• 1
  • 2 (current)
Thursday, 10.11.2022
Title
Siemens Teamcenter Visualization and JT2Go
Published
Nov. 10, 2022, 4:55 p.m.
Summary
Tuesday, 08.11.2022
Title
SSA-362164 V1.2 (Last Update: 2022-11-08): Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS
Published
Nov. 8, 2022, 1 a.m.
Summary
The networking component (Nucleus NET) in Nucleus Real-Time Operating System (RTOS) use Initial Sequence Numbers for TCP-Sessions that are predictable. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens recommends specific countermeasures for products where updates are not available.
Title
SSA-371761 V1.0: Arbitrary Code Execution Vulnerability in the Logback Component of SINEC NMS before V1.0.3
Published
Nov. 8, 2022, 1 a.m.
Summary
SINEC NMS versions before V1.0.3 are affected by a vulnerability in the logback component (CVE-2021-42550) that could allow attackers with write access to the logback configuration file to execute arbitrary code on the system. Siemens has released an update for SINEC NMS and recommends to update to the latest version.
Title
SSA-120378 V1.0: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go
Published
Nov. 8, 2022, 1 a.m.
Summary
Siemens Teamcenter Visualization and JT2Go are affected by multiple file parsing vulnerabilities that could be triggered when the application reads malicious TIF, CGM or PDF files. If a user is tricked to open a malicious TIF, CGM or PDF file with the affected products, this could lead the application to ...
Title
SSA-638652 V1.1 (Last Update: 2022-11-08): Authentication Bypass Vulnerability in Mendix SAML Module
Published
Nov. 8, 2022, 1 a.m.
Summary
The Mendix SAML module insufficiently protects from packet capture replay. This could allow unauthorized remote attackers to bypass authentication and get access to the application. Mendix has provided fix releases for the Mendix SAML module and recommends to update to the latest version. Note: For compatibility reasons, fix versions are ...
Title
SSA-764417 V1.5 (Last Update: 2022-11-08): Weak Encryption Vulnerability in RUGGEDCOM ROS Devices
Published
Nov. 8, 2022, 1 a.m.
Summary
The SSH server on RUGGEDCOM ROS devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device. Siemens is preparing updates and recommends specific countermeasures ...
Title
SSA-787941 V1.0: Denial of Service Vulnerability in RUGGEDCOM ROS V4
Published
Nov. 8, 2022, 1 a.m.
Summary
RUGGEDCOM ROS-based V4 devices are vulnerable to a denial of service attack (Slowloris). By sending partial HTTP requests nonstop, with none completed, the affected web servers will be waiting for the completion of each request, occupying all available HTTP connections. The web server recovers by itself once the attack ends. ...
Title
SSA-853037 V1.0: File Parsing Vulnerabilities in Parasolid
Published
Nov. 8, 2022, 1 a.m.
Summary
Parasolid is affected by out of bounds read/write vulnerabilities that could be triggered when the application reads files in X_T format. If a user is tricked to open a malicious file with the affected applications, an attacker could leverage the vulnerability to perform remote code execution in the context of ...
Title
SSA-400332 V1.1 (Last Update: 2022-11-08): Insufficient Design IP Protection in IEEE 1735 Recommended Practice - Impact to Questa and ModelSim
Published
Nov. 8, 2022, 1 a.m.
Summary
A security research [1] identified weaknesses in the IEEE 1735 recommended practice for encryption of Design IP, which could allow a sophisticated attacker access to unencrypted Design IP data in IEEE 1735-compliant products. This advisory addresses the specific details for the affected Siemens software products: Questa and ModelSim simulators. Siemens ...
Title
SSA-459643 V1.1 (Last Update: 2022-11-08): Denial of Service Vulnerability in RUGGEDCOM ROS before V5.6.0
Published
Nov. 8, 2022, 1 a.m.
Summary
RUGGEDCOM ROS-based devices are vulnerable to a denial of service attack (Slowloris). By sending partial HTTP requests nonstop, with none completed, the affected web servers will be waiting for the completion of each request, occupying all available HTTP connections. The web server recovers by itself once the attack ends. Siemens ...
Title
SSA-478960 V1.0: Missing CSRF Protection in the Web Server Login Page of Industrial Controllers
Published
Nov. 8, 2022, 1 a.m.
Summary
The web server login page of affected products does not apply proper origin checking. This could allow authenticated remote attackers to track the activities of other users via a login cross-site request forgery attack.. Siemens has released updates for several affected products and recommends to update to the latest versions. ...
Title
SSA-501891 V1.1 (Last Update: 2022-11-08): Cross-Site Scripting Vulnerability in SCALANCE X-200 and X-200IRT Families
Published
Nov. 8, 2022, 1 a.m.
Summary
There is a cross-site scripting vulnerability that affects the SCALANCE switches. This vulnerability if used by a threat actor could result in the stealing of session cookies and session hijacking. Siemens has released updates for the affected products and recommends to update to the latest versions.
Title
SSA-506569 V1.0: Multiple Vulnerabilities in SCALANCE W1750D
Published
Nov. 8, 2022, 1 a.m.
Summary
The SCALANCE W1750D device contains multiple vulnerabilities that could allow an attacker to inject commands or exploit buffer overflow vulnerabilities which could lead to denial of service, unauthenticated remote code execution or stored XSS. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not ...
Title
SSA-552702 V1.1 (Last Update: 2022-11-08): Privilege Escalation Vulnerability in the Web Interface of SCALANCE and RUGGEDCOM Products
Published
Nov. 8, 2022, 1 a.m.
Summary
The products listed below do not properly authorize the change password function of the web interface. This could allow low privileged users to escalate their privileges. Siemens has released updates for several affected products and recommends to update to the latest versions. Siemens is preparing further updates and recommends specific ...
Title
SSA-568428 V1.0: Weak Key Protection Vulnerability in SINUMERIK ONE and SINUMERIK MC
Published
Nov. 8, 2022, 1 a.m.
Summary
SINUMERIK ONE and SINUMERIK MC products are affected by a weak key protection vulnerability in the integrated S7-1500 CPU. The weak key protection vulnerability in the integrated S7-1500 CPU is documented in more detail in SSA-568427 [1]. Siemens is preparing updates and recommends specific countermeasures for products where updates are ...
Title
SSA-570294 V1.0: Multiple Vulnerabilities in SICAM Q100 Before V2.50
Published
Nov. 8, 2022, 1 a.m.
Summary
SICAM Q100 devices contain multiple vulnerabilities that could allow an attacker to take over the session of a logged in user or to inject custom code. Siemens has released updates for the affected products and recommends to update to the latest versions.
Title
SSA-587547 V1.0: Unencrypted Storage of User Credentials in QMS Automotive
Published
Nov. 8, 2022, 1 a.m.
Summary
QMS Automotive contains a vulnerability that stores user credentials in plantext within the user database. This could allow an attacker to read credentials from memory. Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available.
Title
SSA-620288 V1.1 (Last Update: 2022-11-08): Multiple Vulnerabilities (NUCLEUS:13) in CAPITAL VSTAR
Published
Nov. 8, 2022, 1 a.m.
Summary
Multiple vulnerabilities (also known as “NUCLEUS:13”) have be identified in the Nucleus RTOS (real-time operating system) and reported in the Siemens Security Advisory SSA-044112: https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf. CAPITAL VSTAR uses an affected version of the Nucleus software and inherently contains several of these vulnerabilities. Siemens recommends specific countermeasures for products where updates ...
Thursday, 03.11.2022
Title
ETIC Telecom Remote Access Server (RAS)
Published
Nov. 3, 2022, 3:10 p.m.
Summary
Title
Nokia ASIK AirScale System Module
Published
Nov. 3, 2022, 3:05 p.m.
Summary
Title
Sicherheitsupdate: CODESYS Security Advisories 2022-02, 2022-04 bis 2022-07 und 2022-09
Published
Nov. 3, 2022, 10:53 a.m.
Summary
Please check source url for more information.
Tuesday, 01.11.2022
Title
Mitsubishi Electric Multiple Factory Automation Products (Update C)
Published
Nov. 1, 2022, 3 p.m.
Summary
This updated advisory is a follow-up to the advisory update titled ICSA-22-221-01 Mitsubishi Electric Multiple Factory Automation Products (Update B) that was published August 18, 2022, to the ICS webpage on cisa.gov/ics. This advisory contains mitigations for an Mitsubishi Electric GOT2000 compatible HMI software, CC-Link IE TSN Industrial Managed Switch, ...
  • 1
  • 2 (current)

Last Updates

BOSCH PSIRT
20.03.2024
CODESYS
28.06.2023
SIEMENS CERT
19.04.2024
US CERT
17.04.2024
US CERT (ICS)
25.04.2024

By Source

Archive

2024
2023
2022
2021
2020
2019
2018
2017

Feeds