• 1 (current)
  • 2
Dienstag, 29.09.2020
Titel
MB Connect line mbCONNECT24, mymbCONNECT24
Veröffentlicht
29. September 2020 16:10
Text
This advisory contains mitigations for SQL Injection, Cross-site Request Forgery, and Command Injection vulnerabilities in the MB connect line mymbCONNECT24 and mbCONNECT24 software.
Titel
Yokogawa WideField3
Veröffentlicht
29. September 2020 16:05
Text
This advisory contains mitigations for a Buffer Copy Without Checking Size of Input vulnerability in the Yokogawa WideField3 PLC programming tool.
Titel
B&R Automation SiteManager and GateManager
Veröffentlicht
29. September 2020 16:00
Text
This advisory contains mitigations for Path Traversal, Uncontrolled Resource Consumption, Information Exposure, Improper Authentication, and Information Disclosure vulnerabilities in B&R Automation SiteManager and GateManager products.
Montag, 28.09.2020
Titel
Vulnerabilities in Bosch PRAESIDEO and PRAESENSA
Veröffentlicht
28. September 2020 02:00
Text

BOSCH-SA-538331-BT: Two security vulnerabilities have been uncovered in the web based management interface of the PRAESIDEO Network Controller and the PRAESENSA System Controller. The vulnerabilities will allow a Cross-Site Request Forgery (CSRF) attack and a Cross-site Scripting (XSS) attack. For PRAESIDEO a third vulnerability will allow a replay attack with ...

Freitag, 25.09.2020
Titel
WIBU Systems CodeMeter Runtime Vulnerabilities in Rexroth Products
Veröffentlicht
25. September 2020 02:00
Text

BOSCH-SA-231483: A set of 6 vulnerabilities affect multiple versions of the WIBU Systems CodeMeter Runtime Software. This software is used by multiple Rexroth Products and Bosch Rexroth customers for license management. In order to successfully exploit these vulnerabilities an attacker requires access to the network or system. One vulnerability (CVE-2020-14509) ...

Donnerstag, 24.09.2020
Titel
Sicherheitsupdate: CODESYS Security Advisory 2020-06
Veröffentlicht
24. September 2020 16:11
Text
Please check source url for more information.
Titel
3S CoDeSys (Update A)
Veröffentlicht
24. September 2020 16:00
Text
This updated advisory is a follow-up to the original advisory titled ICSA-13-011-01 3S CoDeSys that was published January 10, 2013, to the ICS webpage on us-cert.gov. This advisory contains mitigations for Improper Access Control, and Relative Path Traversal vulnerabilities in 3S-Smart Software Solutions software.
Dienstag, 22.09.2020
Titel
AA20-266A: LokiBot Malware
Veröffentlicht
22. September 2020 17:00
Text
Original release date: September 22, 2020 | Last revised: September 23, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for all referenced threat actor techniques. This product was written by the Cybersecurity and Infrastructure Security Agency (CISA) with contributions ...
Titel
GE Digital APM Classic
Veröffentlicht
22. September 2020 16:05
Text
This advisory contains mitigations for Authorization Bypass Through User-controlled Key, and Use of a One-Way Hash Without a Salt vulnerabilities in GE's APM Classic module, a data analysis and processing tool.
Titel
GE Reason S20 Ethernet Switch
Veröffentlicht
22. September 2020 16:00
Text
This advisory contains mitigations for Cross-site Scripting vulnerabilities in GE's Reason S20 Ethernet Switch.
Donnerstag, 17.09.2020
Titel
Philips Clinical Collaboration Platform
Veröffentlicht
17. September 2020 16:10
Text
This advisory contains mitigations for Cross-site Request Forgery, Improper Neutralization of Script in Attributes in a Web Page, Protection Mechanism Failure, Algorithm Downgrade, and Configuration vulnerabilities in Philips Clinical Collaboration Platform HMI data management software.
Titel
Advantech WebAccess Node
Veröffentlicht
17. September 2020 16:05
Text
This advisory contains mitigations for an Incorrect Permission Assignment for Critical Resource vulnerability in the Advantech WebAccess Node HMI platform.
Dienstag, 15.09.2020
Titel
AA20-259A: Iran-Based Threat Actor Exploits VPN Vulnerabilities
Veröffentlicht
15. September 2020 18:00
Text
Original release date: September 15, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This product was written by the Cybersecurity and Infrastructure Security Agency (CISA) with contributions from the Federal Bureau of Investigation ...
Titel
ENTTEC Lighting Controllers (Update A)
Veröffentlicht
15. September 2020 16:00
Text
This updated advisory is a follow-up to the original advisory titled ICSA-20-177-01 ENTTEC Lighting Controllers that was published June 25, 2020, to the ICS webpage on us-cert.gov. This advisory contains mitigations for Use of Hard-coded Cryptographic Key, Cross-site Scripting, Improper Access Control, and Incorrect Permission Assignment for Critical Resource vulnerabilities ...
Montag, 14.09.2020
Titel
AA20-258A: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity
Veröffentlicht
14. September 2020 15:00
Text
Original release date: September 14, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics, techniques, and procedures (TTPs) to target U.S. Government agencies. CISA has observed these—and other threat actors with ...
Dienstag, 08.09.2020
Titel
SSA-436520 (Last Update: 2020-09-08): XSS and CSRF Vulnerabilities in Polarion Subversion Webclient
Veröffentlicht
8. September 2020 02:00
Text
Multiple cross-site scripting (XSS) vulnerabilities were found in the subversion webclient of Polarion. In addition, the webclient doesn’t have any cross-site request forgery (CSRF) protection. An attacker could inject client side script to induce the victim to issue an HTTP request that would lead to a state changing operation. Siemens ...
Titel
SSA-455843 (Last Update: 2020-09-08): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens and Siemens Energy Products
Veröffentlicht
8. September 2020 02:00
Text
CISA and WIBU Systems disclosed six vulnerabilities in different versions of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens and Siemens Energy products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2020-14509, CVE-2020-14513, CVE-2020-14515, ...
Titel
SSA-534763 (Last Update: 2020-09-08): Special Register Buffer Data Sampling (SRBDS) aka Crosstalk in Industrial Products
Veröffentlicht
8. September 2020 02:00
Text
Security researchers published information on a vulnerability known as Crosstalk (INTEL-SA-00320). This vulnerability affects modern Intel processors to a varying degree. Several Siemens Industrial Products contain processors that are affected by the vulnerability. Siemens is preparing updates and recommends specific countermeasures until fixes are available.
Titel
SSA-542525 (Last Update: 2020-09-08): Authentication Vulnerabilities in SIMATIC HMI Products
Veröffentlicht
8. September 2020 02:00
Text
SIMATIC HMI Products are affected by two vulnerabilities that could allow a remote attacker to discover user passwords and obtain access to the Sm@rt Server via a brute-force attack. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Titel
SSA-568969 (Last Update: 2020-09-08): Insecure Storage of Sensitive Information in Spectrum Power™ 4
Veröffentlicht
8. September 2020 02:00
Text
Vulnerabilities in Spectrum Power™ 4 could allow an unauthorized attacker to retrieve a list of software users, or in certain cases to list the contents of a directory. Siemens has released updates and configuration recommendations for Spectrum Power™ 4 in order to mitigate the issues.
Titel
SSA-709003 (Last Update: 2020-09-08): Privilege Escalation Vulnerability in License Management Utility (LMU)
Veröffentlicht
8. September 2020 02:00
Text
The latest update for the License Management Utility (LMU), which is used by multiple Siemens building technology products, fixes a vulnerability that could allow local users to escalate privileges and execute code as local SYSTEM user. Siemens has released an update version of LMU, recommends to install this update on ...
Titel
SSA-770698 (Last Update: 2020-09-08): User Information Disclosure Vulnerability in Siveillance Video Client
Veröffentlicht
8. September 2020 02:00
Text
The Siveillance Video Client contains an information disclosure vulnerability that could allow an attacker to obtain valid adminstrator login names and use this information to launch further attacks. Siemens recommends specific countermeasures and provides patches for released versions of the Siveillance Video Client.
Titel
SSA-102233 (Last Update: 2020-09-08): SegmentSmack in VxWorks-based Industrial Devices
Veröffentlicht
8. September 2020 02:00
Text
The latest updates for the affected products fix a vulnerability that could allow remote attackers to affect the availability of the devices under certain conditions. The underlying TCP stack can be forced to make very computation expensive calls for every incoming packet which can lead to a Denial-of-Service. Siemens is ...
Titel
SSA-270778 (Last Update: 2020-09-08): Denial-of-Service Vulnerability in SIMATIC PCS 7, SIMATIC WinCC and SIMATIC NET PC Software
Veröffentlicht
8. September 2020 02:00
Text
A Denial-of-Service vulnerability was found in SIMATIC PCS 7, SIMATIC WinCC and SIMATIC NET PC software when encrypted communication is enabled. The vulnerability could allow an attacker with network access to cause a Denial-of-Service condition under certain circumstances (versions prior to SIMATIC WinCC V7.3 or SIMATIC PCS 7 V8.1 are ...
Titel
SSA-251935 (Last Update: 2020-09-08): Multiple Privilege Escalation Vulnerabilities in SIMATIC RTLS Locating Manager
Veröffentlicht
8. September 2020 02:00
Text
The latest update for SIMATIC RTLS Locating Manager fixes various vulnerabilities that could allow a low-privileged local user to escalate privileges. Siemens recommends to apply the update of the SIMATIC RTLS Locating Manager.
  • 1 (current)
  • 2

Letzte Updates

BOSCH PSIRT
04.10.2021
CODESYS
19.11.2021
SIEMENS CERT
09.11.2021
US CERT
17.11.2021
US CERT (ICS)
18.11.2021

Nach Quelle

Archiv

2021
2020
2019
2018
2017

Feeds