Bulletins

SIEMENS CERT
10/08/2024
Several Siemens products (optionally) offer the use of WibuKey Dongles [1] for licensing. According to a recent publication by WIBU Systems (WIBU-94453 at [2]), the Windows device driver for these Dongles contains vulnerabilities as listed below. [1] https://www.wibu.com/products/wibukey.html [2] https://www.wibu.com/support/security-advisories.html WIBU Systems has released a new version for WibuKey for …
SIEMENS CERT
10/08/2024
Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version V3.1 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant). These GNU/Linux vulnerabilities have been externally identified. Siemens is preparing fix versions and recommends specific countermeasures for products where fixes are not, or not …
SIEMENS CERT
10/08/2024
Questa and ModelSim (incl. OEM Editions) are affected by multiple vulnerabilities that could allow a local attacker to inject arbitrary code and escalate privileges. Siemens has released new versions for the affected products and recommends to update to the latest versions.
SIEMENS CERT
10/08/2024
SINEC Security Monitor before V4.9.0 contains multiple vulnerabilities. Siemens has released a new version for Siemens SINEC Security Monitor and recommends to update to the latest version.
SIEMENS CERT
10/08/2024
Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities. Siemens has released a new version of Palo Alto Networks Virtual NGFW for RUGGEDCOM APE1808 and recommends to update to the latest version. Customers are advised to …
SIEMENS CERT
10/08/2024
Siemens Tecnomatix Plant Simulation contains multiple file parsing vulnerabilities that could be triggered when the application reads files in WRL format. If a user is tricked to open a malicious file with any of the affected products, this could lead the application to crash or potentially lead to arbitrary code …
SIEMENS CERT
10/08/2024
Multiple vulnerabilities (also known as “NUCLEUS:13”) have be identified in the Nucleus RTOS (real-time operating system) and reported in the Siemens Security Advisory SSA-044112: https://cert-portal.siemens.com/productcert/html/ssa-044112.html. Capital Embedded AR Classic uses an affected version of the Nucleus software and inherently contains several of these vulnerabilities. Siemens has released a new version …
SIEMENS CERT
10/08/2024
HiMed Cockpit devices before V11.6.2 contain a Kiosk Mode Escape vulnerability that could allow an attacker to escape the restricted environment and gain access to the underlying operating system. Siemens has released a new version for the HiMed Cockpit devices and recommends to update to the latest version.