Donnerstag, 30.06.2022
Titel
AA22-181A: #StopRansomware: MedusaLocker
Veröffentlicht
30. Juni 2022 19:00
Text
Original release date: June 30, 2022SummaryActions to take today to mitigate cyber threats from ransomware: • Prioritize remediating known exploited vulnerabilities. • Train users to recognize and report phishing attempts. • Enable and enforce multifactor authentication. Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to ...
Titel
Exemys RME1
Veröffentlicht
30. Juni 2022 16:25
Text
This advisory contains mitigations for an Improper Authentication vulnerability in the Exemys RME1 analog acquisition module.
Titel
Yokogawa Wide Area Communication Router
Veröffentlicht
30. Juni 2022 16:20
Text
This advisory contains mitigations for a Use of Insufficiently Random Values vulnerability in the Yokogawa Wide Area Communication Router.
Titel
Emerson DeltaV Distributed Control System
Veröffentlicht
30. Juni 2022 16:15
Text
This advisory contains mitigations for a Missing Authentication for Critical Function, Use of Hard-coded Credentials, Insufficient Verification of Data Authenticity, and Use of a Broken or Risky Cryptographic Algorithm vulnerabilities in the Emerson DeltaV Distributed Control System software management platform.
Titel
Mitsubishi Electric FA Engineering Software (Update A)
Veröffentlicht
30. Juni 2022 16:05
Text
This updated advisory is a follow-up to the original advisory titled ICSA-21-350-05 Mitsubishi Electric FA Engineering Software that was published December 16, 2021, on the ICS webpage on cisa.gov/ics. This advisory contains mitigations for Out-of-bounds Read, and Integer Underflow vulnerabilities in Mitsubishi Electric's FA Engineering Software products.
Titel
CODESYS Gateway Server (Update A)
Veröffentlicht
30. Juni 2022 16:00
Text
This updated advisory is a follow-up to the original advisory titled ICSA-15-258-02 3S CODESYS Gateway Server Buffer overflow Vulnerability that was published September 15, 2015, on the ICS webpage at cisa.gov/ics. This advisory provides mitigation details for a heap-based buffer overflow vulnerability in CODESYS Gateway Server products.
Dienstag, 28.06.2022
Titel
ABB e-Design
Veröffentlicht
28. Juni 2022 16:25
Text
This advisory contains mitigations for an Incorrect Default Permissions vulnerability in ABB e-Design engineering software.
Titel
Omron SYSMAC CS/CJ/CP Series and NJ/NX Series
Veröffentlicht
28. Juni 2022 16:20
Text
This advisory contains mitigations for Cleartext Transmission of Sensitive Information, Insufficient Verification of Data Authenticity, and Plaintext Storage of a Password vulnerabilities in Omron SYSMAC CS/CJ/CP Series and NJ/NX Series programmable logic controllers.
Titel
Motorola Solutions MOSCAD IP and ACE IP Gateways
Veröffentlicht
28. Juni 2022 16:10
Text
This advisory contains mitigations for a missing authentication for critical function vulnerability in the Motorola Solutions MOSCAD IP and ACE IP Gateways products.
Titel
Motorola Solutions MDLC
Veröffentlicht
28. Juni 2022 16:05
Text
This advisory contains mitigations for Use of a Broken or Risky Cryptographic Algorithm, and Plaintext Storage of a Password vulnerabilities in the Motorola Solutions MDLC protocol parser.
Titel
Motorola Solutions ACE1000
Veröffentlicht
28. Juni 2022 16:00
Text
This advisory contains mitigations for Use of Hard-coded Cryptographic Key, Use of Hard-coded Credentials, and Insufficient Verification of Data Authenticity vulnerabilities in the Motorola Solutions ACE1000 remote terminal unit.
Donnerstag, 23.06.2022
Titel
AA22-174A: Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems
Veröffentlicht
23. Juni 2022 19:00
Text
Original release date: June 23, 2022SummaryActions to take today: • Install fixed builds, updating all affected VMware Horizon and UAG systems to the latest versions. If updates or workarounds were not promptly applied following VMware’s release of updates for Log4Shell in December 2021, treat all affected VMware systems as compromised. ...
Titel
OFFIS DCMTK
Veröffentlicht
23. Juni 2022 16:25
Text
This advisory contains mitigations for a path traversal, relative path traversal, NULL pointer reference vulnerability in DCMTK, an OFFIS product.
Titel
Yokogawa STARDOM
Veröffentlicht
23. Juni 2022 16:20
Text
This advisory contains mitigations for Cleartext Transmission of Sensitive Information, and Use of Hard-coded Credentials vulnerabilities in the Yokogawa STARDOM network control system.
Titel
Yokogawa CAMS for HIS
Veröffentlicht
23. Juni 2022 16:15
Text
This advisory contains mitigations for a Violation of Secure Design Principles vulnerability in the Yokogawa Consolidation Alarm Management Software for Human Interface Station (CAMS for HIS).
Titel
Secheron SEPCOS Control and Protection Relay
Veröffentlicht
23. Juni 2022 16:10
Text
This advisory contains mitigations for Improper Enforcement of Behavioral Workflow, Lack of Administrator Control over Security, Improper Privilege Management, and Insufficiently Protected Credentials vulnerabilities in the Secheron SEPCOS Control and Protection Relay.
Titel
Pyramid Solutions EtherNet/IP Adapter Development Kit
Veröffentlicht
23. Juni 2022 16:05
Text
This advisory contains mitigations for an Out-of-bounds Write vulnerability in the Pyramid Solutions EtherNet/IP Adapter Development Kit.
Titel
Elcomplus SmartICS
Veröffentlicht
23. Juni 2022 16:00
Text
This advisory contains mitigations for Improper Access Control, Relative Path Traversal, and Cross-site Scripting vulnerabilities in the Elcomplus SmartICS web-based HMI.
Titel
Sicherheitsupdate: CODESYS Security Advisories 2022-11 bis 2022-13
Veröffentlicht
23. Juni 2022 14:17
Text
Please check source url for more information.
Mittwoch, 22.06.2022
Titel
Mitsubishi Electric MELSEC Q and L Series
Veröffentlicht
22. Juni 2022 04:25
Text
This advisory contains mitigations for an Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC Q and L Series CPUs.
Titel
Multiple Vulnerabilities PRA-ES8P2S Ethernet-Switch
Veröffentlicht
22. Juni 2022 02:00
Text

BOSCH-SA-247052-BT: Multiple vulnerabilities were found in the PRA-ES8P2S Ethernet-Switch including an Improper Input Validation, an Improper Privilege Management and an Execution with Unnecessary Privileges vulnerability.These vulnerabilities can give root access and/or administrator privilege to the switch from the network.Customers are advised to upgrade to version 1.01.07 that solves vulnerabilities CVE-2022-32534, ...

Dienstag, 21.06.2022
Titel
JTEKT TOYOPUC
Veröffentlicht
21. Juni 2022 16:20
Text
This advisory contains mitigations for a Missing Authentication for Critical Function vulnerability in the JTEKT TOYOPUC programmable logic controller.
Titel
Phoenix Contact Classic Line Controllers
Veröffentlicht
21. Juni 2022 16:15
Text
This advisory contains mitigations for an Insufficient Verification of Data Authenticity vulnerability in the Phoenix Contact classic line controllers.
Titel
Phoenix Contact ProConOS and MULTIPROG
Veröffentlicht
21. Juni 2022 16:10
Text
This advisory contains mitigations for an Insufficient Verification of Data Authenticity vulnerability in the Phoenix Contact ProConOS and MULTIPROG software development kit.
Titel
Phoenix Contact Classic Line Industrial Controllers
Veröffentlicht
21. Juni 2022 16:05
Text
This advisory contains mitigations for an Insufficient Verification of Data Authenticity vulnerability in the Phoenix Contact Classic Line Industrial Controllers.

Letzte Updates

BOSCH PSIRT
01.08.2022
CODESYS
27.07.2022
SIEMENS CERT
12.07.2022
US CERT
04.08.2022
US CERT (ICS)
04.08.2022

Nach Quelle

Archiv

2022
2021
2020
2019
2018
2017

Feeds