Multiple vulnerabilities have been discovered in imagemagick. Successful exploitation of these
vulnerabilities could allow a remote attacker to cause denial of service or any other unspecified
impact via crafted image data.
Multiple vulnerabilities have been discovered in the Tomcat servlet and JSP engine,
which could result in session fixation attacks, information disclosure, cross-site scripting,
denial of service via resource exhaustion and insecure redirects.
Stack-based Buffer Overflow Remote Code Execution vulnerability has been discovered in D-Link DCS-960L.
This vulnerability allows malicious user to affect the device from the LAN-Side (in home) that would cause the device to malfunction.
Multiple vulnerabilities have been discovered in TightVNC.
An attacker could exploit these vulnerabilities to trigger
denial of service, access confidential data, and execute arbitrary code on the targeted system.
VMware Workstation and Horizon View Agent contain a DLL hijacking vulnerability due to insecure
loading of a DLL by Cortado Thinprint. Successful exploitation of this issue may allow attackers
with normal user privileges to escalate their privileges to administrator on a Windows machine
where Workstation or View Agent is installed.
Inadequate Encryption Strength vulnerability has been discovered in
Philips' Equipments- Veradius Unity, Pulsera, and Endura Dual WAN Router.
Successful exploitation of this vulnerability could compromise the management
interface of the front end router impacting the availability of data transfer via wireless communication.
Uncontrolled Resource Consumption vulnerability has been discovered
in Moxa's Equipments- EDS-G508E, EDS-G512E, and EDS-G516E Series Ethernet Switches.
Successful exploitation of this vulnerability could cause the target device to go out of service.
SQL Injection vulnerability has been discovered in Equinox's Equipment- Control Expert.
Successful exploitation of this vulnerability may allow remote code execution.
Stack-based Buffer Overflow vulnerability has been discovered in WECON's Equipment- PLC Editor.
Successful exploitation could allow an attacker to execute code under the privileges of the application.
Cross-site Scripting vulnerability has been discovered in Reliable Controls' Equipment- MACH-ProWebCom/Sys.
Successful exploitation of this vulnerability could allow an attacker to execute commands on behalf of the affected user.
Use of Obsolete Function vulnerability has been discovered in Omron's Equipment- CX-Supervisor.
Successful exploitation of this vulnerability could result in information disclosure,
total compromise of the system, and system unavailability.
Stack-based Buffer Overflow vulnerability has been discovered in AVEVA's and Schneider Electric's Equipments.
The IEC870IP driver for AVEVA’s Vijeo Citect and Citect SCADA and Schneider Electric’s Power SCADA Operation
has a buffer overflow vulnerability that could result in a server-side crash.
Multiple vulnerabilities were identified in Drupal that could allow a
local attacker to overwrite arbitrary files, gain unauthorised access, and reduce security.
Also it could allow a remote attacker to trigger denial of service on the targeted system.
Google has released security updates for Chrome version 79.0.3945.88 for Windows, Mac, and Linux.
This version addresses a vulnerability that an attacker could exploit to take control of an affected system.
A vulnerability has been discovered in Joomla! CMS versions 2.5.0 - 3.9.13.
The lack of validation of configuration parameters used in SQL queries caused various SQL injection vectors.
An attacker could exploit this vulnerability to trigger unauthorised access and execute arbitrary code on the targeted system.
WordPress 5.3 and prior versions are affected by multiple vulnerabilities.
An attacker could exploit some of these vulnerabilities to take control of an affected website.
Inadequate Encryption Strength vulnerability has been discovered in Philips' Equipment- IntelliBridge EC40 and EC80.
Successful exploitation of this vulnerability may allow an attacker unauthorized access to the IntelliBridge EC40/80
hub and may allow access to execute software, modify system configuration, or view/update files, including
unidentifiable patient data.
Uncontrolled Resource Consumption vulnerability has been discovered in ABB, Phoenix Contact, Schneider Electric,
Siemens and WAGO's Equipment- Programmable Logic Controllers. High network load can consume CPU power in such a
way that the normal operation of the device can be affected; that is, the configured cycle time can be influenced.
Stack-based Buffer Overflow vulnerability has been discovered in Advantech's Equipment- DiagAnywhere Server.
Successful exploitation of this vulnerability may allow remote code execution.
Symantec Messaging Gateway has multiple vulnerabilities such as security-bypass,
privilege-escalation and cross-site scripting. Attackers could exploit
these vulnerabilities to bypass certain security restrictions and perform unauthorized
actions, gain elevated privileges and execute arbitrary script code in the browser
of an unsuspecting user in the context of the affected site.
Adobe has released security updates to address vulnerabilities in multiple Adobe
products- Adobe Acrobat and Reader, Photoshop CC, ColdFusion, and Brackets.
An attacker could exploit some of these vulnerabilities to take control of an affected system.
Google has released security updates for Chrome version 79.0.3945.79 for Windows, Mac, and Linux.
This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.
Microsoft has released updates to address multiple vulnerabilities in Microsoft software.
A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
Multiple vulnerabilities such as Stack-based Buffer Overflow, Heap-based Buffer Overflow,
Integer Underflow, Improper Restriction of Operations within the Bounds of a Memory Buffer,
Race Condition, Argument Injection, and Null Pointer Dereference have been discovered in different
Equipments- OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River.
Successful exploitation of these vulnerabilities could allow remote code execution.
Multiple vulnerabilities have been discovered in multiple products of Siemens.
A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
Apple has released security updates to address vulnerabilities in multiple products.
An attacker could exploit some of these vulnerabilities to take control of an affected system.
Samba has released security updates to address vulnerabilities in multiple versions.
An attacker could exploit some of these vulnerabilities to take control of an affected system.
Intel has released security updates to address vulnerabilities in multiple products.
An authenticated attacker with local access could exploit some of these vulnerabilities
to gain escalation of privileges.
Multiple vulnerabilities have been discovered in OpenJDK. Successful exploitation of these
vulnerabilities could allow an attacker to trigger denial of service, sandbox bypass,
information disclosure or the execution of arbitrary code.
Multiple vulnerabilities such as Improper Restriction of Excessive Authentication Attempts,
Uncontrolled Resource Consumption, Missing Encryption of Sensitive Data, Unprotected Storage
of Credentials, and Predictable from Observable State have been discovered in Weidmueller's
Equipment- Industrial Ethernet Switches. Successful exploitation of these vulnerabilities
could allow a remote attacker to gain unauthorized access to the device, affecting the
confidentiality, integrity, and availability of the device the attacker is targeting.
Link Following vulnerability has been discovered in Thales DIS' Equipment- SafeNet Sentinel LDK License Manager Runtime.
Successful exploitation of this vulnerability could allow a local attacker to escalate privileges.
VMware has released security updates to address a vulnerability in ESXi and Horizon DaaS.
An attacker could exploit this vulnerability to take control of an affected system.
Multiple vulnerabilities have been discovered in Squid. A remote attacker could
exploit these vulnerabilities to cause denial of service, provide misleading
information, unauthorized access and reduced security in the targeted system.
Execution of arbitrary code vulnerability has been discovered in HAProxy.
An attacker could exploit this vulnerability to take control of an affected system.
Multiple vulnerabilities have been discovered in PAN-OS. An improper authentication check
in Palo Alto Networks PAN-OS may allow an authenticated low privileged non-superuser
custom role user to elevate privileges and become superuser.
Several vulnerabilities were discovered in the Oniguruma regular expressions library, notably used in PHP mbstring.
Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact,
via a crafted regular expression.
Multiple vulnerabilities have been identified in Red Hat Kernel, a remote attacker could exploit some
of these vulnerabilities to trigger denial of service, remote code execution and sensitive information
disclosure in the targeted system.
Microsoft has released a security advisory to address an issue in Windows Hello for Business (WHfB).
An attacker could exploit this issue on devices that were affected by CVE-2017-15361, also known as
Return of Coppersmith’s Attack (ROCA), to take control of an affected system.
StrandHogg vulnerability allows real-life malware to pose as legitimate apps,
with users unaware they are being targeted. An attacker can ask for access to any permission,
including SMS, photos, microphone, and GPS, allowing them to read messages, view photos,
eavesdrop, and track the victim’s movements.
Multiple vulnerabilities have been identified in Asterisk, a remote attacker could exploit some
of these vulnerabilities to trigger denial of service on the targeted system.
Multiple vulnerabilities have been identified in Fortinet products, a remote attacker could exploit
some of these vulnerabilities to trigger denial of service on the targeted system.
Multiple vulnerabilities have been identified in the VNC code of Vino.
A remote attacker could exploit some of these vulnerabilities to trigger denial of service
and access privileged data on the targeted system.
Multiple vulnerabilities have been identified in the VNC code of SSVNC.
A remote attacker could exploit some of these vulnerabilities to trigger denial of service,
access privileged data and execute arbitrary code on the targeted system.
Multiple vulnerabilities have been identified in Red Hat JBoss Enterprise Application Platform,
a remote attacker could exploit some of these vulnerabilities to trigger denial of service
and elevation of privilege on the targeted system.
Remote Exploitation vulnerability was identified in TP-Link TL-WR841N, an attacker may be able to decrypt the
router’s configuration file and take control of the router only if the attacker is locally connected and
has administrator authority.
Improper Input Validation vulnerability has been discovered in ABB's Equipment- Relion 650 and 670 Series.
Successful exploitation of this vulnerability may allow an attacker to reboot the device, causing a denial of service.
Path Traversal vulnerability has been discovered in ABB's Equipment- Relion 670 Series.
Successful exploitation of this vulnerability may allow an attacker to read and delete files on the device.
It has been discovered that Redmine incorrectly handle certain inputs that could cause
textile formatting errors. An attacker could possibly use this issue to cause a XSS attack.
It has also been discovered that an SQL injection could allow users to access protected
information via a crafted object query.
A vulnerability has been identified in Apache Commons Beanutils that is used by WebSphere
Application Server, a remote attacker could exploit this vulnerability to trigger remote
code execution on the targeted system.
Multiple vulnerabilities have been identified in Kaspersky products, a remote attacker
could exploit some of these vulnerabilities to trigger denial of service,
security restriction bypass and information disclosure on the targeted system.
Multiple vulnerabilities such as Improper Input Validation, Memory Corruption have been discovered in
Flexera's Equipment- FlexNet Publisher. These vulnerabilities could allow an attacker to
deny the acquisition of a valid license for legal use of the product. The memory corruption
vulnerability could allow remote code execution.
Microsoft has released an update to address a vulnerability in Outlook for Android.
An attacker could exploit this vulnerability to take control of an affected system.
Vulnerability such as Authentication Bypass Using an Alternate Path or Channel has been discovered in
ABB's Equipment- Power Generation Information Manager (PGIM) and Plant Connect. Successful exploitation
of this vulnerability could allow a remote attacker to bypass authentication and extract credentials from the device.
Vulnerability such as Use of Obsolete Function has been discovered in Omron's Equipment- CX-Supervisor.
Successful exploitation of this vulnerability could result in information disclosure, total compromise of
the system, and system unavailability.
Vulnerability such as Inadequate Encryption Strength has been discovered in Philips' Equipment- IntelliBridge EC40 and EC80.
Successful exploitation of this vulnerability may allow an attacker unauthorized access to the IntelliBridge EC40/80 hub
and may allow access to execute software, modify system configuration, or view/update files, including unidentifiable patient data.
Microsoft has released updates to address multiple vulnerabilities in Microsoft software.
A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
Adobe has released security updates to address vulnerabilities in multiple Adobe products.
An attacker could exploit some of these vulnerabilities to take control of an affected system.
VMware has released security updates to address vulnerabilities in ESXi, Workstation, and Fusion.
An attacker could exploit some of these vulnerabilities to take control of an affected system.
Multiple vulnerabilities such as Integer Overflow or Wraparound, Uncontrolled Resource Consumption,
Exposed Dangerous Method or Function, and Improper Input Validation were discovered in Siemens' Equipments- Industrial Products,
SINAMICS, S7-1200 CPU, Mentor Nucleus Networking Module, and PROFINET Devices.
Successful exploitation of these vulnerabilities could cause denial-of-service condition,
expose additional diagnostic functionality to an attacker with physical access to the UART
interface during boot process, and could allow an attacker to affect the integrity and availability of the device.
Multiple vulnerabilities have been discovered in NVIDIA Windows GPU display driver and GeForce
Experience (GFE) software which could allow a local attacker to execute arbitrary code,
obtain sensitive information, obtain elevated privileges and cause denial of service on the targeted system.
Multiple vulnerabilities were identified in Cisco products, a remote attacker
could exploit some of these vulnerabilities to trigger denial of service condition,
elevation of privilege, remote code execution, cross-site scripting and bypass
security restriction on the targeted system.
Multiple vulnerabilities were identified in Red Hat Kernel, a remote attacker could exploit
some of these vulnerabilities to trigger denial of service condition, remote code execution,
disclose sensitive information on the targeted system.
Untrusted Search Path vulnerability has been discovered in Omron's Equipment- Network Configurator for DeviceNet.
Successful exploitation of this vulnerability could allow an attacker to achieve arbitrary code execution under
the privileges of the application.
Multiple vulnerabilities such as Stack-based Buffer Overflow, Heap-based Buffer Overflow,
Integer Underflow, Improper Restriction of Operations within the Bounds of a Memory Buffer,
Race Condition, Argument Injection, and Null Pointer Dereference have been discovered in
different Equipments- OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by
IP Infusion, and VxWorks by Wind River. Successful exploitation of these vulnerabilities
could allow remote code execution.
Use of Obsolete Function vulnerability has been discovered in Omron's Equipment- CX-Supervisor.
Successful exploitation of this vulnerability could result in information disclosure,
total compromise of the system, and system unavailability.
Multiple vulnerabilities were identified in Android, a remote attacker could exploit some of
these vulnerabilities to trigger elevation of privilege, sensitive information disclosure
and remote code execution on the targeted system.
The QSnatch malware is reportedly being used to target QNAP NAS devices.
A remote attacker could trigger remote code execution, tampering, sensitive
information disclosure and bypass security restriction on the targeted devices.
Google has released Chrome version 78.0.3904.87 for Windows, Mac, and Linux.
This version addresses vulnerabilities that an attacker could exploit to take
control of an affected system. One of these vulnerabilities (CVE-2019-13720)
was detected in exploits in the wild.
Multiple vulnerabilities such as Path Traversal, Missing Authorization, Improper Restriction of XML External
Entity Reference, and SQL Injection have been discovered in Advantech's Equipment- WISE-PaaS/RMM. Successful
exploitation of these vulnerabilities may allow information disclosure, remote code execution, and compromise
system availability.
USA's Multi-State Information Sharing and Analysis Center (MS-ISAC) has released an end-of-support (EOS)
software report list. Software that has reached its EOS date no longer receives security updates and
patches from the vendor and is susceptible to exploitation from security vulnerabilities.
Apple has released security updates to address vulnerabilities in multiple products.
An attacker could exploit some of these vulnerabilities to take control of an affected system.
Denial of service vulnerability has been discovered in IBM's Equipment- Liberty. Apache Commons Compress is
vulnerable to a denial of service, caused by an error in the internal file name encoding algorithm.
By persuading a victim to open specially crafted ZIP archive containing malicious input, a remote attacker could exploit this
vulnerability to cause the application to enter into an infinite loop.
Improper Input Validation vulnerability has been discovered in Phoenix Contact's Equipment- Automation Worx Software Suite.
Successful exploitation of this vulnerability could compromise the integrity, availability, or confidentiality of an
application programming workstation. Automated systems programmed using one of the affected products are not impacted.
Team Samba has released security updates to address vulnerabilities in multiple versions of Samba.
An attacker could exploit some of these vulnerabilities to obtain sensitive information.
USA's Multi-State Information Sharing & Analysis Center (MS-ISAC) has released an advisory on multiple PHP vulnerabilities.
An attacker could exploit some of these vulnerabilities to take control of an affected system.
Microsoft publicly released information revealing an uptick in cyberattacks globally
targeting anti-doping authorities and sporting organizations. The Microsoft Threat
Intelligence Center (MSTIC) routinely tracks malicious activity originating from
the Russian advanced persistent threat (APT) group 28, also known as Fancy Bear,
STRONTIUM, Swallowtail, Sofacy, Sednit, and Zebrocy. According to Microsoft,
APT28 is targeting sporting and anti-doping organizations using spearphishing,
password spraying, fake Microsoft internet domains, as well as open-source and
custom malware to exploit internet-connected devices.
The Australian Cyber Security Centre (ACSC) has released an advisory on an ongoing,
widespread Emotet malware campaign. Emotet is a Trojan commonly spread via malicious
email attachments that attempts to proliferate within a network by brute forcing user
credentials and writing to shared drives. ACSC provides indicators of compromise and
recommendations to help organizations defend against Emotet malware.
Exposure of Resource to Wrong Sphere vulnerability has been discovered in Philips' Equipment- IntelliSpace Perinatal.
Successful exploitation of this vulnerability may allow an attacker unauthorized access to system resources, including
access to execute software or to view/update files, directories, or system configuration. This could impact confidentiality
and integrity of the system and application.
Multiple vulnerabilities such as Missing Authentication for Critical Function, and Use of Hard-coded Credentials
have been discovered in Rittal's Equipment- Rittal Chiller SK 3232-Series. Successful exploitation of these
vulnerabilities could disrupt the primary operations of the affected component, shut down cooling to other equipment,
and allow changes to the temperature set point.
Missing Authentication for Critical Function vulnerability has been discovered in Honeywell's Equipment- IP-AK2.
Successful exploitation of this vulnerability could allow an attacker to download configuration files directly
through a URL without authentication, exposing configuration and authorized visitor information.
Multiple vulnerabilities such as Classic Buffer Overflow, Cross-site Request Forgery,
Cross-site Scripting, Improper Access Controls, Improper Restriction of Excessive
Authentication Attempts, Missing Encryption of Sensitive Data, Out-of-bounds Read,
Unprotected Storage of Credentials, Predictable from Observable State, and
Uncontrolled Resource Consumption have been discovered in Moxa's Equipment- IKS, and EDS.
Successful exploitation of these vulnerabilities could allow the reading of sensitive information,
remote code execution, arbitrary configuration changes, authentication bypass, sensitive data capture,
reboot of the device, device crash, or full compromise of the device.
Multiple D-Link routers are vulnerable to unauthenticated remote command execution.
D-Link no longer provides support to the affected end-of-life devices, and updates will not be made available.
Mozilla has released a security update to address vulnerabilities in Thunderbird.
An attacker could exploit some of these vulnerabilities to take control of an affected system.
Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR.
An attacker could exploit some of these vulnerabilities to take control of an affected system.
Google has released Chrome version 78.0.3904.70 for Windows, Mac, and Linux.
This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.
Multiple vulnerabilities such as Code Injection, Improper Restriction of Operations
within the Bounds of a Memory Buffer, and Uncontrolled Search Path Element have been
discovered in Schneider Electric's Equipment- Proclima. Successful exploitation of
these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.
The Federal Trade Commission (FTC) has released an article warning consumers of “stalking apps”,
a spyware that secretly monitors smartphones. These apps can share information like call history,
text messages, photos, GPS locations, and browser history without the user's knowledge. Although
this can be a useful tool, stalking apps can also be used maliciously.
The Federal Bureau of Investigation (FBI) has released an article to raise awareness on e-skimming
threats. E-skimming occurs when an attacker injects malicious code onto a website to capture credit
or debit card data or personally identifiable information (PII).
On January 14, 2020, Microsoft will be ending the extended support for their Windows Server 2008 R2
and Windows 7 operating systems. After this date, both these products will not receive any free
technical support, or software and security updates.
Multiple vulnerabilities were discovered and have been resolved in Pulse Connect Secure (PCS)
and Pulse Policy Secure (PPS). This includes an authentication by-pass vulnerability that can
allow an unauthenticated user to perform a remote arbitrary file access on the Pulse Connect Secure gateway.
VMware has released a security update to address a vulnerability affecting Harbor Container Registry for
Pivotal Cloud Foundry (PCF). An attacker could exploit this vulnerability to take control of an affected system.
Google has released Chrome version 77.0.3865.120 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.
Multiple vulnerabilities such as Execution with Unnecessary Privileges,
Exposure of Resource to Wrong Sphere and Use of Hard-coded Credentials
have been discovered in Philips' Equipment- Brilliance CT Scanners and
MX8000 Dual EXP. Successful exploitation of these vulnerabilities may
allow an attacker to attain elevated privileges and access unauthorized system resources.
Multiple vulnerabilities such as Stack-based Buffer Overflow, Heap-based Buffer Overflow, Integer Underflow,
Improper Restriction of Operations within the Bounds of a Memory Buffer, Race Condition, Argument Injection
and Null Pointer Dereference have been discovered in different Equipments- OSE by ENEA, INTEGRITY RTOS by
Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River. Successful exploitation of
these vulnerabilities could allow remote code execution.
Juniper Networks has released security updates addressing multiple vulnerabilities in various Juniper products. These vulnerabilities could be exploited by a remote attacker to take control of an affected system.
A critical security vulnerability has been discovered in the macOS terminal emulator iTerm2. All users of iTerm2 should update immediately to the latest version (3.3.6).
The Australian Cyber Security Centre (ACSC) has released a cybersecurity guide for small businesses. This guide provides checklists to help small businesses to protect themselves against common cyber attacks.
Cross-Site Request Forgery (CSRF) vulnerability has been discovered in SMA Solar Technology
AG's Equipment- Sunny WebBox. Successful exploitation of this vulnerability could allow an
attacker to generate a denial-of-service condition, modify passwords, enable services,
achieve man-in-the-middle, and modify input parameters associated with devices such as sensors.
A vulnerability Use of Hard-coded Cryptographic Key has been discovered in Siemens' Equipment- SIMATIC IT Unified Architecture Discrete Manufacturing (UADM). Successful exploitation of this vulnerability could allow an attacker to gain read and write access to the related TeamCenter station.
A vulnerability Uncontrolled Resource Consumption has been discovered in Siemens' Equipment- SIMATIC WinAC RTX (F) 2010. Successful exploitation of this vulnerability could allow an attacker to perform a denial-of-service attack that could compromise the availability of the service provided by the software.
Multiple vulnerabilties such as Improper Authorization, Use of Hard-coded Credentials has been discovered in GE's Equiopment- Mark VIe Controller. Successful exploitation of these vulnerabilities could allow an attacker to create read/write/execute commands within the Mark VIe control system.
The Federal Bureau of Investigation (FBI) has released an article to raise awareness of phishing and spearphishing. The article provides guidance on recognizing and avoiding these types of attacks.
Potential security vulnerabilities in system firmware for Intel NUC may allow escalation of privilege,
denial of service and/or information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities.
A potential security vulnerability in Intel Smart Connect Technology for Intel NUC may allow escalation of privilege.
Intel is not releasing updates to mitigate this potential vulnerability and is issuing a Product Discontinuation notice
for Intel Smart Connect Technology for Intel NUC.
Intel has released security updates to address vulnerability in Intel Active System Console for Intel Server
Boards and Systems that may allow an escalation of privilege. Intel is releasing software updates to mitigate
this potential vulnerability.
Microsoft has released updates to address multiple vulnerabilities in Microsoft software.
A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
Apple has released security updates to address vulnerabilities in iCloud for Windows 10.7.
Processing a maliciously crafted text file may lead to arbitrary code execution.
The National Security Agency has released an advisory on advanced
persistent threat (APT) actors that exploits multiple vulnerabilities
in VPN applications. A remote attacker could exploit these vulnerabilities
to take control of an affected system.
The Microsoft Threat Intelligence Center (MSTIC) has released a blog post describing an increase in malicious
cyber activity from the Iranian group known as Phosphorus, that exploits the account recovery features to take
control of targeted email accounts.
The Internet Crime Complaint Center (IC3) has observed an increase in ransomware attacks
across the world. They often infect organizations through email phishing or exploiting
vulnerabilities in software or Remote Desktop Protocol (RDP).
Multiple vulnerabilities such as Improper Input Validation, Improper Access have been discovered in Moxa's Equipment- EDR 810.
Successful exploitation of these vulnerabilities could allow remote code execution or access to sensitive information.
The UK National Cyber Security Centre (NCSC) has released an alert on advanced
persistent threat (APT) actors that exploits the vulnerabilities in the VPN applications.
Unquoted Search Path or Element vulnerability has been discovered in different equipments of Yokogawa- Exaopc, Exaplog, Exaquantum,
Exasmoc, Exarqe, GA10, and InsightSuiteAE. Successful exploitation of this vulnerability could allow a local attacker
to execute malicious files.
A vulnerability has been discovered in PHP, which could allow an attacker to execute arbitrary code.
An attacker could install programs; view, change, or delete data; or create new accounts with full user rights.
Failed exploitation could result in a denial-of-service condition.
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
A denial of service vulnerability exists when Microsoft Defender improperly handles files.
An attacker could exploit the vulnerability to prevent legitimate accounts from executing
legitimate system binaries.
A remote code execution vulnerability exists in the way that the scripting
engine handles objects in memory in Internet Explorer. The vulnerability
could corrupt memory in such a way that an attacker could run arbitrary
code in the context of the current user.
Multiple vulnerabilities such as Information Exposure, Improper Authorization
have been discovered in Tridium's Equipment- Niagara. Successful exploitation
of these vulnerabilities could allow a local user to escalate their privileges.
Multiple vulnerabilities such as Code Injection, Command Injection, Stack-based Buffer Overflow,
Improper Authorization have been discovered in Advantech's Equipment- WebAccess.
Successful exploitation of these vulnerabilities could allow an attacker to execute
arbitrary code, access files and perform actions at a privileged level, or delete files on the system.
Multiple vulnerabilities such as Improper Restriction of Excessive Authentication
Attempts, Information Exposure, Cross-Site Request Forgery, Use of Password Hash with
Insufficient Computational Effort have been discovered in Siemens' Equipment- SINEMA
Remote Connect Server. Successful exploitation of these vulnerabilities may allow an
attacker unauthorized access to the web interface, improper access to privileged user
and device information, and may allow successful CSRF attacks.
Information Exposure vulnerability has been discovered in Honeywell's Equipment- Performance
IP Cameras and Performance NVRs. Successful exploitation of this vulnerability could allow
an attacker to view device configuration information.
MITRE has released the 2019 Common Weakness Enumeration (CWE) Top 25 Most Dangerous
Software Errors list. The Top 25 is a compilation of the most frequent and critical
errors that can lead to serious vulnerabilities in software.
Improper Input Validation vulnerability has been discovered in 3S-Smart Software
Solutions GmbH's Equipment- CODESYS V3 products containing a CODESYS communication server.
Successful exploitation of this vulnerability could cause a denial-of-service condition.
NULL Pointer Reference vulnerability has been discovered in 3S-Smart Software
Solutions GmbH's Equipment- CODESYS Control V3 OPC UA Server. Successful
exploitation of this vulnerability could cause a denial-of-service condition.
Incorrect Permission Assignment for Critical Resource vulnerability
has been discovered in 3S-Smart Software Solutions GmbH's Equipment- CODESYS Control V3 online user management.
Successful exploitation of this vulnerability could allow unauthorized actors access to unintended functionality and/or information.
Cross-site Scripting vulnerability has been discovered in 3S-Smart Software
Solutions GmbH's Equipment- CODESYS V3 Library Manager. Successful exploitation
of this vulnerability may allow malicious content from manipulated libraries
to be displayed or executed.
Multiple vulnerabilities such as Path Traversal, Stack-based Buffer Overflow have been discovered
in 3S-Smart Software Solutions GmbH's Equipment- CODESYS V3 web server. Successful exploitation
of these vulnerabilities may allow an attacker to create a denial-of-service condition, to perform
remote code execution, or to access restricted files.
Multiple vulnerabilities such as Use of Hard-coded Password, Download of Code Without
Integrity Check have been discovered in Philips' Equipment- IntelliVue M3002A X2 MMS
Transport Monitor/Module and IntelliVue MP monitors (MP2/X2, MP5, MP20-MP90, MX600, MX700 and MX800).
Successful exploitation of these vulnerabilities may cause corruption of the IntelliVue WLAN firmware
and impact to the data flow over the WLAN Version A and WLAN Version B wireless modules. This would
lead to an inoperative condition alert at the device and Central Station.
Integer Overflow or Wraparound vulnerability has been discovered in OSIsoft LLC's Equipment- OSIsoft PI SQL Client.
Successful exploitation of this vulnerability could allow remote code execution or cause a denial of service,
resulting in disclosure, deletion, or modification of information.
Improper Input Validation vulnerability has been discovered in Siemens' Equipment- SIMATIC TDC CP51M1.
Successful exploitation of this vulnerability could create a denial-of-service condition within UDP communication.
Cross-site Scripting vulnerability has been discovered in Siemens' Equipment- IE/WSN-PA Link WirelessHART Gateway.
Successful exploitation of this vulnerability could allow information disclosure, code execution, or denial-of-service.
Multiple vulnerabilities such as Integer Overflow or Wraparound, Uncontrolled Resource Consumption
have been discovered in Siemens' Equipment- Industrial Products. Successful exploitation of these
vulnerabilities could cause denial-of-service condition.
Improper Authorization vulnerability has been discovered in Siemens' Equipment- Siemens Network Planner (SINETPLAN).
Successful exploitation of this vulnerability could allow information disclosure, code execution, and denial-of-service.
Multiple vulnerabilities such as Stack-based Buffer Overflow, Heap-based Buffer Overflow,
Out-of-bounds Write have been discovered in Delta Electronics' Equipment- TPEditor.
Successful exploitation of these vulnerabilities may allow information disclosure,
remote code execution, or may crash the application.
A potential security vulnerability in the Intel® Easy Streaming Wizard may allow
escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability.
A potential security vulnerability in some microprocessors with Intel® Data
Direct I/O Technology (Intel® DDIO) and Remote Direct Memory Access (RDMA)
may allow partial information disclosure via adjacent access.
Adobe has released security updates for Adobe Flash Player for Windows, macOS, Linux and Chrome OS.
These updates address critical vulnerabilities in Adobe Flash Player. Successful exploitation
could lead to arbitrary code execution in the context of the current user.
Adobe has released a security update for the Adobe Application Manager installer for Windows. This update resolves an insecure library loading vulnerability in the installer that could lead to Arbitrary Code Execution.
Session Fixation vulnerability has been discovered in BD's Equipment- Pyxis.
Successful exploitation of this vulnerability could allow the Active Directory (AD)
credentials of a previously authenticated user to gain access to the device.
Multiple vulnerabilities such as Use After Free, Improper Restriction of Operations within the Bounds of a
Memory Buffer, Pointer Issues, Use of Hard-coded Cryptographic Key have been discovered in Red Lion Controls'
Equipment- Crimson (Windows configuration software). Successful exploitation of these vulnerabilities could
allow an attacker to execute code, crash the device, or view protected data.
Supermicro has released security updates to address vulnerabilities affecting the Baseboard
Management Controller (BMC) component of Supermicro X9, X10, and X11 platforms.
The malware - Joker silently simulates the interaction with advertisement websites, steals the victim’s SMS messages, the contact list and device info.
Stack-based Buffer Overflow vulnerability has been discovered in EZAutomation's Equipment- EZ Touch Editor.
Successful exploitation of this vulnerability could allow an attacker to execute code under the privileges
of the application.
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability has been
discovered in EZAutomation's Equipment- EZ PLC Editor. Successful exploitation of this vulnerability
could allow an attacker to execute code under the privileges of the application.
Incorrect Default Permissions vulnerability has been discovered in Change Healthcare's
Equipment- Change Healthcare Cardiology, Horizon Cardiology, McKesson Cardiology. Successful
exploitation of this vulnerability could allow a locally authenticated user to insert specially
crafted files that could result in arbitrary code execution.
Use of Obsolete Function vulnerability has been discovered in Philips' Equipment- HDI 4000 Ultrasound Systems.
Successful exploitation of this vulnerability could lead to exposure of ultrasound images (breaches of
confidentiality) and compromised image integrity.
Buffer Overflow vulnerability has been discovered in Delta Controls'
Equipment- enteliBUS Controllers. Successful exploitation of this
vulnerability could allow an attacker on the same network to gain
complete control of the device’s operating system and allow remote code execution.
Authentication Bypass Using an Alternate Path or Channel vulnerability has been
discovered in Datalogic's Equipment- AV7000 Linear Barcode Scanner. Successful
exploitation of this vulnerability could allow a remote attacker to bypass
authentication through issues in the HTTP authentication process.
Cisco has released security updates to address vulnerabilities in Cisco
Integrated Management Controller (IMC) Supervisor, Unified Computing System (UCS) Director,
and UCS Director Express for Big Data.
Insufficiently Protected Credentials vulnerability has been discovered in Zebra's Equipment- Industrial Printers.
Successful exploitation of this vulnerability could allow a remote attacker to send specially crafted packets to a
port on the printer, resulting in the retrieval of a front control panel passcode.
Multiple vulnerabilities such as Reusing a Nonce, Key Pair in Encryption; Use of Hard-coded Cryptographic
Key have been discovered in Johnson Controls' Equipment- Metasys. Successful exploitation of these vulnerabilities
could be leveraged by an attacker to decrypt captured network traffic.
Stack-based Buffer Overflow vulnerability has been discovered in Fuji Electric's Equipment- Alpha5 Smart Loader.
Successful exploitation of this vulnerability could allow an attacker to execute code under the privileges of the application.
Improper Adherence to Coding Standards vulnerability has been discovered in Siemens' Equipment- SCALANCE Products.
Successful exploitation of these vulnerabilities could lead to a denial of service or could allow an authenticated
local user with physical access to the device to execute arbitrary commands on the device.
Uncontrolled Resource Consumption vulnerability has been discovered in Siemens' Equipment- SINAMICS.
Successful exploitation of this vulnerability may allow an attacker to perform a denial-of-service attack.
Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182.
Multiple vulnerabilities such as Out-of-bounds read, Use after free have been discovered in
Delta Electronics' Equipment- Delta Industrial Automation DOPSoft. Successful exploitation of
these vulnerabilities may allow information disclosure, remote code execution, or crash of the application.
Multiple vulnerabilities such as Inclusion of Sensitive Information in Log Files, Protection Mechanism Failure
have been discovered in OSIsoft LLC's Equipment- OSIsoft PI Web API. Successful exploitation of these vulnerabilities
may allow direct attacks against the product and disclose sensitive information.
Uncontrolled Resource Consumption vulnerability has been discovered in Siemens' Equipment- SCALANCE X switches.
Successful exploitation of this vulnerability could cause a denial-of-service condition.
Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could
allow an attacker to execute arbitrary code on an affected system.
A vulnerability in the Virtual Network Computing (VNC) console implementation of Cisco Enterprise NFV Infrastructure Software (NFVIS)
could allow an unauthenticated, remote attacker to access the VNC console session of an administrative user on an affected device.
A vulnerability in the implementation of Intermediate System–to–Intermediate System (IS–IS) routing protocol functionality in Cisco IOS XR Software
could allow an unauthenticated attacker who is in the same IS-IS area to cause a denial of service (DoS) condition.
A vulnerability in the web-based management interface of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated,
remote attacker to elevate privileges and execute administrative functions on an affected device.
Multiple vulnerabilities in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an unauthenticated,
remote attacker to overflow a buffer, which then allows the execution of arbitrary code with root privileges on the underlying operating system.
A vulnerability in the web management interface of Cisco Small Business 220 Series Smart Switches could allow an unauthenticated, remote attacker to upload arbitrary files.
An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory.
An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries.
Red Hat has been made aware of an additional spectre-V1 like attack vector, requiring updates to the Linux kernel.
This additional attack vector builds on existing software fixes shipped in previous kernel updates. This vulnerability
only applies to x86-64 systems using either Intel or AMD processors.
The Cylance AI-based antivirus product contains flaws that allow an adversary to craft malicious files that the AV product will likely mistake for benign files.
Multiple vulnerabilities such as Out-of-bounds Read, Type Confusion have been discovered in LCDS' Equipment- LAquis SCADA. Successful exploitation of these vulnerabilities could allow an attacker to obtain confidential information or execute remote code.
Multiple vulnerabilities such as Use After Free, Information Exposure have been discovered in Rockwell Automation's Equipment- Arena Simulation Software. Successful exploitation of these vulnerabilities could allow an attacker to cause a current Arena session to fault or enter a denial-of-service (DoS) state, allowing the attacker to run arbitrary code.
Insufficiently Protected Credentials vulnerability has been discovered in 3S-Smart Software Solutions GmbH's Equipment- CODESYS V3. Successful exploitation of this vulnerability could allow for an attacker with access to PLC traffic to obtain user credentials.
Multiple vulnerabilities such as Unverified Ownership, Uncontrolled Memory Allocation have been discovered in 3S-Smart Software Solutions GmbH's Equipment- CODESYS V3. Successful exploitation of these vulnerabilities could allow a remote attacker to close existing communication channels or to take over an already established user session to send crafted packets to a PLC.
Out-of-Bounds Read vulnerability has been discovered in Fuji Electric's Equipment- FRENIC Loader. Successful exploitation of this vulnerability could allow information disclosure.
Out-of-bounds Write vulnerability has been discovered in Advantech's Equipment- Advantech WebAccess HMI Designer. Successful exploitation of this vulnerability may allow an attacker to remotely execute arbitrary code.
A vulnerability in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco Nexus 9000 Series Application Centric
Infrastructure (ACI) Mode Switch Software could allow an adjacent, unauthenticated attacker to cause a denial of service (DoS)
condition or execute arbitrary code with root privileges.
Multiple vulnerabilities such as OS Command Injection, Unrestricted Upload of File with Dangerous Type,
Cross-site Request Forgery, Small Space of Random Values, Cross-site Scripting, Exposure of Backup file
to Unauthorized Control Sphere, Improper Authentication, Use of Hard-coded Credentials have been discovered
in Prima Systems' Equipment- FlexAir. Exploitation of these vulnerabilities may allow an attacker to execute
commands directly on the operating system, upload malicious files, perform actions with administrative privileges,
execute arbitrary code in a user’s browser, discover login credentials, bypass normal authentication, and have full system access.
Multiple vulnerabilities such as Stack-based Buffer Overflow, Heap-based Buffer Overflow,
Integer Underflow, Improper Restriction of Operations within the Bounds of a Memory Buffer,
Race Condition, Argument Condition or Modification, Null Pointer Dereference, Argument Injection
or Modification have been discovered in Wind River's Equipment- VxWorks. Successful exploitation
of these vulnerabilities could allow remote code execution.
Multiple vulnerabilities such as Improper Restriction of XML External Entity Reference, Uncontrolled Resource Consumption have been discovered in Mitsubishi Electric's Equipment- Mitsubishi Electric FR Configurator2. Successful exploitation of these vulnerabilities may enable arbitrary files to be read or cause a denial-of-service condition.
Stack-based Buffer Overflow vulnerability has been discovered in NREL's Equipment- EnergyPlus. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code or cause a denial-of-service condition.
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could circumvent PowerShell Core Constrained Language Mode on the machine.
Unquoted Search Path or Element vulnerability has been discovered in Exacq Technologies, Inc., a subsidiary of Johnson Controls' Equipment- exacqVision Server. Successful exploitation of this vulnerability could allow an unauthenticated user to elevate their privileges.
Cisco Talos recently identified a large number of ongoing malware distribution campaigns linked to a threat actor called "SWEED". They primarily targets their victims with stealers and remote access trojans.
Use of Obsolete Function vulnerability has been discovered in Philips' Equipment- Philips Holter 2010. Successful exploitation of this vulnerability under certain conditions can lead to a product feature escalation.
Multiple vulnerabilities such as Heap-based Buffer Overflow, Out-of-Bounds Read have been discovered in Delta Electronics' Equipment- CNCSoft ScreenEditor. Successful exploitation of these vulnerabilities could cause buffer overflow conditions that may allow information disclosure, remote code execution, or crash the application.
Unrestricted Upload of File with Dangerous Type vulnerability has been discovered in Siemens' Equipment- SIMATIC WinCC and SIMATIC PCS7. Successful exploitation of this vulnerability could cause a denial-of-service condition on the affected service or device.
Improper Access Control vulnerability has been discovered in Siemens' Equipment- TIA Administrator (TIA Portal). Successful exploitation of this vulnerability could allow an execution of some commands without proper authentication.
Multiple vulnerabilities such as Improper Input Validation, Cryptographic Issues have been discovered in Siemens' Equipment- SIMATIC RF6XXR. Successful exploitation of these vulnerabilities could allow access to sensitive information.
Multiple vulnerabilities such as Improper Input Validation, Memory Corruption have been discovered in AVEVA's Equipment- Vijeo Citect and Citect SCADA Floating License Manager. These vulnerabilities could allow an attacker to deny the acquisition of a valid license for legal use of the product.
Out-of-Bounds Write vulnerability has been discovered in Schneider Electric's Equipment- Interactive Graphical SCADA System (IGSS). Successful exploitation of this vulnerability could allow an attacker to achieve arbitrary code execution or crash the software.
Multiple vulnerabilities such as Improper Input Validation, Memory Corruption have been discovered in Schneider Electric's Equipment- Floating License Manager. These vulnerabilities could allow an attacker to deny the acquisition of a valid license for legal use of the product.
A zero-day exploit takes advantage of a local privilege escalation vulnerability in Microsoft Windows, specifically a NULL pointer dereference in the win32k.sys component. Multiple versions of Windows were affected. Microsoft Security Response Center has fixed the vulnerability and released a patch.
A vulnerability in the cryptographic driver for Cisco Adaptive Security Appliance Software (ASA) and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reboot unexpectedly.
A potential security vulnerability in Intel Solid State Drives (SSD) for Data Centers (DC) S4500/S4600 Series firmware may allow escalation of privilege. Intel released firmware updates to mitigate this potential vulnerability.
A potential security vulnerability in the Intel Processor Diagnostic Tool may allow escalation of privilege, denial of service, or information disclosure. Intel released software updates to mitigate this potential vulnerability.
Improper Authentication vulnerability has been discovered in GE's Equipment- Aestiva and Aespire Anesthesia. Successful exploitation of this vulnerability could allow an attacker the ability to remotely modify GE Healthcare anesthesia device parameters.
Use of Hard-coded Credentials vulnerability has been discovered in Emerson's Equipment- DeltaV Distributed Control System (DCS). Successful exploitation of this vulnerability could allow an attacker to gain administrative access to DeltaV Smart Switches.
Improper Access Control vulnerability has been discovered in Rockwell Automation's Equipment- PanelView 5510. Successful exploitation of this vulnerability could allow a remote unauthenticated user to gain root privileges on the device.
Use After Free vulnerability has been discovered in Schneider Electric's Equipment- Zelio Soft 2. Successful exploitation of this vulnerability could allow remote code execution through the opening of a specially crafted project file.
Cross-site Scripting vulnerability has been discovered in Siemens' Equipment- Spectrum Power. Successful exploitation of this vulnerability could allow an attacker to inject arbitrary code in a specially crafted HTTP request and monitor information.
Improper Input Validation vulnerability has been discovered in Siemens' Equipment- SIPROTEC 5 and DIGISI 5. Successful exploitation of these vulnerabilities could allow a denial-of-service condition and limited control of file upload, download, and delete functions.
Improper Input Validation vulnerability has been discovered in Quest's Equipment- KACE Systems Management Appliance (SMA).
Successful exploitation of this vulnerability could allow an administrative user unintentional access to the underlying operating system of the device.
Improper Check for Unusual or Exceptional Conditions vulnerability has been discovered in Schneider Electric's Equipment- Modicon Controllers.
Successful exploitation of this vulnerability could result in a denial-of-service condition.
Improper Access Control vulnerability has been discovered in Medtronic's Equipment- MiniMed 508 and Paradigm Series
Insulin Pumps. Successful exploitation of this vulnerability may allow an attacker with adjacent access to one of the
affected products to intercept, modify, or interfere with the wireless RF (radio frequency) communications to or from the product.
Multiple vulnerabilities such as Use of Hard-coded Credentials, Improper Authentication, Relative Path Traversal,
Improper Input Validation, Stack-based Buffer Overflow have been discovered in ABB's Equipment- PB610 Panel Builder 600.
An attacker who successfully exploits these vulnerabilities could prevent legitimate access to an affected system node,
remotely cause an affected system node to stop, take control of an affected system node, or insert and run arbitrary code
in an affected system node.
Use of Hard-coded Credentials vulnerability has been discovered in ABB's Equipment- CP651 HMI.
Successful exploitation of this vulnerability could allow an attacker to prevent legitimate access
to an affected system node, remotely cause an affected system node to stop, take control of an
affected system node, or insert and run arbitrary code in an affected system node.
Use of Hard-coded Credentials vulnerability has been discovered in ABB's Equipment- CP635 HMI.
Successful exploitation of this vulnerability could allow an attacker to prevent legitimate access
to an affected system node, remotely cause an affected system node to stop, take control of an
affected system node, or insert and run arbitrary code in an affected system node.
Use of Hard-coded Credentials vulnerability has been discovered in SICK's Equipment- MSC800.
Successful exploitation of this vulnerability could allow a low-skilled remote attacker to
reconfigure settings and/or disrupt the functionality of the device.
Multiple vulnerabilities such as Path Traversal, Stack-based Buffer Overflow, Heap-based Buffer Overflow,
Out-of-bounds Read, Out-of-bounds Write, Untrusted Pointer Dereference have been discovered in Advantech's
Equipment- WebAccess/SCADA. Successful exploitation of these vulnerabilities may allow information disclosure,
deletion of files, and remote code execution.
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to upload arbitrary files on an affected device.
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device.
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to gain access to sensitive files on an affected device.
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to retrieve sensitive information from an affected device.
The National Institute of Standards and Technology (NIST) has released the Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks report to manage the cybersecurity and privacy risks associated with individual IoT devices.
Dell SupportAssist for Business PCs and Dell SupportAssist for Home PCs require an update to the latest versions to address a security vulnerability within the PC Doctor component.
Apache has released a security advisory to address a vulnerability in Apache Tomcat. An attacker could exploit this vulnerability to cause a denial-of-service condition.
Apple has released security updates to address vulnerabilities in AirPort Express, AirPort Extreme, and AirPort Time Capsule wireless routers with 802.11n. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
Multiple TCP Selective Acknowledgement (SACK) and Maximum Segment Size (MSS) networking vulnerabilities may cause denial-of-service conditions in Linux and FreeBSD kernels.
Microsoft has released an update to address a vulnerability in Outlook for Android. An attacker could exploit this vulnerability to take control of an affected system.
Multiple vulnerabilities such as Access of Uninitialized Pointer, Out-of-bounds Read, Use After Free have been discovered
in Phoenix Contact's Equipment- Automation Worx Software Suite. Successful exploitation of these vulnerabilities could
allow an attacker, with access to an original PC Worx or Config+ project file, to perform remote code execution.
Cisco has released security updates to address vulnerabilities in multiple Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
Oracle has released a security alert to address a vulnerability in WebLogic. A remote attacker could exploit this vulnerability to take control of an affected system.
The Samba Team has released security updates to address vulnerabilities in Samba 4.9 and all versions of Samba
from 4.10 onward. An attacker could exploit these vulnerabilities to cause a denial-of-service condition.
The Internet Systems Consortium (ISC) has released updates that address a vulnerability in versions of ISC Berkeley Internet Name Domain (BIND). A remote attacker could exploit this vulnerability to cause a denial-of-service condition.
Mozilla has released security updates to address a vulnerability in Firefox and Firefox ESR. An attacker could exploit this vulnerability to take control of an affected system.
Mozilla has released a security update to address vulnerabilities in Thunderbird. An attacker could exploit these vulnerabilities to take control of an affected system.
Google has released Chrome 75.0.3770.90 for Windows, Mac, and Linux. This version addresses a vulnerability that an attacker can exploit to take control of an affected system.
Exim has released patches to address a vulnerability affecting Exim versions 4.87–4.91. A remote attacker could exploit this vulnerability to take control of an affected email server. This vulnerability was detected in exploits in the wild.
Multiple vulnerabilities such as Improper Access Control, Unrestricted Upload of File with Dangerous Type have been discovered
in BD's Equipment- Alaris Gateway Workstation. Exploitation of these vulnerabilities could allow unauthorized arbitrary code
execution, which could allow an attacker to view and edit device status and configuration details as well as cause devices
to become unavailable.
Improper Authorization vulnerability has been discovered in Johnson Controls' Equipment- exacqVision Enterprise System Manager (ESM). Successful exploitation of this vulnerability could allow malicious code execution.
Multiple vulnerabilities such as Use of Hard-coded Credentials, Use of Hard-coded Cryptographic Key,
Using Components with Known Vulnerabilities have been discovered in WAGO's Equipment- Industrial Managed
Switches 852-303, 852-1305, and 852-1505. Successful exploitation of these vulnerabilities could allow a
compromise of the managed switch, resulting in disruption of communication, and root access to the operating system.
Cisco has released a security update to address a vulnerability in Cisco IOS XE. A remote attacker could exploit this vulnerability to take control of an affected system.
Intel has released security updates and recommendations to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to gain an escalation of privileges on a previously infected machine.
Microsoft has released updates to address multiple vulnerabilities in Microsoft software. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
Adobe has released security updates to address vulnerabilities affecting ColdFusion, Adobe Campaign, and Adobe Flash Player. An attacker could exploit some of these vulnerabilities to take control of an affected system.
The DICOM(Digital Imaging and Communications in Medicine) standard is the international standard to transmit, store, retrieve, print, process, and display medical imaging information. Input Validation vulnerability in DICOM Standard has been discovered, successful exploitation of this vulnerability could allow an attacker to embed executable code into image files used by medical imaging devices.
Multiple vulnerabilities such as Improper Authorization, Incorrect User Management, Missing Authorization have been discovered in Siemens' Equipment- Siveillance VMS. Successful exploitation of these vulnerabilities could allow an attacker with network access to Port 80/TCP to change device properties, user roles, and user-defined event properties.
Multiple vulnerabilities such as Improper Privilege Management, Cleartext Transmission of Sensitive Information have been discovered in Siemens' Equipment- SIMATIC Ident MV420 and MV440 Families. Successful exploitation of these vulnerabilities could allow a remote attacker to escalate privileges and view data transmitted between the device and the user.
Multiple vulnerabilities such as Improper Restriction of Operations within the Bounds of a Memory Buffer, Session Fixation have been discovered in Siemens' Equipment- LOGO!8 devices. Successful exploitation of these vulnerabilities could allow an attacker to read the communication between the affected device and a user, and compromise the availability of the targeted system.
Storing Passwords in a Recoverable Format vulnerability has been discovered in Siemens' Equipment- SCALANCE X Switches. Successful exploitation of this vulnerability could allow an attacker to reconstruct passwords for users of the affected devices, if the attacker is able to obtain a backup of the device configuration.
VMware has released security updates to address vulnerabilities affecting Tools 10 and Workstation 15. An attacker could exploit one of these vulnerabilities to take control of an affected system.
Multiple vulnerabilities such as Information Exposure, Cross-site Request Forgery, Unrestricted Upload of File with Dangerous Type, Open Redirect, Hidden Functionality, Exposed Dangerous Method or Function, Use of Hard-coded Credentials have been discovered in Optergy's Equipment- Proton/Enterprise Building Management System. Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution and gain full system access.
Multiple vulnerabilities such as Heap-based Buffer Overflow, Type Confusion have been discovered in Panasonic's Equipment- Control FPWIN Pro. Successful exploitation of these vulnerabilities could crash the device and allow remote code execution.
Cisco has released security updates to address vulnerabilities in multiple Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
Google has released Chrome version 75.0.3770.80 for Windows, Mac, and Linux. This version addresses multiple vulnerabilities that an attacker could exploit to take control of an affected system.
Multiple vulnerabilities such as Key Management Errors, Improper Access Control, Man-in-the-Middle, Using Component with Known Vulnerabilities have been discovered in Phoenix Contact's Equipment- PLCNext AXC F 2152. Successful exploitation of these vulnerabilities could allow an attacker to decrypt passwords, bypass authentication, and deny service to the device.
Improper Access Control vulnerability has been discovered in Phoenix Contact's Equipment- FL NAT SMx. Successful exploitation of this vulnerability could allow unauthorized users full access to the device configuration.
Multiple vulnerabilities such as Cross-site Scripting, OS Command Injection have been discovered in Geutebrück's Equipment- G-Cam and G-Code. Successful exploitation of these vulnerabilities could allow remote code execution as root and remote code execution in the browser of the IP camera operator.
Insufficiently Protected Credentials vulnerability has been discovered in AVEVA's Equipment- Vijeo Citect and CitectSCADA. Successful exploitation of this vulnerability could allow a locally authenticated user to obtain Citect user credentials.
Multiple vulnerabilities such as Stack-based Buffer Overflow, Heap-based Buffer Overflow have been discovered in Emerson's Equipment- Ovation OCR400 Controller. Successful exploitation of these vulnerabilities may allow privilege escalation or remote code execution, or it may halt the controller.
Multiple vulnerabilities such as Cross-site Request Forgery, Information Exposure Through Discrepancy, Cross-site Scripting,
Command Injection, Information Exposure Through Source Code, Use of Hard-coded Cryptographic Key, SQL Injection, Authentication
Bypass Using an Alternate Path or Channel, Inadequate Encryption Strength have been discovered in Computrols' Equipment- CBAS Web.
Successful exploitation of these vulnerabilities could allow unauthorized actions with administrative privileges, disclosure of
sensitive information, execution of code within a user’s browser, execution of unauthorized OS commands, unauthorized access to
the database, execution of unauthorized SQL commands, authentication bypass, or decryption of passwords.
Uncontrolled Resource Consumption vulnerability has been discovered in Mitsubishi Electric's Equipment- MELSEC-Q series Ethernet module.
Successful exploitation of this vulnerability may render the device unresponsive, requiring a physical reset of the PLC
(Programmable Logic Controller).
Use of Insufficiently Random Values vulnerability has been discovered in Schneider Electric's Equipment- Modicon M580,
Modicon M340, Modicon Premium, and Modicon Quantum. Successful exploitation of this vulnerability could allow an attacker
to hijack TCP connections or cause information leakage.
Out-of-bounds Read vulnerability has been discovered in Fuji Electric's Equipment- Alpha7 PC Loader.
Successful exploitation of this vulnerability could crash the device.
Untrusted Search Path vulnerability has been discovered in Omron's Equipment- Network Configurator for DeviceNet.
Successful exploitation of this vulnerability could allow an attacker to achieve arbitrary code execution under the
privileges of the application.
Missing Authentication for Critical Function vulnerability has been discovered in Siemens' Equipment- SIMATIC WinCC and SIMATIC PCS 7.
Successful exploitation of this vulnerability could allow an unauthenticated attacker with access to the affected devices to
execute arbitrary code.
Deserialization of Untrusted Data vulnerability has been discovered in Siemens' Equipment- LOGO! Soft Comfort.
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code if the attacker
tricks a legitimate user into opening a manipulated project.
Multiple vulnerabilities such as Missing Authentication for Critical Function, Improper Handling of Extra Values, Plaintext Storage of a
Password have been discovered in Siemens' Equipment- LOGO!8 BM. Successful exploitation of these vulnerabilities could allow device
reconfiguration, access to project files, decryption of files, and access to passwords.
Uncontrolled Resource Consumption vulnerability has been discovered in Siemens' Equipment- SINAMICS PERFECT HARMONY GH180 Drives NXG I and NXG II.
Successful exploitation of this vulnerability could allow an attacker with access to the Ethernet Modbus Interface to cause a denial-of-service
condition exceeding the number of available connections.
Improper Input Validation vulnerability has been discovered in Siemens' Equipment- SINAMICS PERFECT HARMONY GH180 Fieldbus Network.
Successful exploitation of this vulnerability could cause a denial-of-service condition.
Multiple vulnerabilities such as Command Injection, Information Exposure, Cross-site Scripting have been discovered in Siemens'
Equipment- SCALANCE W1750D. Successful exploitation of these vulnerabilities could allow an attacker execute arbitrary commands
within the underlying operating system, discover sensitive information, take administrative actions on the device, or expose session
cookies for an administrative session.
Multiple vulnerabilities such as SQL Injection, Uncaught Exception, Exposed Dangerous Method have been discovered in Siemens' Equipment-
SIMATIC PCS 7, WinCC Runtime Professional, WinCC (TIA Portal). Successful exploitation of these vulnerabilities could allow an attacker to
execute arbitrary commands on the affected system.
Multiple vulnerabilities such as Use of Hard-coded Credentials, Insufficient Protection of Credentials,
Cross-site Scripting have been discovered in Siemens' Equipment- SIMATIC WinCC Runtime Advanced,
WinCC Runtime Professional, WinCC (TIA Portal); HMI Panels. Successful exploitation of these vulnerabilities
could allow an attacker with network access to the device to read/write variables via SNMP.
Multiple vulnerabilities such as OS Command Injection, Use of Hard-coded Credentials, Unrestricted Upload of File with Dangerous Type,
Cross-site Scripting, Cross-site Request Forgery, Information Exposure, Missing Encryption of Sensitive Data have been discovered in
Sierra Wireless' Equipment- AirLink ALEOS. Successful exploitation of these vulnerabilities could allow attackers to remotely execute code,
discover user credentials, upload files, or discover file paths.
Multiple vulnerabilities such as Uncontrolled Search Path, Use of Hard-coded Credentials,
Improper Access Controls have been discovered in General Electric's Equipment- Communicator.
Successful exploitation of these vulnerabilities could allow an attacker to gain administrative
privileges, manipulate widgets and UI elements, gain control over the database, or execute administrative commands.
Multiple vulnerabilities such as Use of Hard-coded Credentials, Cross-site Scripting, SQL Injection, Missing Encryption of Sensitive Data,
Code Injection, Stack-based Buffer Overflow have been discovered in Orpak's Equipment- SiteOmat. Successful exploitation of these
vulnerabilities could result in arbitrary remote code execution resulting in possible denial-of-service conditions and unauthorized
access to view and edit monitoring, configuration, and payment information.
Multiple vulnerabilities such as Uncontrolled Resource Consumption, Stack-based Buffer Overflow have been discovered
in Rockwell Automation's Equipment- CompactLogix 5370. Successful exploitation of these vulnerabilities could allow a
remote attacker to render the web server unavailable and/or place the controller in a major non-recoverable faulted state (MNRF).
Cross-site Scripting vulnerability has been discovered in Philips' Equipment - Tasy EMR. Successful exploitation of this vulnerability could
impact or compromise patient confidentiality and system integrity.
Multiple vulnerabilities such as Uncontrolled Resource Consumption, Improper Access Control have been discovered
in Fujifilm's Equipment- FCR Capsula X/Carbon X. Successful exploitation of these vulnerabilities could result in
a denial-of-service condition in affected cassette reader units, causing potential image loss or device unavailability.
Attackers could gain unauthorized access to the underlying operating system, allowing arbitrary code execution.
Open Redirect vulnerability has been discovered in Rockwell Automation's Equipment- MicroLogix 1400 and CompactLogix 5370 Controllers.
Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to input a malicious link redirecting users
to a malicious website.
Multiple vulnerabilities such as Stack-based Buffer Overflow, Heap-based Buffer Overflow, Out-of-bounds Read have been discovered in Delta
Electronics' Equipment- Delta Industrial Automation CNCSoft. Successful exploitation of these vulnerabilities could cause buffer overflow
conditions that may allow information disclosure, remote code execution, or crash the application.
Use of Hard-coded Credentials vulnerability has been discovered in WAGO's Equipment- Series 750-88x and 750-87x.
This vulnerability allows a remote attacker to change the settings or alter the programming of the device.
Uncontrolled Resource Consumption vulnerability has been discovered in Programmable Logic Controllers Equipment of ABB,
Phoenix Contact, Schneider Electric, Siemens, WAGO vendors. High network load can consume CPU power in such a way that
the normal operation of the device can be affected; that is, the configured cycle time can be influenced.
Out-of-bounds Read vulnerability has been discovered in Siemens' Equipment- CP, SIAMTIC, SIMOCODE, SINAMICS, SITOP, and TIM.
Successful exploitation of this vulnerability could result in a denial-of-service condition leading to a restart of the webserver.
Multiple vulnerabilities such as Double Free, Out-of-bounds Read, Uncontrolled Resource Consumption have been
discovered in Siemens' Equipment- RUGGEDCOM ROX II. Successful exploitation of these vulnerabilities could result
in remote code execution and/or a denial-of-service condition.
Multiple vulnerabilities such as Incorrect Calculation of Buffer Size, Out-of-bounds Read, Stack-based Buffer Overflow,
Improper Handling of Insufficient Permissions have been discovered in Siemens' Equipment- SINEMA Remote Connect (Client and Server).
Successful exploitation of these vulnerabilities could allow an attacker to circumvent the system authorization for certain functionalities,
and to execute privileged functions.
Uncaught Exception vulnerability has been discovered in Siemens' Equipment- SIMATIC, SINEC-NMS, SINEMA, SINEMURIK Industrial Control Products
with OPC UA. Successful exploitation of this vulnerability could cause a denial-of-service condition on the affected service or device.
Command Injection vulnerability has been discovered in Siemens' Equipment- Spectrum Power 4.7.
Successful exploitation compromises confidentiality, integrity, or availability of the targeted system.
Uncontrolled Resource Consumption vulnerability has been discovered in Siemens' Equipment- SIMOCODE pro V EIP.
Successful exploitation of this vulnerability could cause a denial-of-service condition.
Improper Input Validation vulnerability has been discovered in Rockwell Automation's Equipment- Stratix 5950.
Successful exploitation of this vulnerability could allow a remote attacker to cause an affected device to reload.
Multiple vulnerabilities such as Resource Management Errors, Improper Input Validation have been discovered in
Rockwell Automation's Equipment- Stratix 5400/5410/5700/8000/8300, ArmorStratix 5700. Successful exploitation
of these vulnerabilities could result in a denial-of-service condition or time synchronization issues across
the network via reloading the device, a buffer overflow, or memory exhaustion.
Uncontrolled Resource Consumption vulnerability has been discovered in Rockwell Automation's Equipment- Stratix 5400/5410/5700,
ArmorStratix 5700. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to cause a memory
leak on an affected device, which may cause the device to reload.
Use After Free vulnerability has been discovered in Omron's Equipment- CX-Programmer within CX-One.
Successful exploitation of this vulnerability could allow an attacker to execute code under the privileges of the application.
Multiple vulnerabilities such as Command Injection, Stack-based Buffer Overflow,
Improper Access Control have been discovered in Advantech's Equipment- WebAccess/SCADA.
Successful exploitation of these vulnerabilities may cause a denial of service and allow remote code execution.
Resource Exhaustion vulnerability has been discovered in Rockwell Automation's Equipment- PowerFlex 525 AC Drives.
Successful exploitation of this vulnerability could result in resource exhaustion, denial of service, and/or memory
corruption.
Missing Authentication for Critical Function vulnerability has been discovered in ENTTEC's Equipment- Datagate MK2,
Storm 24, Pixelator. Successful exploitation of this vulnerability could reboot this device allowing a continual
denial of service condition.
Command Injection vulnerability has been discovered in Phoenix Contact's Equipment- RAD-80211-XD.
Successful exploitation of this vulnerability could allow an attacker to execute system level commands
with administrative privileges.
Expected Behavior Violation vulnerability has been discovered in Siemens' Equipment- SCALANCE X.
Successful exploitation of this vulnerability could allow an attacker to feed data over a mirror
port and into the mirrored network.
Multiple vulnerabilities such as Improper Access Control, Cleartext Transmission of Sensitive
Information have been discovered in Medtronic's Equipment- MyCareLink Monitor, CareLink Monitor,
CareLink 2090 Programmer, specific Medtronic implanted cardiac devices. Successful exploitation
of these vulnerabilities may allow an attacker with adjacent short-range access to one of the
affected products to interfere with, generate, modify, or intercept the radio frequency (RF)
communication of the Medtronic proprietary Conexus telemetry system, potentially impacting product
functionality and/or allowing access to transmitted sensitive data.
Uncontrolled Search Path Element vulnerability has been discovered in AVEVA's Equipment- InduSoft Web Studio, InTouch Edge HMI.
Successful exploitation of this vulnerability could allow execution of unauthorized code or commands.
Multiple vulnerabilities such as Cross-site Scripting, Path Traversal, Improper Authentication, Improper Input Validation,
Code Injection have been discovered in Columbia Weather Systems' Equipment- Weather MicroServer. Successful exploitation of
these vulnerabilities may allow disclosure of data, cause a denial-of-service condition, and allow remote code execution.
Path Traversal vulnerability has been discovered in PEPPERL+FUCHS's Equipment- WirelessHART-Gateways.
Successful exploitation of this vulnerability could allow access to files and restricted directories
stored on the device through the manipulation of file parameters.
Uncontrolled Search Path Element vulnerability has been discovered in Gemalto's Equipment- Sentinel UltraPro.
Successful exploitation of this vulnerability could allow execution of unauthorized code or commands.
Out-of-Bounds Write vulnerability has been discovered in LCDS' Equipment- LAquis SCADA. Successful exploitation of this vulnerability could allow remote code execution.
Multiple vulnerabilities such as Information Exposure, Out-of-bounds Write, Heap-based Buffer Overflow
have been discovered in WIBU-SYSTEMS AG's Equipment- WibuKey Digital Rights Management (DRM). Successful
exploitation of these vulnerabilities may allow information disclosure, privilege escalation, or remote code execution.
Stack-based Buffer Overflow vulnerability has been discovered in Rockwell Automation's Equipment- RSLinx Classic.
Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the target device.
Cross-site Scripting vulnerability has been discovered in PSI GridConnect GmbH's Equipment- Telecontrol Gateway and Smart Telecontrol Unit family, IEC104 Security Proxy.
Successful exploitation of this vulnerability could allow an attacker to execute dynamic scripts in the context of the application,
which could allow cross-site scripting attacks.
Multiple vulnerabilities such as Classic Buffer Overflow, Cross-site Request Forgery, Cross-site Scripting, Improper Access Controls,
Improper Restriction of Excessive Authentication Attempts, Missing Encryption of Sensitive Data, Out-of-bounds Read, Unprotected Storage of Credentials,
Predictable from Observable State, Uncontrolled Resource Consumption have been discovered in Moxa's Equipment- IKS, EDS. Successful exploitation of these
vulnerabilities could allow the reading of sensitive information, remote code execution, arbitrary configuration changes, authentication bypass,
sensitive data capture, reboot of the device, device crash, or full compromise of the device.
Improper Input Validation vulnerability has been discovered in Horner Automation's Equipment- Cscape.
Successful exploitation of this vulnerability could crash the device being accessed, which may allow the attacker to read confidential
information and remotely execute arbitrary code.
Cross-site Scripting and Authentication Bypass vulnerability have been discovered in Rockwell Automation's Equipment- Allen-Bradley PowerMonitor 1000.
Successful exploitation of these vulnerabilities could allow a remote attacker to affect the confidentiality, integrity, and availability of the device.
Out-of-bounds Read vulnerability has been discovered in Delta Electronics' Equipment- Delta Industrial Automation CNCSoft.
Successful exploitation of this vulnerability could cause a buffer overflow condition that may allow information disclosure or crash the application.
Multiple vulnerabilities such as Improper Authentication, Protection Mechanism Failure, Permission Issues, Key Management Errors,
Insufficient Control Flow Management have been discovered in Intel's Equipment- Data Center Manager SDK. Successful exploitation of
these vulnerabilities may allow escalation of privilege, denial of service, or information disclosure.
Authentication Bypass Using an Alternate Path or Channel vulnerability has been discovered in Pangea Communications' Equipment- Internet FAX Analog Telephone Adapter (ATA).
Successful exploitation of this vulnerability could cause the device to reboot and create a continual denial-of-service condition.
Stack-based Buffer Overflow vulnerability has been discovered in Open Source Project's Equipment- gpsd, microjson.
Successful exploitation of this vulnerability could allow remote code execution, data exfiltration, or denial-of service via device crash.
Cross-site Scripting vulnerability has been discovered in OSIsoft's Equipment- PI Vision. Successful exploitation of this vulnerability could
allow an attacker to read and modify the contents of the PI Vision web page and data related to the PI Vision application in the victim’s browser.
Improper Input Validation vulnerability has been discovered in Siemens' Equipment- EN100 Ethernet Communication Module and SIPROTEC 5 Relays.
The EN100 Ethernet communication module and SIPROTEC 5 relays are affected by a security vulnerability that could allow an attacker to conduct
a denial-of-service attack over the network.
Improper Input Validation vulnerability has been discovered in Siemens' Equipment- WibuKey Digital Rights Management (DRM) used with SICAM 230.
Successful exploitation of these vulnerabilities may allow information disclosure, privilege escalation, or remote code execution.
Improper Input Validation vulnerability has been discovered in Siemens' Equipment- SIMATIC S7-300 CPU.
Successful exploitation of this vulnerability could crash the device being accessed, resulting in a denial-of-service condition.
Multiple vulnerabilities such as Cryptographic Issues, Improper Restriction of Operations within the Bounds of a Memory Buffer,
Resource Management Errors have been discovered in Siemens' Equipment- Intel Active Management Technology (AMT) of SIMATIC IPCs.
Successful exploitation of these vulnerabilities may allow arbitrary code execution, a partial denial-of-service condition, or information disclosure.
Multiple vulnerabilities such as Cleartext Transmission of Sensitive Information, Cross-site Scripting,
Cross-site Request Forgery have been discovered in Siemens' Equipment- CP1604 and CP1616. Successful
exploitation of these vulnerabilities could result in a denial-of-service condition and information exposure.
An attacker could inject arbitrary JavaScript in a specially crafted URL request to execute on unsuspecting user’s systems,
allowing an attacker to trigger actions via the web interface that a legitimate user is allowed to perform.
Improper Input Validation vulnerability has been discovered in Siemens' Equipment- EN100 Ethernet module.
The EN100 Ethernet module for the SWT 3000 management platform is affected by security vulnerabilities that could allow an attacker
to conduct a denial-of-service attack over the network.
Uncaught Exception vulnerability has been discovered in Siemens' Equipment- SICAM A8000 RTU. The SICAM A8000 RTU series is affected by a
security vulnerability that could allow unauthenticated remote users to cause a denial-of-service condition on the web server of affected products.
Multiple vulnerabilities such as Improper Authentication, Missing Authentication for Critical Function, Improper Input Validation have
been discovered in Kunbus' Equipment- PR100088 Modbus gateway. Successful exploitation of these vulnerabilities could allow an attacker
to achieve remote code execution and/or cause a denial-of-service condition.
Improper Input Validation vulnerability has been discovered in Siemens' Equipment- SIMATIC S7-1500 CPU. Successful exploitation of these vulnerabilities could allow a denial of service condition of the device.
Multiple vulnerabilities such as Stack-based Buffer Overflow, Heap-based Buffer Overflow, Memory Corruption have been discovered in WECON's Equipment- LeviStudioU.
Successful exploitation of these vulnerabilities could allow attackers to execute arbitrary code.
Improper Input Validation vulnerability has been discovered in Rockwell Automation's Equipment- EtherNet/IP Web Server Modules.
Successful exploitation of this vulnerability could allow a remote attacker to deny communication with Simple Network Management Protocol (SNMP) service.
Multiple vulnerabilities such as Missing Authentication for Critical Function, Resource Injection have been discovered in AVEVA's Equipment- InduSoft Web Studio
and InTouch Edge HMI (formerly InTouch Machine Edition). Successful exploitation of these vulnerabilities could allow a remote attacker to execute an arbitrary
process using a specially crafted database connection configuration file.
Multiple vulnerabilities such as Use of Hard-coded Credentials, Code Injection, SQL Injection have been discovered in Schneider Electric's Equipment- EVLink Parking.
Successful exploitation of these vulnerabilities could allow an attacker to stop the device and prevent charging, execute arbitrary commands, and access the web interface
with full privileges.
Multiple vulnerabilities such as Use of Hard-coded Credentials, Use of Hard-coded Password, Inadequate Encryption
Strength have been discovered in IDenticard's Equipment- PremiSys. Successful exploitation of these vulnerabilities
could allow an attacker to view sensitive information via backups, obtain access to credentials, and/or obtain full
access to the system with admin privileges.
Insufficiently Protected Credentials vulnerability has been discovered in AVEVA's Equipment- Wonderware System Platform.
This vulnerability could allow unauthorized access to the credentials for the ArchestrA Network User Account.
Resource Exhaustion vulnerability has been discovered in Mitsubishi Electric's Equipment- MELSEC-Q series PLCs.
Successful exploitation of this vulnerability could allow a remote attacker to send specially crafted packets to the device, causing Ethernet communication to stop.
Unrestricted Upload of Files with Dangerous Type vulnerability has been discovered in Yokogawa's Equipment- License Manager Service.
Successful exploitation of this vulnerability could allow an attacker to remotely upload files, allowing execution of arbitrary code.
Improper Access Control vulnerability has been discovered in BD's Equipment- FACSLyric. Successful exploitation of this vulnerability may allow an
attacker to gain unauthorized access to administrative level privileges on a workstation, which could allow arbitrary execution of commands.
Reusing a Nonce vulnerability has been discovered in Stryker's Equipment- Secure II MedSurg Bed, S3 MedSurg Bed, and InTouch ICU Bed.
Successful exploitation of this vulnerability could allow data traffic manipulation, resulting in partial disclosure of encrypted communication or injection of data.
Multiple vulnerabilities such as Cross-site Request Forgery, Improper Restriction of Excessive Authentication Attempts,
Cleartext Transmission of Sensitive Information, Resource Exhaustion, Incorrectly Specified Destination in a Communication Channel,
Insecure Storage of Sensitive Information, and Memory Corruption have been discovered in PHOENIX CONTACT's Equipment- FL SWITCH.
Successful exploitation of these vulnerabilities may allow attackers to have user privileges, gain access to the switch, read user credentials,
deny access to the switch, or perform man-in-the-middle attacks.
Multiple vulnerabilities such as Improper Authentication, Authentication Bypass, SQL Injection have been discovered in Advantech's Equipment- WebAccess/SCADA.
Successful exploitation of these vulnerabilities may allow an attacker to access and manipulate sensitive data.
Multiple vulnerabilities such as Path Traversal, Improper Authentication have been discovered in
Johnson Controls' Equipment- Facility Explorer. Successful exploitation of these vulnerabilities
could allow an attacker to read, write, and delete sensitive files to gain administrator privileges
in the Facility Explorer system.
Multiple vulnerabilities such as Improper Input Validation, Information Exposure Through Log Files,
Improper Privilege Management have been discovered in Dräger's Equipment- Infinity Delta. Successful
exploitation of these vulnerabilities could cause information disclosure of device logs, denial of
service through device reboots of the patient monitors, and privilege escalation.
Multiple vulnerabilities such as Improper Authentication, Cross-site Scripting have been discovered in ControlByWeb's Equipment- X-320M.
Successful exploitation of these vulnerabilities may allow arbitrary code execution and could cause the device being accessed to require a
physical factory reset to restore the device to an operational state.
Improper Input Validation vulnerability has been discovered in ABB's Equipment- CP400 Panel Builder TextEditor 2.0.
Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code, and cause a denial-of-service
condition within the Text Editor application.
Multiple vulnerabilities such as Code Injection, Command Injection, Use After Free, Type Confusion have been discovered in
Omron's Equipment- CX-Supervisor. Successful exploitation of these vulnerabilities could result in a denial-of-service condition,
and/or allow an attacker to achieve code execution with privileges within the context of the application.
Multiple vulnerabilities such as Improper Input Validation, Out-of-Bounds Read, Code Injection, Untrusted Pointer Dereference,
Out-of-Bounds Write, Relative Path Traversal, Injection, Use of Hard-Coded Credentials, Authentication Bypass Using an Alternate
Path or Channel have been discovered in LCDS' Equipment- LAquis SCADA. Successful exploitation of these vulnerabilities could allow
remote code execution, data exfiltration, or cause a system crash.
Authentication Bypass vulnerability has been discovered in Emerson's Equipment- DeltaV Distributed Control
System Workstations. Successful exploitation of this vulnerability could allow an attacker to shut down a
service, resulting in a denial of service.
Type Confusion vulnerability has been discovered in Omron's Equipment- CX-Protocol within CX-One.
Successful exploitation of these vulnerabilities could allow an attacker to execute code under the
privileges of the application.
Clear-text Storage of Sensitive Information vulnerability has been discovered in Pilz's Equipment- PNOZmulti Configurator.
Successful exploitation of this vulnerability could allow sensitive data to be read from the system.
Cross-site Scripting vulnerability has been discovered in Tridium's Equipment- Niagara Enterprise Security, Niagara AX,
and Niagara 4. Successful exploitation of this vulnerability could allow an authenticated user to inject client-side
scripts into some web pages that could then be viewed by other users.
Multiple vulnerabilities such as Path Traversal, Unrestricted Upload of File with Dangerous Type, XXE have been discovered
in Schneider Electric's Equipment- IIoT Monitor. Successful exploitation of these vulnerabilities could allow a remote attacker
to access files available to system users, arbitrarily upload and execute malicious files, and embed incorrect documents into the
system output to expose restricted information.
Use After Free vulnerability has been discovered in Schneider Electric's Equipment- Zelio Soft 2. Successful exploitation of this
vulnerability could allow for remote code execution when opening a specially crafted project file.
Authentication Bypass by Capture-Replay vulnerability has been discovered in Hetronic's Equipment- Nova-M.
Successful exploitation of this vulnerability could allow unauthorized users to view commands, replay commands,
control the device, or stop the device from running.
Resource Management Error vulnerability has been discovered in Yokogawa's Equipment- Vnet/IP Open Communication Driver.
Successful exploitation of this vulnerability could allow an attacker to cause Vnet/IP network communications to
controlled devices to become unavailable.
Improper Input Validation vulnerability has been discovered in Schneider Electric's
Equipment- Pro-face GP-Pro EX. Successful exploitation of this vulnerability could allow an attacker
to modify code to launch an arbitrary executable upon launch of the program.