• 1 (current)
  • 2
Freitag, 30.10.2020
Titel
AA20-304A: Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data
Veröffentlicht
30. Oktober 2020 19:11
Text
Original release date: October 30, 2020 | Last revised: November 3, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 8 framework. See the ATT&CK for Enterprise version 8 for all referenced threat actor techniques. This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure ...
Donnerstag, 29.10.2020
Titel
Mitsubishi Electric MELSEC iQ-R, Q and L Series
Veröffentlicht
29. Oktober 2020 15:15
Text
This advisory contains mitigations for an Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric's MELSEC iQ-R, Q and L Series programmable logic controllers.
Titel
Mitsubishi Electric MELSEC iQ-R
Veröffentlicht
29. Oktober 2020 15:10
Text
This advisory contains mitigations for Improper Restriction of Operations within the Bounds of a Memory Buffer, Session Fixation, NULL Pointer Dereference, Improper Access Control, Argument Injection, and Resource Management Errors vulnerabilities in Mitsubishi Electric's iQ-R programmable logic controllers.
Titel
Mitsubishi Electric MELSEC iQ-R Series (Update A)
Veröffentlicht
29. Oktober 2020 15:05
Text
This updated advisory is a follow-up to the original advisory titled ICSA-20-282-02 Mitsubishi Electric MELSEC iQ-R Series that was published October 8, 2020, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for an Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R Series modules.
Titel
AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector
Veröffentlicht
29. Oktober 2020 00:07
Text
Original release date: October 28, 2020 | Last revised: November 2, 2020SummaryThis advisory was updated to include information on Conti, TrickBot, and BazarLoader, including new IOCs and Yara Rules for detection. This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for ...
Dienstag, 27.10.2020
Titel
AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky
Veröffentlicht
27. Oktober 2020 18:00
Text
Original release date: October 27, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the ...
Donnerstag, 22.10.2020
Titel
AA20-296B: Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems
Veröffentlicht
22. Oktober 2020 18:00
Text
Original release date: October 22, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that Iranian advanced persistent threat (APT) actors are likely intent on influencing and interfering with the U.S. elections to sow discord among voters and undermine public confidence in the ...
Titel
B. Braun OnlineSuite
Veröffentlicht
22. Oktober 2020 16:05
Text
This advisory contains mitigations for Relative Path Traversal, Uncontrolled Search Path Element, and Improper Neutralization of Formula Elements in a CSV File vulnerabilities in B. Braun's OnlineSuite.
Titel
B. Braun SpaceCom, Battery Pack SP with Wi-Fi, and Data module compactplus
Veröffentlicht
22. Oktober 2020 16:00
Text
This advisory contains mitigations for Cross-site Scripting, Open Redirect, XPath Injection, Session Fixation, Use of a One-way Hash without a Salt, Relative Path Traversal, Improper Verification of Cryptographic Signature, Improper Privilege Management, Use of Hard-coded Credentials, Active Debug Code, and Improper Access Control vulnerabilities in B. Braun's SpaceCom, Battery Pack ...
Titel
AA20-296A: Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets
Veröffentlicht
22. Oktober 2020 14:44
Text
Original release date: October 22, 2020SummaryThis joint cybersecurity advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor tactics and techniques This joint cybersecurity advisory—written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure ...
Dienstag, 20.10.2020
Titel
Rockwell Automation 1794-AENT Flex I/O Series B
Veröffentlicht
20. Oktober 2020 16:15
Text
This advisory contains mitigations for several Classic Buffer Overflow vulnerabilities in Rockwell Automation's 1794-AENT Flex I/O Series B Ethernet/IP adapter.
Titel
Hitachi ABB Power Grids XMC20 Multiservice-Multiplexer
Veröffentlicht
20. Oktober 2020 16:10
Text
This advisory contains mitigations for an Improper Authentication vulnerability in Hitachi ABB Power Grids' XMC20 Multiservice-Multiplexer telecommunication elements.
Titel
Capsule Technologies SmartLinx Neuron 2 (Update A)
Veröffentlicht
20. Oktober 2020 16:00
Text
This updated advisory is a follow-up to the original advisory titled ICSMA-20-196-01 Capsule Technologies SmartLinx Neuron 2 that was published July 14, 2020, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for a Protection Mechanism Failure vulnerability in Capsule Technologies' SmartLinx Neuron 2, a bedside mobile clinical monitoring ...
Donnerstag, 15.10.2020
Titel
Advantech R-SeeNet
Veröffentlicht
15. Oktober 2020 16:05
Text
This advisory contains mitigations for an SQL Injection vulnerability in Advantech;s R-SeeNet monitoring application software.
Titel
Wibu-Systems CodeMeter (Update C)
Veröffentlicht
15. Oktober 2020 16:00
Text
This updated advisory is a follow-up to the advisory update titled ICSA-20-203-01 Wibu-Systems CodeMeter (Update B) that was published October 1, 2020, to the ICS webpage on us-cert.gov. This advisory contains mitigations for Buffer Access with Incorrect Length Value, Inadequate Encryption Strength, Origin Validation Error, Improper Input Validation, Improper Verification ...
Dienstag, 13.10.2020
Titel
MOXA NPort IAW5000A-I/O Series
Veröffentlicht
13. Oktober 2020 16:45
Text
This advisory contains mitigations for Session Fixation, Improper Privilege Management, Weak Password Requirements, Cleartext Transmission of Sensitive Information, Improper Restriction of Excessive Authentication Attempts, and Exposure of Sensitive Information to an Unauthorized Actor vulnerabilities in the MOXA NPort IAW5000A-I/O Series integrated serial device server.
Titel
SSA-462066 (Last Update: 2020-10-13): Vulnerability known as TCP SACK PANIC in Industrial Products
Veröffentlicht
13. Oktober 2020 02:00
Text
Multiple industrial products are affected by a vulnerability in the kernel known as TCP SACK PANIC. The vulnerability could allow a remote attacker to cause a denial of service condition. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing further ...
Titel
SSA-534763 (Last Update: 2020-10-13): Special Register Buffer Data Sampling (SRBDS) aka Crosstalk in Industrial Products
Veröffentlicht
13. Oktober 2020 02:00
Text
Security researchers published information on a vulnerability known as Crosstalk (INTEL-SA-00320). This vulnerability affects modern Intel processors to a varying degree. Several Siemens Industrial Products contain processors that are affected by the vulnerability. Siemens is preparing updates and recommends specific countermeasures until fixes are available.
Titel
SSA-689071 (Last Update: 2020-10-13): DNSMasq Vulnerabilities in SCALANCE W1750D, SCALANCE M-800 / S615 and RUGGEDCOM RM1224
Veröffentlicht
13. Oktober 2020 02:00
Text
Multiple vulnerabilities have been identified in SCALANCE W1750D, SCALANCE M-800 / S615 and RUGGEDCOM RM1224 devices. The highest scored vulnerability could allow a remote attacker to crash the DNS service or execute arbitrary code. The attacker must be able to craft malicious DNS responses and inject them into the network ...
Titel
Remote Desktop Services Remote Code Execution Vulnerability in Rexroth Industrial PCs
Veröffentlicht
13. Oktober 2020 02:00
Text

BOSCH-SA-856281: Microsoft has published information [1] for several versions of Microsoft Windows XP Microsoft Windows XP embedded Microsoft Windows 7 and Microsoft Windows 7 Embedded Standard regarding a vulnerability in the Remote Desktop Service. The vulnerability could allow an unauthenticated remote attacker to execute arbitrary code on the target system ...

Titel
SSA-455843 (Last Update: 2020-10-13): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens and Siemens Energy Products
Veröffentlicht
13. Oktober 2020 02:00
Text
CISA and WIBU Systems disclosed six vulnerabilities in different versions of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens and Siemens Energy products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2020-14509, CVE-2020-14513, CVE-2020-14515, ...
Titel
SSA-226339 (Last Update: 2020-10-13): Multiple Web Application Vulnerabilities in Desigo Insight
Veröffentlicht
13. Oktober 2020 02:00
Text
The latest hotfix for Desigo Insight fixes three vulnerabilities that have been identified in the web server, including SQL injection (CVE-2020-15792), clickjacking (CVE-2020-15793), and full path disclosure (CVE-2020-15794). Siemens recommends updating to the latest version of Desigo Insight and to apply the hotfix.
Titel
SSA-384879 (Last Update: 2020-10-13): Authentication Bypass Vulnerability in SIPORT MP
Veröffentlicht
13. Oktober 2020 02:00
Text
SIPORT MP version 3.2.1 fixes an authentication bypass vulnerability which could enable an attacker to impersonate other users of the system and perform administrative actions. Siemens recommends to apply the update.
Titel
SSA-381684 (Last Update: 2020-10-13): Improper Password Protection during Authentication in SIMATIC S7-300 and S7-400 CPUs and Derived Products
Veröffentlicht
13. Oktober 2020 02:00
Text
A vulnerability has been identified in SIMATIC S7-300 and S7-400 CPU families and derived products, which could result in credential disclosure. Siemens recommends countermeasures as there are currently no fixes available.
Titel
SSA-398519 (Last Update: 2020-10-13): Vulnerabilities in Intel CPUs (November 2019)
Veröffentlicht
13. Oktober 2020 02:00
Text
Intel has published information on vulnerabilities in Intel products in November 2019. In this advisory Siemens only explicitly mentions the vulnerabilities from the “Intel® CPU Security Advisory” and one vulnerability from “Intel® CSME, Intel® SPS, Intel® TXE, Intel® AMT, Intel® PTT and Intel® DAL Advisory” and lists the Siemens IPC ...
  • 1 (current)
  • 2

Letzte Updates

BOSCH PSIRT
20.03.2024
CODESYS
28.06.2023
SIEMENS CERT
19.04.2024
US CERT
17.04.2024
US CERT (ICS)
18.04.2024

Nach Quelle

Archiv

2024
2023
2022
2021
2020
2019
2018
2017

Feeds