January 2021
Title
SSA-312271 V1.5 (Last Update: 2021-01-12): Unquoted Search Path Vulnerabilities in Windows-based Industrial Software Applications
Published
Jan. 12, 2021, 1 a.m.
Summary
The latest update for affected products fix local privilege escalation vulnerabilities that could allow authorized local users with administrative privileges to execute custom code with SYSTEM level privileges. Siemens has released updates for some of the affected products, and is working on further updates. For the remaining affected products, Siemens ...
Title
SSA-455843 V1.3 (Last Update: 2021-01-12): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens and Siemens Energy Products
Published
Jan. 12, 2021, 1 a.m.
Summary
CISA and WIBU Systems disclosed six vulnerabilities in different versions of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens and Siemens Energy products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2020-14509, CVE-2020-14513, CVE-2020-14515, ...
Title
SSA-629512 V1.2 (Last Update: 2021-01-12): Local Privilege Escalation Vulnerability in TIA Portal
Published
Jan. 12, 2021, 1 a.m.
Summary
The latest updates for TIA Portal fix a vulnerability that could allow a local attacker to execute arbitrary code with SYSTEM privileges. Siemens has released updates for the affected products and recommends to update to the latest version(s).
Title
SSA-473245 V1.9 (Last Update: 2021-01-12): Denial-of-Service Vulnerability in Profinet Devices
Published
Jan. 12, 2021, 1 a.m.
Summary
A vulnerability in affected devices could allow an attacker to perform a denial-of-service attack if a large amount of specially crafted UDP packets are sent to the device. Siemens has released updates for several affected products, and recommends that customers update to the new version. Siemens is preparing further updates ...
Title
SSA-139628 V1.0: Vulnerabilities in Web Server for Scalance X Products
Published
Jan. 12, 2021, 1 a.m.
Summary
Several SCALANCE X switches contain vulnerabilities in the web server of the affected devices. An unauthenticated attacker could reboot, cause denial-of-service conditions and potentially impact the system by other means through heap and buffer overflow vulnerabilities. Siemens has released updates for several affected products and recommends to update to the ...
Title
SSA-274900 V1.0: Use of hardcoded key in Scalance X devices under certain conditions
Published
Jan. 12, 2021, 1 a.m.
Summary
Scalance X devices might not generate a unique random key after factory reset, and use a private key shipped with the firmware Siemens has released updates for some devices, is working on updates for the remaining affected products and recommends specific countermeasures until fixes are available.
Title
SSA-622830 V1.0: Multiple Vulnerabilities in JT2Go and Teamcenter Visualization
Published
Jan. 12, 2021, 1 a.m.
Summary
JT2Go and Teamcenter Visualization are affected by multiple vulnerabilities that could lead to arbitrary code execution or data extraction on the target host system. Siemens has released updates for both affected products and recommends to update to the latest versions. Siemens is also preparing further updates and recommends specific countermeasures ...
Title
SSA-979834 V1.0: Multiple vulnerabilities in Solid Edge
Published
Jan. 12, 2021, 1 a.m.
Summary
Solid Edge is affected by multiple vulnerabilities that could allow arbitrary code execution on an affected system. Siemens has released an update for Solid Edge and recommends to update to the latest version.
Title
SSA-102233 V1.4 (Last Update: 2021-01-12): SegmentSmack in VxWorks-based Industrial Devices
Published
Jan. 12, 2021, 1 a.m.
Summary
The products listed below contain a vulnerability that could allow remote attackers to affect the availability of the devices under certain conditions. The underlying TCP stack can be forced to make very computation expensive calls for every incoming packet which can lead to a Denial-of-Service. Siemens is working on software ...
Title
AA21-008A: Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments
Published
Jan. 8, 2021, 5:36 p.m.
Summary
Original release date: January 8, 2021SummaryThis Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This Alert is a companion alert to AA20-352A: Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private ...
December 2020
Title
ctrlX Products affected by OpenSSL Vulnerability CVE-2020-1971
Published
Dec. 18, 2020, 1 a.m.
Summary

BOSCH-SA-274557: The OpenSSL Software Foundation has published information [1] for OpenSSL versions prior to 1.1.1i (1.1.1 – 1.1.1h) and 1.0.2x (1.0.2 – 1.0.2w) regarding a weakness in the `GENERAL_NAME_cmp` function. The vulnerability could allow an attacker to provoke a null pointer dereference, potentially leading to a denial of service. Multiple ...

Title
AA20-352A: Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations
Published
Dec. 17, 2020, 4 p.m.
Summary
Original release date: December 17, 2020 | Last revised: January 7, 2021SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises of U.S. government agencies, critical infrastructure entities, and private sector organizations by an advanced persistent threat (APT) actor beginning in at least March 2020. This APT actor has ...
Title
Multiple Vulnerabilities in 3S CODESYS Runtime in Rexroth PRC7000
Published
Dec. 16, 2020, 1 a.m.
Summary

BOSCH-SA-387388: The PRC7000 welding timer sold by Bosch Rexroth AG contains a CODESYS Soft-PLC Runtime from 3S. The manufacturer published security reports [1] about several weaknesses. By exploiting those weaknesses, an attacker can cause denial-of-service conditions or acquire user credentials. The vulnerabilities affect all firmware versions up to 1.11.3, and ...

Title
Denial of Service in PLC Runtime affecting Rexroth IndraMotion Products
Published
Dec. 16, 2020, 1 a.m.
Summary

BOSCH-SA-152060: The control systems IndraMotion MTX, MLC and MLD sold by Bosch Rexroth contain technology from CODESYS GmbH. The manufacturer published security bulletins [1], [2] about weaknesses in the communication interface of the PLC runtime. By exploiting these vulnerabilities, the control device can be put into a state in which ...

Title
AA20-345A: Cyber Actors Target K-12 Distance Learning Education to Cause Disruptions and Steal Data
Published
Dec. 10, 2020, 6 p.m.
Summary
Original release date: December 10, 2020SummaryThis Joint Cybersecurity Advisory was coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC). The FBI, CISA, and MS-ISAC assess malicious cyber actors are targeting kindergarten through twelfth grade (K-12) ...
Title
SSA-415783 V1.0: Insecure SSL configuration in SICAM A8000 CP-8000, CP-8021 and CP-8022
Published
Dec. 8, 2020, 1 a.m.
Summary
Some firmware versions of the affected products use outdated and insecure ciphers or can be downgraded to use outdated and insecure ciphers.
Title
SSA-841348 V1.4 (Last Update: 2020-12-08): Multiple Vulnerabilities in the UMC Stack
Published
Dec. 8, 2020, 1 a.m.
Summary
The latest update for the below listed products fixes two security vulnerabilities that could allow an attacker to cause a partial Denial-of-Service on the UMC component of the affected devices under certain circumstances, and one vulnerability that could allow an attacker to locally escalate privileges from a user with administrative ...
Title
SSA-817401 V1.1 (Last Update: 2020-12-08): Missing Authentication Vulnerability in SIEMENS LOGO!
Published
Dec. 8, 2020, 1 a.m.
Summary
A missing authentication vulnerability has been identified in SIEMENS LOGO!8 BM devices. The vulnerability could lead to an attacker reading and modifying the device configuration and obtain project files from the devices if the attacker has access to port 135/tcp.
Title
SSA-780073 V1.6 (Last Update: 2020-12-08): Denial-of-Service Vulnerability in PROFINET Devices via DCE-RPC Packets
Published
Dec. 8, 2020, 1 a.m.
Summary
Products that include the Siemens PROFINET-IO (PNIO) stack in versions prior V06.00 are potentially affected by a denial-of-service vulnerability when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing ...
Title
SSA-712518 V1.1 (Last Update: 2020-12-08): Information Disclosure Vulnerability (Kr00k) in Industrial Wi-Fi Products
Published
Dec. 8, 2020, 1 a.m.
Summary
An information disclosure vulnerability (CVE-2019-15126, also known as Kr00k) could allow an attacker to read a discrete set of traffic over the air after a Wi-Fi device state change. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Title
SSA-689942 V1.2 (Last Update: 2020-12-08): Denial-of-Service and DLL Hijacking Vulnerabilities in Multiple SIMATIC Software Products
Published
Dec. 8, 2020, 1 a.m.
Summary
Multiple SIMATIC Software products are affected by two vulnerabilities that could allow an attacker to manipulate project files that may lead to Remote Code Execution or Denial-of-Service attacks. Siemens has released updates to some of the affected products and recommends that customers update to the latest version. Siemens is preparing ...
Title
SSA-616472 V1.7 (Last Update: 2020-12-08): ZombieLoad and Microarchitectural Data Sampling Vulnerabilities in Industrial Products
Published
Dec. 8, 2020, 1 a.m.
Summary
Security researchers published information on vulnerabilities known as ZombieLoad and Microarchitectural Data Sampling (MDS). These vulnerabilities affect many modern processors from different vendors to a varying degree. Several Siemens Industrial Products contain processors that are affected by the vulnerabilities.
Title
SSA-542701 V1.2 (Last Update: 2020-12-08): Vulnerabilities in SIEMENS LOGO!
Published
Dec. 8, 2020, 1 a.m.
Summary
Multiple vulnerabilities have been identified in SIEMENS LOGO!8 BM devices. The most severe vulnerability could lead to an attacker reading and modifying the device configuration if the attacker has access to port 10005/tcp. Siemens has released an update for the LOGO! 8 BM (incl. SIPLUS variants) and recommends that customers ...
Title
SSA-542525 V1.2 (Last Update: 2020-12-08): Authentication Vulnerabilities in SIMATIC HMI Products
Published
Dec. 8, 2020, 1 a.m.
Summary
SIMATIC HMI Products are affected by two vulnerabilities that could allow a remote attacker to discover user passwords and obtain access to the Sm@rt Server via a brute-force attack. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Title
SSA-534763 V1.2 (Last Update: 2020-12-08): Special Register Buffer Data Sampling (SRBDS) aka Crosstalk in Industrial Products
Published
Dec. 8, 2020, 1 a.m.
Summary
Security researchers published information on a vulnerability known as Crosstalk (INTEL-SA-00320). This vulnerability affects modern Intel processors to a varying degree. Several Siemens Industrial Products contain processors that are affected by the vulnerability. Siemens is preparing updates and recommends specific countermeasures until fixes are available.

Last Updates

BOSCH PSIRT
20.03.2024
CODESYS
28.06.2023
SIEMENS CERT
19.04.2024
US CERT
17.04.2024
US CERT (ICS)
25.04.2024

By Source

Archive

2024
2023
2022
2021
2020
2019
2018
2017

Feeds