Advisories

Für CVSS 2.0, 3.0 und 3.2
VDE-2024-043
Aug. 22, 2024, 8:00 vorm.
Products from the Edge Gateway Family are affected by recently published so called RegreSSHion vulnerability.
VDE-2024-037
Juli 10, 2024, 8:00 vorm.
A critical security vulnerability was discovered in the products, which is caused by the IPv6 stack in the Linux kernel.The impact of the vulnerability on the affected products may result …
VDE-2023-006
Juli 8, 2024, 12:00 nachm.
An authenticated attacker can send a malformed packet to trigger a device crash via the CODESYS V2 runtime commands parsing. Update: 08.07.2024 release date of the updates has been changed.
VDE-2024-032
Juli 3, 2024, 3:33 nachm.
There exists a vulnerability in all REX 100 devices with firmware <= 2.2.11 that allows an authenticated attacker to execute arbitrary system commands via GET requests. Update: 03.07.2024 3:30pm …
VDE-2024-030
Juli 3, 2024, 11:00 vorm.
There exists a vulnerability in all mbNET.mini devices with firmware <= 2.2.11 that allows an authenticated attacker to execute arbitrary system commands via GET requests. Update: 03.07.2024 3:30 pm …
VDE-2024-029
Juni 11, 2024, 8:00 vorm.
The OpenSSL library used in the affected products is vulnerable to an unbounded growth of the session cache in the TLSv1.3 implementation.
VDE-2024-021
Mai 21, 2024, 8:00 vorm.
The WAGO Navigator versions 1.0.1 and 1.0 are vulnerable due to the use of the WiX toolset version 3.11.2.
VDE-2023-068
Mai 21, 2024, 8:00 vorm.
The following vulnerabilities are published with reference to CODESYS Advisory 2023-05, CODESYS Advisory 2023-06 and CODESYS Advisory 2023-09