July 2020
Title
Secomea GateManager
Published
July 28, 2020, 4:15 p.m.
Summary
This advisory contains mitigations for Improper Neutralization of Null Byte or NUL Character, Off-by-one Error, Use of Hard-coded Credentials, Use of Password Hash with Insufficient Computational Effort vulnerabilities in Secomea GateManager, a VPN server.
Title
Softing Industrial Automation OPC
Published
July 28, 2020, 4:10 p.m.
Summary
This advisory contains mitigations for a Heap-based Buffer Overflow, and Uncontrolled Resource Consumption vulnerabilities in Softing Industrial Automation's OPC products.
Title
HMS Industrial Networks eCatcher
Published
July 28, 2020, 4:05 p.m.
Summary
This advisory contains mitigations for a Stack-based Buffer Overflow vulnerability in HMS Industrial Networks eCatcher VPN client.
Title
Delta Industrial Automation DOPSoft (Update A)
Published
July 28, 2020, 4 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-20-182-01 Delta Industrial Automation DOPSoft that was published June 30, 2020, on the ICS webpage on us-cert.gov. This advisory contains mitigations for out-of-bounds read and heap-based buffer overflow vulnerabilities in Delta Industrial Automation DOPSoft products.
Title
AA20-209A: Potential Legacy Risk from Malware Targeting QNAP NAS Devices
Published
July 27, 2020, 2:20 p.m.
Summary
Original release date: July 27, 2020SummaryThis is a joint alert from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). CISA and NCSC are investigating a strain of malware known as QSnatch, which attackers used in late 2019 to target Network ...
Title
AA20-206A: Threat Actor Exploitation of F5 BIG-IP CVE-2020-5902
Published
July 24, 2020, 12:59 p.m.
Summary
Original release date: July 24, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) is issuing this alert in response to recently disclosed exploits that target F5 BIG-IP devices that are vulnerable to CVE-2020-5902. F5 Networks, Inc. (F5) released a patch for CVE-2020-5902 on June 30, 2020.[1] Unpatched F5 BIG-IP devices are ...
Title
AA20-205A: NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems
Published
July 23, 2020, 4:29 p.m.
Summary
Original release date: July 23, 2020SummaryNote: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise and ATT&CK for Industrial Control Systems frameworks for all referenced threat actor techniques and mitigations. Over recent months, cyber actors have demonstrated their continued willingness ...
Title
Schneider Electric Triconex TriStation and Tricon Communication Module
Published
July 23, 2020, 4 p.m.
Summary
This advisory contains mitigations for Cleartext Transmission of Sensitive Information, Uncontrolled Resource Consumption, Hidden Functionality, and Improper Access Control vulnerabilities in Schneider Electric's Triconex TriStation and Tricon Communication Module products.
Title
Sicherheitsupdate: CODESYS Security Advisories 2020-02 und 2020-05
Published
July 22, 2020, 9:15 a.m.
Summary
Please check source url for more information.
Title
Treck TCP/IP Stack (Update E)
Published
July 21, 2020, 4 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-20-168-01 Treck TCP/IP Stack (Update D) that was published July 14, 2020, to the ICS webpage on us-cert.gov. This advisory contains mitigations for Improper Handling of Length Parameter Inconsistency, Improper Input Validation, Double Free, Out-of-bounds Read, Integer Overflow or ...
Title
AA20-198A: Malicious Cyber Actor Use of Network Tunneling and Spoofing to Obfuscate Geolocation
Published
July 16, 2020, 2:09 p.m.
Summary
Original release date: July 16, 2020SummaryThis Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) and Pre-ATT&CK frameworks. See the MITRE ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques. Attributing malicious cyber activity that uses network tunneling and spoofing techniques to a specific threat ...
Title
Capsule Technologies SmartLinx Neuron 2
Published
July 14, 2020, 5:40 p.m.
Summary
This advisory contains mitigations for a Protection Mechanism Failure vulnerability in Capsule Technologies' SmartLinx Neuron 2, a bedside mobile clinical monitoring system.
Title
Advantech iView
Published
July 14, 2020, 5:35 p.m.
Summary
This advisory contains mitigations for SQL Injection, Path Traversal, Command Injection, Improper Input Validation, Missing Authentication for Critical Function, Improper Access Control vulnerabilities in Advantech's iView device management application.
Title
Moxa EDR-G902 and EDR-G903 Series Routers
Published
July 14, 2020, 5:30 p.m.
Summary
This advisory contains mitigations for a Stack-based Buffer Overflow vulnerability in Moxa's a EDR-G902 and EDR-G903 Series Routers.
Title
Siemens SICAM MMU, SICAM T, and SICAM SGU
Published
July 14, 2020, 5:25 p.m.
Summary
This advisory contains mitigations for Out-of-bounds Read, Missing Authentication for Critical Function, Missing Encryption of Sensitive Data, Use of Password Hash with Insufficient Computational Effort, Cross-site Scripting, Classic Buffer Overflow, Basic XSS, Authentication Bypass by Capture-replay vulnerabilities in Siemens' SICAM MMU, SICAM T, and SICAM SGU products.
Title
Siemens SIMATIC HMI Panels
Published
July 14, 2020, 5:20 p.m.
Summary
This advisory contains mitigations for a Cleartext Transmission of Sensitive Information vulnerability in Siemens SIMATIC HMI panels.
Title
Siemens UMC Stack
Published
July 14, 2020, 5:15 p.m.
Summary
This advisory contains mitigations for Unquoted Search Path or Element, Uncontrolled Resource Consumption, Improper Input Validation vulnerabilities in Siemens UMC components.
Title
Siemens SIMATIC S7-200 SMART CPU Family
Published
July 14, 2020, 5:10 p.m.
Summary
This advisory contains mitigations for an Uncontrolled Resource Consumption vulnerability in Siemens SIMATIC S7-200 SMART CPU Family of products.
Title
Siemens Opcenter Execution Core
Published
July 14, 2020, 5:05 p.m.
Summary
This advisory contains mitigations for Cross-site Scripting, SQL Injection, and Improper Access Control vulnerabilities in Siemens Opcenter Execution Core software.
Title
SSA-631949 (Last Update: 2020-07-14): Ripple20 and Intel SPS Vulnerabilities in SPPA-T3000 Solutions
Published
July 14, 2020, 2 a.m.
Summary
SPPA-T3000 solutions are affected by vulnerabilities that were recently dislosed by JSOF research lab (“Ripple20”) for the TCP/IP stack used in APC UPS systems, and by Intel for the Server Platform Services (SPS) used in SPPA-T3000 Application Server and Terminal Server hardware. The advisory provides information to what amount SPAA-T3000 ...
Title
SSA-270778 (Last Update: 2020-07-14): Denial-of-Service Vulnerability in SIMATIC PCS 7, SIMATIC WinCC and SIMATIC NET PC Software
Published
July 14, 2020, 2 a.m.
Summary
A Denial-of-Service vulnerability was found in SIMATIC PCS 7, SIMATIC WinCC and SIMATIC NET PC software when encrypted communication is enabled. The vulnerability could allow an attacker with network access to cause a Denial-of-Service condition under certain circumstances (versions prior to SIMATIC WinCC V7.3 or SIMATIC PCS 7 V8.1 are ...
Title
SSA-398519 (Last Update: 2020-07-14): Vulnerabilities in Intel CPUs (November 2019)
Published
July 14, 2020, 2 a.m.
Summary
Intel has published information on vulnerabilities in Intel products in November 2019. In this advisory Siemens only explicitly mentions the vulnerabilities from the “Intel® CPU Security Advisory” and one vulnerability from “Intel® CSME, Intel® SPS, Intel® TXE, Intel® AMT, Intel® PTT and Intel® DAL Advisory” and lists the Siemens IPC ...
Title
SSA-364335 (Last Update: 2020-07-14): Clear Text Transmission Vulnerability on SIMATIC HMI Panels
Published
July 14, 2020, 2 a.m.
Summary
A clear text transmission vulnerability in SIMATIC HMI panels could allow an attacker to access sensitive information under certain circumstances. Siemens recommends specific countermeasures to mitigate this vulnerability.
Title
SSA-346262 (Last Update: 2020-07-14): Denial-of-Service in Industrial Products
Published
July 14, 2020, 2 a.m.
Summary
Several industrial products are affected by a vulnerability that could allow remote attackers to conduct a Denial-of-Service (DoS) attack by sending specially crafted packets to port 161/udp (SNMP). Siemens has released updates for several affected products, and recommends that customers update to the new version. Siemens is preparing further updates ...
Title
SSA-312271 (Last Update: 2020-07-14): Unquoted Search Path Vulnerabilities in Windows-based Industrial Software Applications
Published
July 14, 2020, 2 a.m.
Summary
The latest update for affected products fix local privilege escalation vulnerabilities that could allow authorized local users with administrative privileges to execute custom code with SYSTEM level privileges. Siemens has released updates for some of the affected products, and is working on further updates. For the remaining affected products, Siemens ...

Last Updates

BOSCH PSIRT
20.03.2024
CODESYS
28.06.2023
SIEMENS CERT
19.04.2024
US CERT
17.04.2024
US CERT (ICS)
18.04.2024

By Source

Archive

2024
2023
2022
2021
2020
2019
2018
2017

Feeds