• 1 (current)
  • 2
Mittwoch, 29.04.2020
Titel
AA20-120A: Microsoft Office 365 Security Recommendations
Veröffentlicht
29. April 2020 16:41
Text
Original release date: April 29, 2020SummaryAs organizations adapt or change their enterprise collaboration capabilities to meet “telework” requirements, many organizations are migrating to Microsoft Office 365 (O365) and other cloud collaboration services. Due to the speed of these deployments, organizations may not be fully considering the security configurations of these ...
Dienstag, 28.04.2020
Titel
LCDS LAquis SCADA
Veröffentlicht
28. April 2020 16:00
Text
This advisory contains mitigations for exposure of sensitive information to an unauthorized actor, and improper input validation vulnerabilities in LCDS's LAquis SCADA software.
Donnerstag, 23.04.2020
Titel
Sierra Wireless AirLink ALEOS (Update B)
Veröffentlicht
23. April 2020 16:00
Text
This updated advisory is a follow-up to the original advisory titled ICSA-19-122-03 Sierra Wireless AirLink ALEOS (Update A) that was published August 20, 2019, to the ICS webpage on us-cert.gov. This updated advisory includes mitigations for OS command injection, use of hard-coded credentials, unrestricted upload of file with dangerous type, ...
Dienstag, 21.04.2020
Titel
Inductive Automation Ignition
Veröffentlicht
21. April 2020 16:00
Text
This advisory contains mitigations for an improper access control vulnerability in Inductive Automation's Ignition 8 Gateway web server software.
Donnerstag, 16.04.2020
Titel
AA20-107A: Continued Threat Actor Exploitation Post Pulse Secure VPN Patching
Veröffentlicht
16. April 2020 15:21
Text
Original release date: April 16, 2020 | Last revised: June 30, 2020SummaryNote: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques and mitigations. This Alert provides an update to Cybersecurity and Infrastructure Security ...
Mittwoch, 15.04.2020
Titel
AA20-106A: Guidance on the North Korean Cyber Threat
Veröffentlicht
15. April 2020 14:31
Text
Original release date: April 15, 2020 | Last revised: June 23, 2020SummaryThe U.S. Departments of State, the Treasury, and Homeland Security, and the Federal Bureau of Investigation are issuing this advisory as a comprehensive resource on the North Korean cyber threat for the international community, network defenders, and the public. ...
Dienstag, 14.04.2020
Titel
Eaton HMiSoft VU3
Veröffentlicht
14. April 2020 17:05
Text
This advisory contains mitigations for stack-based buffer overflow and out-of-bounds read vulnerabilities in Eaton's HMiSoft VU3 human-machine interface (HMI).
Titel
Triangle MicroWorks DNP3 Outstation Libraries
Veröffentlicht
14. April 2020 17:00
Text
This advisory contains mitigations for a stack-based buffer overflow vulnerability in Triangle MicroWorks DNP3 components and source code libraries.
Titel
Triangle MicroWorks SCADA Data Gateway
Veröffentlicht
14. April 2020 16:55
Text
This advisory contains mitigations for stack-based buffer overflow, out-of-bounds read, and type confusion vulnerabilities in the Triangle MicroWorks SCADA Data Gateway.
Titel
Siemens Climatix
Veröffentlicht
14. April 2020 16:50
Text
This advisory contains mitigations for cross-site scripting and basic XSS vulnerabilities in Siemens Climatix controllers.
Titel
Siemens IE/PB-Link, RUGGEDCOM, SCALANCE, SIMATIC, SINEMA
Veröffentlicht
14. April 2020 16:45
Text
This advisory contains mitigations for uncontrolled resource consumption and improper input validation vulnerabilities in Siemens IE/PB-Link, RUGGEDCOM, SCALANCE, SIMATIC, and SINEMA products.
Titel
Siemens SIMOTICS, Desigo, APOGEE, and TALON
Veröffentlicht
14. April 2020 16:40
Text
This advisory contains mitigations for a business logic errors vulnerability in Siemens' SIMOTICS, Desigo, APOGEE, and TALON products.
Titel
Siemens SCALANCE & SIMATIC
Veröffentlicht
14. April 2020 16:35
Text
This advisory contains mitigations for a resource exhaustion vulnerability in Siemens' SCALANCE and SIMATIC products.
Titel
Siemens KTK, SIDOOR, SIMATIC, and SINAMICS
Veröffentlicht
14. April 2020 16:30
Text
This advisory contains mitigations for an uncontrolled resource consumption vulnerability in Siemens' KTN, SIDOOR, SIMATIC, and SINAMICS products.
Titel
Siemens TIM 3V-IE and 4R-IE Family Devices
Veröffentlicht
14. April 2020 16:25
Text
This advisory contains mitigations for an active debug code vulnerability in Siemens TIM 3V-IE and 4R-IE Family Devices.
Titel
Siemens SIMATIC S7 (Update B)
Veröffentlicht
14. April 2020 16:20
Text
This updated advisory is a follow-up to the advisory update titled ICSA-20-042-05 Siemens SIMATIC S7 (Update A) that was published March 10, 2020, to the ICS webpage on us-cert.gov. This advisory contains mitigations for a resource exhaustion vulnerability in Siemens SIMATIC S7 devices.
Titel
SSA-270778 (Last Update: 2020-04-14): Denial-of-Service Vulnerability in SIMATIC PCS 7, SIMATIC WinCC and SIMATIC NET PC Software
Veröffentlicht
14. April 2020 02:00
Text
A Denial-of-Service vulnerability was found in SIMATIC PCS 7, SIMATIC WinCC and SIMATIC NET PC software when encrypted communication is enabled. The vulnerability could allow an attacker with network access to cause a Denial-of-Service condition under certain circumstances (versions prior to SIMATIC WinCC V7.3 or SIMATIC PCS 7 V8.1 are ...
Titel
SSB-439005 (Last Update: 2020-04-14): Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP
Veröffentlicht
14. April 2020 02:00
Text
Titel
SSA-162506 (Last Update: 2020-04-14): DHCP Client Vulnerability in SIMOTICS CONNECT 400, Desigo PXC/PXM, APOGEE MEC/MBC/PXC, APOGEE PXC Series, and TALON TC Series
Veröffentlicht
14. April 2020 02:00
Text
SIMOTICS CONNECT 400, Desigo (Power PC-based), APOGEE MEC/MBC/PXC and TALON TC products are affected by a DHCP Client vulnerability as initially reported in SSA-434032 for the Mentor Nucleus Networking Module. Siemens has released updates for some products and is working on further updates. For the remaining affected products, Siemens recommends ...
Titel
SSA-359303 (Last Update: 2020-04-14): Debug Port in TIM 3V-IE and 4R-IE Family Devices
Veröffentlicht
14. April 2020 02:00
Text
The latest update for TIM 3V-IE family devices and TIM 4R-IE family devices fixes a vulnerability that could allow an unauthenticated attacker with network access to port 17185/udp to gain full control over the device. The devices are only vulnerable if the IP address is configured to 192.168.1.2. Siemens has ...
Titel
SSA-886514 (Last Update: 2020-04-14): Persistent XSS Vulnerabilities in the Web Interface of Climatix POL908 and POL909 Modules
Veröffentlicht
14. April 2020 02:00
Text
The Climatix BACnet/IP (POL908) and AWM (POL909) modules contain two persistent cross-site scripting (XSS) vulnerabilities in the web interface that could allow a remote attacker to execute arbitrary JavaScript code in the context of other users' web sessions. Siemens recommends to update Climatix POL908 and POL909 to the latest version ...
Titel
SSA-431678 (Last Update: 2020-04-14): Denial-of-Service Vulnerability in SIMATIC S7 CPU Families
Veröffentlicht
14. April 2020 02:00
Text
SIMATIC S7 CPU families are affected by a vulnerability that could allow remote attackers to perform a Denial-of-Service attack by sending a specially crafted HTTP request to the web server of an affected device. Siemens has released updates for several affected products, is working on updates for the remaining affected ...
Titel
SSA-462066 (Last Update: 2020-04-14): Vulnerability known as TCP SACK PANIC in Industrial Products
Veröffentlicht
14. April 2020 02:00
Text
Multiple industrial products are affected by a vulnerability in the kernel known as TCP SACK PANIC. The vulnerability could allow a remote attacker to cause a denial of service condition. Siemens has released updates for several affected products, and recommends that customers update to the latest version. Siemens is preparing ...
Titel
SSA-377115 (Last Update: 2020-04-14): SegmentSmack in Linux IP-Stack based Industrial Devices
Veröffentlicht
14. April 2020 02:00
Text
The latest updates for the affected products fix a vulnerability that could allow remote attackers to affect the availability of the devices under certain conditions. The underlying TCP stack can be forced to make very computation expensive calls for every incoming packet which can lead to a Denial-of-Service. Siemens has ...
Titel
SSA-593272 (Last Update: 2020-04-14): SegmentSmack in Interniche IP-Stack based Industrial Devices
Veröffentlicht
14. April 2020 02:00
Text
A vulnerability exists in affected products that could allow remote attackers to affect the availability of the devices under certain conditions. The underlying TCP stack can be forced to make very computation expensive calls for every incoming packet which can lead to a Denial-of-Service.
  • 1 (current)
  • 2

Letzte Updates

BOSCH PSIRT
02.05.2022
CODESYS
14.04.2022
SIEMENS CERT
10.05.2022
US CERT
18.05.2022
US CERT (ICS)
24.05.2022

Nach Quelle

Archiv

2022
2021
2020
2019
2018
2017

Feeds