• 1 (current)
  • 2
Dienstag, 29.09.2020
Titel
MB Connect line mbCONNECT24, mymbCONNECT24
Veröffentlicht
29. September 2020 16:10
Text
This advisory contains mitigations for SQL Injection, Cross-site Request Forgery, and Command Injection vulnerabilities in the MB connect line mymbCONNECT24 and mbCONNECT24 software.
Titel
Yokogawa WideField3
Veröffentlicht
29. September 2020 16:05
Text
This advisory contains mitigations for a Buffer Copy Without Checking Size of Input vulnerability in the Yokogawa WideField3 PLC programming tool.
Titel
B&R Automation SiteManager and GateManager
Veröffentlicht
29. September 2020 16:00
Text
This advisory contains mitigations for Path Traversal, Uncontrolled Resource Consumption, Information Exposure, Improper Authentication, and Information Disclosure vulnerabilities in B&R Automation SiteManager and GateManager products.
Montag, 28.09.2020
Titel
Vulnerabilities in Bosch PRAESIDEO and PRAESENSA
Veröffentlicht
28. September 2020 02:00
Text

BOSCH-SA-538331-BT: Two security vulnerabilities have been uncovered in the web based management interface of the PRAESIDEO Network Controller and the PRAESENSA System Controller. The vulnerabilities will allow a Cross-Site Request Forgery (CSRF) attack and a Cross-site Scripting (XSS) attack. For PRAESIDEO a third vulnerability will allow a replay attack with ...

Freitag, 25.09.2020
Titel
WIBU Systems CodeMeter Runtime Vulnerabilities in Rexroth Products
Veröffentlicht
25. September 2020 02:00
Text

BOSCH-SA-231483: A set of 6 vulnerabilities affect multiple versions of the WIBU Systems CodeMeter Runtime Software. This software is used by multiple Rexroth Products and Bosch Rexroth customers for license management. In order to successfully exploit these vulnerabilities an attacker requires access to the network or system. One vulnerability (CVE-2020-14509) ...

Donnerstag, 24.09.2020
Titel
3S CoDeSys (Update A)
Veröffentlicht
24. September 2020 16:00
Text
This updated advisory is a follow-up to the original advisory titled ICSA-13-011-01 3S CoDeSys that was published January 10, 2013, to the ICS webpage on us-cert.gov. This advisory contains mitigations for Improper Access Control, and Relative Path Traversal vulnerabilities in 3S-Smart Software Solutions software.
Dienstag, 22.09.2020
Titel
AA20-266A: LokiBot Malware
Veröffentlicht
22. September 2020 17:00
Text
Original release date: September 22, 2020 | Last revised: September 23, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for all referenced threat actor techniques. This product was written by the Cybersecurity and Infrastructure Security Agency (CISA) with contributions ...
Titel
GE Digital APM Classic
Veröffentlicht
22. September 2020 16:05
Text
This advisory contains mitigations for Authorization Bypass Through User-controlled Key, and Use of a One-Way Hash Without a Salt vulnerabilities in GE's APM Classic module, a data analysis and processing tool.
Titel
GE Reason S20 Ethernet Switch
Veröffentlicht
22. September 2020 16:00
Text
This advisory contains mitigations for Cross-site Scripting vulnerabilities in GE's Reason S20 Ethernet Switch.
Donnerstag, 17.09.2020
Titel
Philips Clinical Collaboration Platform
Veröffentlicht
17. September 2020 16:10
Text
This advisory contains mitigations for Cross-site Request Forgery, Improper Neutralization of Script in Attributes in a Web Page, Protection Mechanism Failure, Algorithm Downgrade, and Configuration vulnerabilities in Philips Clinical Collaboration Platform HMI data management software.
Dienstag, 15.09.2020
Titel
AA20-259A: Iran-Based Threat Actor Exploits VPN Vulnerabilities
Veröffentlicht
15. September 2020 18:00
Text
Original release date: September 15, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This product was written by the Cybersecurity and Infrastructure Security Agency (CISA) with contributions from the Federal Bureau of Investigation ...
Titel
ENTTEC Lighting Controllers (Update A)
Veröffentlicht
15. September 2020 16:00
Text
This updated advisory is a follow-up to the original advisory titled ICSA-20-177-01 ENTTEC Lighting Controllers that was published June 25, 2020, to the ICS webpage on us-cert.gov. This advisory contains mitigations for Use of Hard-coded Cryptographic Key, Cross-site Scripting, Improper Access Control, and Incorrect Permission Assignment for Critical Resource vulnerabilities ...
Montag, 14.09.2020
Titel
AA20-258A: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity
Veröffentlicht
14. September 2020 15:00
Text
Original release date: September 14, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics, techniques, and procedures (TTPs) to target U.S. Government agencies. CISA has observed these—and other threat actors with ...
Dienstag, 08.09.2020
Titel
SSB-439005 (Last Update: 2020-09-08): Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP
Veröffentlicht
8. September 2020 02:00
Text
Titel
SSA-462066 (Last Update: 2020-09-08): Vulnerability known as TCP SACK PANIC in Industrial Products
Veröffentlicht
8. September 2020 02:00
Text
Multiple industrial products are affected by a vulnerability in the kernel known as TCP SACK PANIC. The vulnerability could allow a remote attacker to cause a denial of service condition. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing further ...
Titel
SSA-473245 (Last Update: 2020-09-08): Denial-of-Service Vulnerability in Profinet Devices
Veröffentlicht
8. September 2020 02:00
Text
A vulnerability in affected devices could allow an attacker to perform a denial-of-service attack if a large amount of specially crafted UDP packets are sent to the device. Siemens has released updates for several affected products, and recommends that customers update to the new version. Siemens is preparing further updates ...
Titel
SSA-480230 (Last Update: 2020-09-08): Denial-of-Service in Webserver of Industrial Products
Veröffentlicht
8. September 2020 02:00
Text
A vulnerability in the affected devices could allow an unauthorized attacker with network access to the webserver of an affected device to perform a denial-of-service attack. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing further updates and recommends specific ...
Titel
SSA-780073 (Last Update: 2020-09-08): Denial-of-Service Vulnerability in PROFINET Devices via DCE-RPC Packets
Veröffentlicht
8. September 2020 02:00
Text
Products that include the Siemens PROFINET-IO (PNIO) stack in versions prior V06.00 are potentially affected by a denial-of-service vulnerability when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing ...
Titel
SSA-841348 (Last Update: 2020-09-08): Multiple Vulnerabilities in the UMC Stack
Veröffentlicht
8. September 2020 02:00
Text
The latest update for the below listed products fixes two security vulnerabilities that could allow an attacker to cause a partial Denial-of-Service on the UMC component of the affected devices under certain circumstances, and one vulnerability that could allow an attacker to locally escalate privileges from a user with administrative ...
Titel
SSA-534763 (Last Update: 2020-09-08): Special Register Buffer Data Sampling (SRBDS) aka Crosstalk in Industrial Products
Veröffentlicht
8. September 2020 02:00
Text
Security researchers published information on a vulnerability known as Crosstalk (INTEL-SA-00320). This vulnerability affects modern Intel processors to a varying degree. Several Siemens Industrial Products contain processors that are affected by the vulnerability. Siemens is preparing updates and recommends specific countermeasures until fixes are available.
Titel
SSA-251935 (Last Update: 2020-09-08): Multiple Privilege Escalation Vulnerabilities in SIMATIC RTLS Locating Manager
Veröffentlicht
8. September 2020 02:00
Text
The latest update for SIMATIC RTLS Locating Manager fixes various vulnerabilities that could allow a low-privileged local user to escalate privileges. Siemens recommends to apply the update of the SIMATIC RTLS Locating Manager.
Titel
SSA-381684 (Last Update: 2020-09-08): Improper Password Protection during Authentication in SIMATIC S7-300 and S7-400 CPUs
Veröffentlicht
8. September 2020 02:00
Text
A vulnerability has been identified in SIMATIC S7-300 and S7-400 CPU families, which could result in credential disclosure. Siemens recommends countermeasures as there are currently no fixes available.
Titel
SSA-436520 (Last Update: 2020-09-08): XSS and CSRF Vulnerabilities in Polarion Subversion Webclient
Veröffentlicht
8. September 2020 02:00
Text
Multiple cross-site scripting (XSS) vulnerabilities were found in the subversion webclient of Polarion. In addition, the webclient doesn’t have any cross-site request forgery (CSRF) protection. An attacker could inject client side script to induce the victim to issue an HTTP request that would lead to a state changing operation. Siemens ...
Titel
SSA-455843 (Last Update: 2020-09-08): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens and Siemens Energy Products
Veröffentlicht
8. September 2020 02:00
Text
CISA and WIBU Systems disclosed six vulnerabilities in different versions of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens and Siemens Energy products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2020-14509, CVE-2020-14513, CVE-2020-14515, ...
Titel
SSA-542525 (Last Update: 2020-09-08): Authentication Vulnerabilities in SIMATIC HMI Products
Veröffentlicht
8. September 2020 02:00
Text
SIMATIC HMI Products are affected by two vulnerabilities that could allow a remote attacker to discover user passwords and obtain access to the Sm@rt Server via a brute-force attack. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
  • 1 (current)
  • 2

Letzte Updates

BOSCH PSIRT
21.09.2022
CODESYS
27.07.2022
SIEMENS CERT
13.09.2022
US CERT
22.09.2022
US CERT (ICS)
22.09.2022

Nach Quelle

Archiv

2022
2021
2020
2019
2018
2017

Feeds