has released a new version ...
Title
SSA-583523 V1.0: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation
Published
Oct. 8, 2024, 2 a.m.
Summary
Siemens Tecnomatix Plant Simulation contains multiple file parsing vulnerabilities that could be triggered when the application reads files in WRL format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code ...
Title
SSA-540493 V1.0: Kiosk Mode Escape Vulnerability in HiMed Cockpit Devices Before V11.6.2
Published
Oct. 8, 2024, 2 a.m.
Summary
HiMed Cockpit devices before V11.6.2 contain a Kiosk Mode Escape vulnerability that could allow an attacker to escape the restricted environment and gain access to the underlying operating system. Siemens has released a new version for the HiMed Cockpit devices and recommends to update to the latest version.
Title
SSA-455250 V1.4 (Last Update: 2024-10-08): Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.2-h3
Published
Oct. 8, 2024, 2 a.m.
Summary
Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities. Siemens has released a new version of Palo Alto Networks Virtual NGFW for RUGGEDCOM APE1808 and recommends to update to the latest version. Customers are advised to ...
  • 1
  • 2 (current)
  • 3

Last Updates

BOSCH PSIRT
31.10.2024
SIEMENS CERT
13.11.2024
US CERT
08.11.2024
US CERT (ICS)
12.11.2024

By Source

Archive

2024
2023
2022
2021
2020
2019
2018
2017

Feeds