Stay connected

Trending News

ICS

Delta Electronics DIAScreen 

1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity  Vendor: Delta Electronics  Equipment: DIAScreen  Vulnerabilities: Stack-based Buffer Overflow, Improper Restriction of Operations within the Bounds of a Memory Buffer, Out-of-bounds Write  2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow remote code execution.  3. TECHNICAL DETAILS 3.1…

ICS, Market, News

Delta Electronics CNCSoft ScreenEditor 

1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity  Vendor: Delta Electronics  Equipment: CNCSoft   Vulnerability: Stack-based Buffer Overflow  2. RISK EVALUATION Successful exploitation of this vulnerability could cause a buffer overflow condition, which could allow remote code execution.  3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions…

ICS, Market, News, Recommendations

Hitachi Energy MicroSCADA Pro/X SYS600 Products 

1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Low attack complexity   Vendor: Hitachi Energy  Equipment: MicroSCADA X SYS600, MicroSCADA Pro  Vulnerability: Improper Input Validation  2. RISK EVALUATION Successful exploitation of this vulnerability could allow an unauthorized user to execute administrator level scripts.  3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The…

Critical vulnerabiliities, Cyber Security, Industrial IoT (IIoT), Market, News, Reports, Security Patches...

Fortinet Releases Security Updates for FortiOS 

Fortinet has released security updates to address a heap-based buffer overflow vulnerability (CVE-2022-42475) in FortiOS. An attacker could exploit this vulnerability to take control of an affected system. FortiOS – heap-based buffer overflow in sslvpnd Summary A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN may…

Market, News, Recommendations

Horner Automation Remote Compact Controller 

1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity  Vendor: Horner Automation Equipment: Remote Compact Controller (RCC) 972  Vulnerabilities: Inadequate Encryption Strength, Use of Hard-coded Cryptographic Key, Excessive Reliance on Global Variables  2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to obtain credentials…