Stay connected

Trending News

Critical vulnerabiliities, ICS, Industrial IoT (IIoT), Market, News, Recommendations

Siemens SIMATIC Industrial Products 

1. EXECUTIVE SUMMARY CVSS v3 7.9 ATTENTION: Low attack complexity  Vendor: Siemens  Equipment: SIMATIC industrial products  Vulnerability: Time-of-check Time-of-use (TOCTOU) Race Condition  2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a privileged user to potentially enable escalation of privilege via local access.  3. TECHNICAL DETAILS 3.1 AFFECTED…

ICS, Industrial IoT (IIoT), IoT Security

Mitsubishi Electric MELSOFT iQ AppPortal 

1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity  Vendor: Mitsubishi Electric  Equipment: MELSOFT iQ AppPortal  Vulnerabilities: HTTP Request Smuggling, Insufficient Verification of Data Authenticity  2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a malicious attacker to make unidentified impacts such as authentication bypass, information…

Critical vulnerabiliities, Cyber Security, ICS, News

Siemens SCALANCE X200 IRT 

1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity  Vendor: Siemens  Equipment: SCALANCE X200 IRT Products  Vulnerability: Improper Input Validation  2. RISK EVALUATION Successful exploitation of this vulnerability could allow remote attackers to cause a denial-of-service condition.  3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Siemens products…

ICS, Industrial IoT (IIoT), IoT Security, News

Johnson Controls System Configuration Tool (SCT) 

1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely  Vendor: Johnson Controls  Equipment:  System Configuration Tool  Vulnerabilities: Sensitive Cookie Without ‘HttpOnly’ Flag, Sensitive Cookie in HTTPS Session Without ‘Secure’ Attribute  2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to access cookies and take over the…

ICS

Delta Electronics DIAScreen 

1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity  Vendor: Delta Electronics  Equipment: DIAScreen  Vulnerabilities: Stack-based Buffer Overflow, Improper Restriction of Operations within the Bounds of a Memory Buffer, Out-of-bounds Write  2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow remote code execution.  3. TECHNICAL DETAILS 3.1…

ICS, Market, News

Delta Electronics CNCSoft ScreenEditor 

1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity  Vendor: Delta Electronics  Equipment: CNCSoft   Vulnerability: Stack-based Buffer Overflow  2. RISK EVALUATION Successful exploitation of this vulnerability could cause a buffer overflow condition, which could allow remote code execution.  3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions…

ICS, Market, News, Recommendations

Hitachi Energy MicroSCADA Pro/X SYS600 Products 

1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Low attack complexity   Vendor: Hitachi Energy  Equipment: MicroSCADA X SYS600, MicroSCADA Pro  Vulnerability: Improper Input Validation  2. RISK EVALUATION Successful exploitation of this vulnerability could allow an unauthorized user to execute administrator level scripts.  3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The…

Critical vulnerabiliities, ICS, Market, News, Recommendations

Mitsubishi Electric GT SoftGOT2000 

1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Corporation Equipment: GT SoftGOT2000 Vulnerability: Operating System (OS) Command Injection 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to execute malicious OS commands. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Mitsubishi Electric…

ICS, Market, News, Recommendations, Remediation, Uncategorized

Nokia ASIK AirScale System Module 

1. EXECUTIVE SUMMARY CVSS v3 8.4 ATTENTION: Low attack complexity  Vendor: Nokia  Equipment: ASIK AirScale 5G Common System Module Vulnerabilities: Improper Access Control for Volatile Memory Containing Boot Code, Assumed-Immutable Data is Stored in Writable Memory 2. RISK EVALUATION Successful exploitation of these vulnerabilities could result in the execution…