January 2020
Title
Medtronic 2090 Carelink Programmer Vulnerabilities (Update C)
Published
Jan. 30, 2020, 4 p.m.
Summary
This updated advisory is a follow-up to the updated advisory titled ICSMA-18-058-01 Medtronic 2090 Carelink Programmer Vulnerabilities (Update B) that was published October 11, 2018, ICS webpage on us-cert.gov. This medical device advisory contains mitigation details for vulnerabilities in Medtronic’s 2090 CareLink Programmer and its accompanying software deployment network.
Title
Missing Authentication for Critical Function in Bosch Video Streaming Gateway
Published
Jan. 29, 2020, 1 a.m.
Summary

BOSCH-SA-260625-BT: A recently discovered security vulnerability affects the Bosch Video Streaming Gateway (VSG). The vulnerability is exploitable via the network interface. An unauthorized attacker can retrieve and set arbitrary configuration data of the VSG. Bosch rates this vulnerability with a CVSS v3.1 Base Score of 10.0 (Critical) and strongly recommends ...

Title
Path Traversal in Bosch Video Management System NoTouch deployment
Published
Jan. 29, 2020, 1 a.m.
Summary

BOSCH-SA-815013-BT: A path traversal vulnerability exists in the BVMS NoTouch deployment. If this vulnerability is exploited an unauthenticated attacker without local shell access to a BVMS Central Server system is able to fetch arbitrary data from the file system of the Central Server computer. Under specific circumstances an attack can ...

Title
Deserialization of Untrusted Data in Bosch BVMS Mobile Video Service
Published
Jan. 29, 2020, 1 a.m.
Summary

BOSCH-SA-885551-BT: A recently discovered security vulnerability affects the BVMS Mobile Video Service (BVMS MVS). The vulnerability is exploitable via the network interface. Bosch rates this vulnerability with a CVSS v3.1 Base Score of 10.0 (Critical) and recommends customers to update the vulnerable components with fixed software versions. The vulnerability was ...

Title
Path Traversal in Bosch Video Management System
Published
Jan. 29, 2020, 1 a.m.
Summary

BOSCH-SA-381489-BT: A path traversal vulnerability exists in the BVMS. An authenticated BVMS user can successfully request and fetch arbitrary files from the Central Server machine using the FileTransferService. Bosch rates this vulnerability with a CVSS v3.1 Base Score of 7.7 (High) and strongly recommends customers to update vulnerable components with ...

Title
Sicherheitsupdate: CODESYS Security Advisory 2020-01
Published
Jan. 23, 2020, 5:08 p.m.
Summary
Please check source url for more information.
Title
GE CARESCAPE, ApexPro, and Clinical Information Center systems
Published
Jan. 23, 2020, 5 p.m.
Summary
This advisory contains mitigations for multiple vulnerabilities in the GE CARESCAPE ApexPro and Clinical Information Center (CIC) healthcare monitoring platforms.
Title
Honeywell Maxpro VMS & NVR
Published
Jan. 21, 2020, 4 p.m.
Summary
This advisory contains mitigations for deserialization of untrusted data and SQL injection vulnerabilities in Honeywell's MAXPRO VMS & NVR video management systems.
Title
GE PACSystems RX3i
Published
Jan. 14, 2020, 11:25 p.m.
Summary
This advisory contains mitigations for an improper input validation vulnerability in GE's PACSystems RX3i controllers.
Title
Siemens SINEMA Server
Published
Jan. 14, 2020, 11:20 p.m.
Summary
This advisory contains mitigations for an incorrect privilege assignment vulnerability in Siemens' SINEMA server network management software.
Title
Siemens SINAMICS PERFECT HARMONY GH180
Published
Jan. 14, 2020, 11:10 p.m.
Summary
This advisory contains mitigations for a protection mechanism failure vulnerability in Siemens' Sinamics Perfect Harmony GH180 voltage converter.
Title
Siemens TIA Portal
Published
Jan. 14, 2020, 11:05 p.m.
Summary
This advisory contains mitigations for a path traversal vulnerability in the Siemens TIA Portal engineering framework.
Title
Siemens EN100 Ethernet Module (Update A)
Published
Jan. 14, 2020, 2:45 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-19-344-07 Siemens EN100 Ethernet Module that was published December 10, 2019, to the ICS webpage on us-cert.gov. This advisory contains mitigations for improper restriction of operations within the bounds of a memory buffer, cross-site scripting, and relative path traversal ...
Title
Siemens Industrial Real-Time (IRT) Devices (Update A)
Published
Jan. 14, 2020, 2:40 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-19-283-01 Siemens Industrial Real-Time (IRT) Devices that was published October 10, 2019, on the ICS webpage on us-cert.gov. This advisory includes mitigations for an improper input validation vulnerability reported in the Siemens Industrial Real-Time (IRT) devices.
Title
Siemens PROFINET Devices (Update B)
Published
Jan. 14, 2020, 2:35 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-19-283-02 Siemens PROFINET Devices (Update A) that was published November 14, 2019, on the ICS webpage on us-cert.gov. This updated advisory contains mitigations for an uncontrolled resource consumption vulnerability in Siemens PROFINET devices.
Title
Siemens SIMATIC WinAC RTX (F) 2010 (Update A)
Published
Jan. 14, 2020, 2:30 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-19-281-03 Siemens SIMATIC WinAC RTX (F) 2010 that was published October 8, 2019, on the ICS webpage on us-cert.gov. This advisory includes mitigations for an uncontrolled resource consumption vulnerability reported in the Siemens SIMATIC WinAC RTX (F) 2010 software ...
Title
SSA-616199 (Last Update: 2020-01-14): BlueKeep Vulnerability Identified in RAPIDPoint® 500 Operating on Windows XP
Published
Jan. 14, 2020, 1 a.m.
Summary
Microsoft has released updates for several versions of Microsoft Windows, which fix a vulnerability in the Remote Desktop Service. The vulnerability could allow an unauthenticated remote attacker to execute arbitrary code on the target system if the system exposes the service to the network. RAPIDPoint® 500 systems operating on Windows ...
Title
SSB-382508 (Last Update: 2020-01-14): ActiveX used in Industrial Products
Published
Jan. 14, 2020, 1 a.m.
Summary
Title
SSA-418979 (Last Update: 2020-01-14): Vulnerabilities in EN100 Ethernet Communication Module
Published
Jan. 14, 2020, 1 a.m.
Summary
The EN100 Ethernet communication modules are affected by security vulnerabilities which could allow an attacker to disclose information. Siemens has released updates for several affected products, is working on updates for the remaining affected products, and recommends specific countermeasures until fixes are available.
Title
SSA-629512 (Last Update: 2020-01-14): Local Privilege Escalation Vulnerability in TIA Portal
Published
Jan. 14, 2020, 1 a.m.
Summary
The latest update for TIA Portal fixes a vulnerability that could allow a local attacker to execute arbitrary code with SYSTEM privileges. Siemens has released an update for TIA Portal V15, is working on updates for other versions of TIA Portal and recommends specific mitigations for vulnerable versions.
Title
SSA-443566 (Last Update: 2020-01-14): Authentication Bypass in SCALANCE X Switches Families
Published
Jan. 14, 2020, 1 a.m.
Summary
Several SCALANCE X switches are affected by an Authentication Bypass vulnerability. The vulnerability allows an unauthenticated attacker to violate access-control rules. The vulnerability can be exploited by sending a GET request to a specific uniform resource locator on the web configuration interface of the device. The security vulnerability could be ...
Title
SSA-880233 (Last Update: 2020-01-14): Incorrect Session Validation Vulnerability in SINEMA Server
Published
Jan. 14, 2020, 1 a.m.
Summary
The latest update for SINEMA Server fixes a vulnerability that could allow authenticated users with a low-privileged account to perform firmware updates (as well as other administrative operations) on connected devices. Therefore, Siemens recommends to update the affected products.
Title
SSA-473245 (Last Update: 2020-01-14): Denial-of-Service Vulnerability in Profinet Devices
Published
Jan. 14, 2020, 1 a.m.
Summary
A vulnerability in affected devices could allow an attacker to perform a denial-of-service attack if a large amount of specially crafted UDP packets are sent to the device. Siemens has released updates for several affected products, and recommends that customers update to the new version. Siemens is preparing further updates ...
Title
SSA-480829 (Last Update: 2020-01-14): Cross-Site-Scripting Vulnerabilities in SCALANCE X Switches
Published
Jan. 14, 2020, 1 a.m.
Summary
Two cross-site-scripting (XSS) vulnerabilities were found in the web server of several SCALANCE X switches. Siemens recommends updating the firmware to the newest version as soon as possible.
Title
SSA-557804 (Last Update: 2020-01-14): Mirror Port Isolation Vulnerability in SCALANCE X Switches
Published
Jan. 14, 2020, 1 a.m.
Summary
A vulnerability was identified in several SCALANCE X switches that could allow an attacker to feed information into a network via the mirror port with the monitor barrier feature enabled. The monitor barrier implementation in several SCALANCE X switches does allow traffic to be directed back into the mirroring network. ...

Last Updates

BOSCH PSIRT
20.03.2024
CODESYS
28.06.2023
SIEMENS CERT
19.04.2024
US CERT
17.04.2024
US CERT (ICS)
30.04.2024

By Source

Archive

2024
2023
2022
2021
2020
2019
2018
2017

Feeds