• 1 (current)
  • 2
Friday, 30.10.2020
Title
AA20-304A: Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data
Published
Oct. 30, 2020, 7:11 p.m.
Summary
Original release date: October 30, 2020 | Last revised: November 3, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 8 framework. See the ATT&CK for Enterprise version 8 for all referenced threat actor techniques. This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure ...
Thursday, 29.10.2020
Title
Mitsubishi Electric MELSEC iQ-R, Q and L Series
Published
Oct. 29, 2020, 3:15 p.m.
Summary
This advisory contains mitigations for an Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric's MELSEC iQ-R, Q and L Series programmable logic controllers.
Title
Mitsubishi Electric MELSEC iQ-R
Published
Oct. 29, 2020, 3:10 p.m.
Summary
This advisory contains mitigations for Improper Restriction of Operations within the Bounds of a Memory Buffer, Session Fixation, NULL Pointer Dereference, Improper Access Control, Argument Injection, and Resource Management Errors vulnerabilities in Mitsubishi Electric's iQ-R programmable logic controllers.
Title
Mitsubishi Electric MELSEC iQ-R Series (Update A)
Published
Oct. 29, 2020, 3:05 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSA-20-282-02 Mitsubishi Electric MELSEC iQ-R Series that was published October 8, 2020, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for an Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R Series modules.
Title
AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector
Published
Oct. 29, 2020, 12:07 a.m.
Summary
Original release date: October 28, 2020 | Last revised: November 2, 2020SummaryThis advisory was updated to include information on Conti, TrickBot, and BazarLoader, including new IOCs and Yara Rules for detection. This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for ...
Tuesday, 27.10.2020
Title
AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky
Published
Oct. 27, 2020, 6 p.m.
Summary
Original release date: October 27, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity advisory was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the ...
Thursday, 22.10.2020
Title
AA20-296B: Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems
Published
Oct. 22, 2020, 6 p.m.
Summary
Original release date: October 22, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are warning that Iranian advanced persistent threat (APT) actors are likely intent on influencing and interfering with the U.S. elections to sow discord among voters and undermine public confidence in the ...
Title
B. Braun OnlineSuite
Published
Oct. 22, 2020, 4:05 p.m.
Summary
This advisory contains mitigations for Relative Path Traversal, Uncontrolled Search Path Element, and Improper Neutralization of Formula Elements in a CSV File vulnerabilities in B. Braun's OnlineSuite.
Title
B. Braun SpaceCom, Battery Pack SP with Wi-Fi, and Data module compactplus
Published
Oct. 22, 2020, 4 p.m.
Summary
This advisory contains mitigations for Cross-site Scripting, Open Redirect, XPath Injection, Session Fixation, Use of a One-way Hash without a Salt, Relative Path Traversal, Improper Verification of Cryptographic Signature, Improper Privilege Management, Use of Hard-coded Credentials, Active Debug Code, and Improper Access Control vulnerabilities in B. Braun's SpaceCom, Battery Pack ...
Title
AA20-296A: Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets
Published
Oct. 22, 2020, 2:44 p.m.
Summary
Original release date: October 22, 2020SummaryThis joint cybersecurity advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor tactics and techniques This joint cybersecurity advisory—written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure ...
Tuesday, 20.10.2020
Title
Rockwell Automation 1794-AENT Flex I/O Series B
Published
Oct. 20, 2020, 4:15 p.m.
Summary
This advisory contains mitigations for several Classic Buffer Overflow vulnerabilities in Rockwell Automation's 1794-AENT Flex I/O Series B Ethernet/IP adapter.
Title
Hitachi ABB Power Grids XMC20 Multiservice-Multiplexer
Published
Oct. 20, 2020, 4:10 p.m.
Summary
This advisory contains mitigations for an Improper Authentication vulnerability in Hitachi ABB Power Grids' XMC20 Multiservice-Multiplexer telecommunication elements.
Title
Capsule Technologies SmartLinx Neuron 2 (Update A)
Published
Oct. 20, 2020, 4 p.m.
Summary
This updated advisory is a follow-up to the original advisory titled ICSMA-20-196-01 Capsule Technologies SmartLinx Neuron 2 that was published July 14, 2020, to the ICS webpage on us-cert.cisa.gov. This advisory contains mitigations for a Protection Mechanism Failure vulnerability in Capsule Technologies' SmartLinx Neuron 2, a bedside mobile clinical monitoring ...
Thursday, 15.10.2020
Title
Advantech R-SeeNet
Published
Oct. 15, 2020, 4:05 p.m.
Summary
This advisory contains mitigations for an SQL Injection vulnerability in Advantech;s R-SeeNet monitoring application software.
Title
Wibu-Systems CodeMeter (Update C)
Published
Oct. 15, 2020, 4 p.m.
Summary
This updated advisory is a follow-up to the advisory update titled ICSA-20-203-01 Wibu-Systems CodeMeter (Update B) that was published October 1, 2020, to the ICS webpage on us-cert.gov. This advisory contains mitigations for Buffer Access with Incorrect Length Value, Inadequate Encryption Strength, Origin Validation Error, Improper Input Validation, Improper Verification ...
Tuesday, 13.10.2020
Title
MOXA NPort IAW5000A-I/O Series
Published
Oct. 13, 2020, 4:45 p.m.
Summary
This advisory contains mitigations for Session Fixation, Improper Privilege Management, Weak Password Requirements, Cleartext Transmission of Sensitive Information, Improper Restriction of Excessive Authentication Attempts, and Exposure of Sensitive Information to an Unauthorized Actor vulnerabilities in the MOXA NPort IAW5000A-I/O Series integrated serial device server.
Title
SSA-462066 (Last Update: 2020-10-13): Vulnerability known as TCP SACK PANIC in Industrial Products
Published
Oct. 13, 2020, 2 a.m.
Summary
Multiple industrial products are affected by a vulnerability in the kernel known as TCP SACK PANIC. The vulnerability could allow a remote attacker to cause a denial of service condition. Siemens has released updates for several affected products and recommends to update to the new versions. Siemens is preparing further ...
Title
SSA-534763 (Last Update: 2020-10-13): Special Register Buffer Data Sampling (SRBDS) aka Crosstalk in Industrial Products
Published
Oct. 13, 2020, 2 a.m.
Summary
Security researchers published information on a vulnerability known as Crosstalk (INTEL-SA-00320). This vulnerability affects modern Intel processors to a varying degree. Several Siemens Industrial Products contain processors that are affected by the vulnerability. Siemens is preparing updates and recommends specific countermeasures until fixes are available.
Title
SSA-689071 (Last Update: 2020-10-13): DNSMasq Vulnerabilities in SCALANCE W1750D, SCALANCE M-800 / S615 and RUGGEDCOM RM1224
Published
Oct. 13, 2020, 2 a.m.
Summary
Multiple vulnerabilities have been identified in SCALANCE W1750D, SCALANCE M-800 / S615 and RUGGEDCOM RM1224 devices. The highest scored vulnerability could allow a remote attacker to crash the DNS service or execute arbitrary code. The attacker must be able to craft malicious DNS responses and inject them into the network ...
Title
Remote Desktop Services Remote Code Execution Vulnerability in Rexroth Industrial PCs
Published
Oct. 13, 2020, 2 a.m.
Summary

BOSCH-SA-856281: Microsoft has published information [1] for several versions of Microsoft Windows XP Microsoft Windows XP embedded Microsoft Windows 7 and Microsoft Windows 7 Embedded Standard regarding a vulnerability in the Remote Desktop Service. The vulnerability could allow an unauthenticated remote attacker to execute arbitrary code on the target system ...

Title
SSA-455843 (Last Update: 2020-10-13): WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens and Siemens Energy Products
Published
Oct. 13, 2020, 2 a.m.
Summary
CISA and WIBU Systems disclosed six vulnerabilities in different versions of CodeMeter Runtime, a product provided by WIBU Systems and used in several Siemens and Siemens Energy products for license management. The vulnerabilities are described in the section “Vulnerability Classification” below and got assigned the CVE IDs CVE-2020-14509, CVE-2020-14513, CVE-2020-14515, ...
Title
SSA-226339 (Last Update: 2020-10-13): Multiple Web Application Vulnerabilities in Desigo Insight
Published
Oct. 13, 2020, 2 a.m.
Summary
The latest hotfix for Desigo Insight fixes three vulnerabilities that have been identified in the web server, including SQL injection (CVE-2020-15792), clickjacking (CVE-2020-15793), and full path disclosure (CVE-2020-15794). Siemens recommends updating to the latest version of Desigo Insight and to apply the hotfix.
Title
SSA-384879 (Last Update: 2020-10-13): Authentication Bypass Vulnerability in SIPORT MP
Published
Oct. 13, 2020, 2 a.m.
Summary
SIPORT MP version 3.2.1 fixes an authentication bypass vulnerability which could enable an attacker to impersonate other users of the system and perform administrative actions. Siemens recommends to apply the update.
Title
SSA-381684 (Last Update: 2020-10-13): Improper Password Protection during Authentication in SIMATIC S7-300 and S7-400 CPUs and Derived Products
Published
Oct. 13, 2020, 2 a.m.
Summary
A vulnerability has been identified in SIMATIC S7-300 and S7-400 CPU families and derived products, which could result in credential disclosure. Siemens recommends countermeasures as there are currently no fixes available.
Title
SSA-398519 (Last Update: 2020-10-13): Vulnerabilities in Intel CPUs (November 2019)
Published
Oct. 13, 2020, 2 a.m.
Summary
Intel has published information on vulnerabilities in Intel products in November 2019. In this advisory Siemens only explicitly mentions the vulnerabilities from the “Intel® CPU Security Advisory” and one vulnerability from “Intel® CSME, Intel® SPS, Intel® TXE, Intel® AMT, Intel® PTT and Intel® DAL Advisory” and lists the Siemens IPC ...
  • 1 (current)
  • 2

Last Updates

BOSCH PSIRT
20.03.2024
CODESYS
28.06.2023
SIEMENS CERT
19.04.2024
US CERT
17.04.2024
US CERT (ICS)
25.04.2024

By Source

Archive

2024
2023
2022
2021
2020
2019
2018
2017

Feeds