Stay connected

Trending News

ICS, News, Reports, Vulnerabilities

Dingtian DT-R002 

1. EXECUTIVE SUMMARY 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to bypass authentication. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Dingtian DT-R002, a relay board, are affected: 3.2 Vulnerability Overview 3.2.1 AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294 relay_cgi.cgi on…

Hitachi Energy’s RTU500 Series Product
ICS, News, Reports

Hitachi Energy’s RTU500 Series Product 

1. EXECUTIVE SUMMARY 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to crash the device being accessed or cause a denial-of-service condition. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Hitachi Energy’s RTU500 Series Product, are affected: 3.2 Vulnerability…

ICS, News, Reports

Mitsubishi Electric FA Engineering Software 

2. RISK ASSESSMENTExploiting this vulnerability successfully could enable a local attacker to execute code, potentially leading to information exposure, unauthorized data alterations, or triggering a denial-of-service (DoS) scenario. 3. TECHNICAL SPECIFICATIONS 3.1 IMPACTED PRODUCTSThe subsequent versions of Mitsubishi Electric’s FA Engineering Software Solutions are affected:…

Critical vulnerabiliities, Cyber Security, Industrial IoT (IIoT), Market, News, Reports, Security Patches...

Fortinet Releases Security Updates for FortiOS 

Fortinet has released security updates to address a heap-based buffer overflow vulnerability (CVE-2022-42475) in FortiOS. An attacker could exploit this vulnerability to take control of an affected system. FortiOS – heap-based buffer overflow in sslvpnd Summary A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN may…

Market, News, Reports, Uncategorized

Siemens Siveillance Video Mobile Server 

1. EXECUTIVE SUMMARY CVSS v3 9.4 ATTENTION: Exploitable remotely/low attack complexity  Vendor: Siemens Equipment: Siveillance Video 2022 R2 Vulnerability: Weak Authentication 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to access the application without a valid account.  3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS…

IoT Security, News, Reports

Allot Telco Security Trends Report Reveals CSP Security Services Prove Highly Effective in Protecting Consumers from Mobile and IoT Threats – 

Findings show almost two billion security threats blocked during four-month period across seven million subscribers HOD HASHARON, Israel- Allot Communications Ltd. (NASDAQ: ALLT) (TASE: ALLT), a global provider of leading innovative network intelligence and security solutions for service providers worldwide, released findings from its Telco Security Trends…