Alerts and Advisories- 2018




January   February   March   April   May   June   July   August   September   October   November   December  


  • Vulnerability Summary (31 Dec 2018)

    Summary of vulnerabilities for the Week of December 24, 2018.

  • Vulnerability Summary (24 Dec 2018)

    Summary of vulnerabilities for the Week of December 17, 2018.

  • Vulnerability in Horner Automation's Equipment (20 Dec 2018)

    Improper Input Validation vulnerability has been discovered in Horner Automation's Equipment- Cscape. Successful exploitation of this vulnerability could crash the device being accessed, allow the attacker to read confidential information, and may allow an attacker to remotely execute arbitrary code.

  • Vulnerability in Schneider Electric's Equipment (20 Dec 2018)

    Open Redirect vulnerability has been discovered in Schneider Electric's Equipment- EcoStruxure. Successful exploitation of this vulnerability could allow an attacker to use this device as a platform to conduct a phishing attack.

  • Vulnerability in Rockwell Automation's Equipment (20 Dec 2018)

    Heap-based Buffer Overflow vulnerability has been discovered in Rockwell Automation's Equipment- FactoryTalk Services Platform. Successful exploitation of this vulnerability could allow a remote attacker to diminish communications or cause a complete denial of service to the device.

  • Vulnerability in ABB's Equipment (18 Dec 2018)

    Multiple vulnerabilities such as Missing Authentication for Critical Function, Cross-site Scripting have been discovered in ABB's Equipment- GATE-E2. Successful exploitation of these vulnerabilities could allow unrestricted access to the administrative telnet/web interface of the device, enabling attackers to compromise the availability of the device, read or modify registers and settings, or change the device configuration.

  • Vulnerability in Advantech's Equipment (18 Dec 2018)

    Improper Input Validation vulnerability has been discovered in Advantech's Equipment- WebAccess/SCADA. Successful exploitation of this vulnerability could cause a stack buffer overflow condition.

  • Vulnerability in 3S-Smart Software Solutions GmbH's Equipment (18 Dec 2018)

    Improper Access Control vulnerability has been discovered in 3S-Smart Software Solutions GmbH's Equipment- CODESYS Control V3 products. Successful exploitation of this vulnerability could allow unauthorized access and exfiltration of sensitive data including user credentials.

  • Vulnerability in 3S-Smart Software Solutions GmbH's Equipment (18 Dec 2018)

    Multiple vulnerabilities such as Use of Insufficiently Random Values, Improper Restriction of Communication Channel to Intended Endpoints have been discovered in 3S-Smart Software Solutions GmbH's Equipment- CODESYS V3 products. Successful exploitation of these vulnerabilities could allow a remote attacker to disguise the source of malicious communication packets and also exploit a random values weakness affecting confidentiality and integrity of data stored on the device.

  • Vulnerability in Siemens' Equipment (18 Dec 2018)

    Missing Authentication for Critical Function vulnerability has been discovered in Siemens' Equipment- TIM 1531 IRC. Successful exploitation of this vulnerability could allow an attacker to perform arbitrary administrative operations.

  • Vulnerability in ABB's Equipment (18 Dec 2018)

    Improper Authentication vulnerability has been discovered in ABB's Equipment- CMS-770. Successful exploitation of this vulnerability may allow an attacker to read sensitive configuration files that may lead to code execution on the device.

  • Vulnerability in ABB's Equipment (18 Dec 2018)

    Improper Authentication vulnerability has been discovered in ABB's Equipment- M2M ETHERNET. Successful exploitation of this vulnerability could allow an attacker to upload a malicious language file.

  • Vulnerability Summary (17 Dec 2018)

    Summary of vulnerabilities for the Week of December 10, 2018.

  • Vulnerability in Medtronic's Equipment (13 Dec 2018)

    Missing Encryption of Sensitive Data vulnerability has been discovered in Medtronic's Equipment- 9790 CareLink Programmer, 2090 CareLink Programmer, 29901 Encore Programmer. Successful exploitation of the vulnerability may allow an attacker with physical access to an affected programmer to access PHI or PII stored on the device.

  • Vulnerability in Schneider Electric's Equipment (13 Dec 2018)

    Multiple vulnerabilities such as Type Confusion, Stack-based Buffer Overflow have been discovered in Schneider Electric's Equipment- Eurotherm by Schneider Electric GUIcon. Successful exploitation of these vulnerabilities may allow an attacker to execute code with privileges within the context of the application.

  • Vulnerability in Siemens' Equipment (13 Dec 2018)

    Improper Input Validation vulnerability has been discovered in Siemens' Equipment- EN100 Ethernet Communication Module and SIPROTEC 5 relays. Successful exploitation of these vulnerabilities could cause a denial-of-service condition of the network functionality of the device, compromising the availability of the system.

  • Vulnerability in Geutebrück GmbH's Equipment (13 Dec 2018)

    OS Command Injection vulnerability has been discovered in Geutebrück GmbH's Equipment- E2 Camera Series. Successful exploitation of this vulnerability may allow a remote attacker to inject OS commands as root.

  • Vulnerability in GE's Equipment (13 Dec 2018)

    Path Traversal vulnerability has been discovered in GE's Equipment- Mark VIe, EX2100e, EX2100e_Reg, and LS2100e. Successful exploitation of this vulnerability could allow an attacker to access system data, which could result in escalation of privilege and unauthorized access to the controller.

  • Vulnerability in McAfee's Equipment (11 Dec 2018)

    Improper Access Control vulnerability has been discovered in McAfee's Equipment- SINAMICS PERFECT HARMONY GH180. These files can be executed to compromise the HMI, and by extension, the drive system.

  • Multiple vulnerabilities in Siemens' Equipment (11 Dec 2018)

    Multiple vulnerabilities such as Heap-based Buffer Overflow, Integer Overflow or Wraparound, Protection Mechanism Failure, Permissions, Privileges, and Access Controls, Stack-based Buffer Overflow, Uncaught Exception have been discovered in Siemens' Equipment- SINUMERIK Controllers. Successful exploitation of these vulnerabilities could cause denial-of-service conditions, privilege escalation, or allow remote code execution.

  • Vulnerability Summary (10 Dec 2018)

    Summary of vulnerabilities for the Week of December 03, 2018.

  • Vulnerability in Philips' Equipment (06 Dec 2018)

    Inadequate Encryption Strength vulnerability has been discovered in Philips' Equipment- Philips HealthSuite Health Android App. Successful exploitation of this vulnerability may allow an attacker with physical access to impact confidentiality and integrity of the product.

  • Vulnerability in General Electric's Equipment (06 Dec 2018)

    XXE vulnerability has been discovered in GE's Equipment- Proficy GDS. Successful exploitation of this vulnerability could allow an attacker to initiate an OPC UA session and retrieve an arbitrary file.

  • Vulnerability in Rockwell Automation's Equipment (06 Dec 2018)

    Missing Authentication for Critical Function vulnerability has been discovered in Rockwell Automation's Equipment- MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules. Successful exploitation of this vulnerability could allow an unauthenticated attacker to modify system settings and cause a loss of communication between the device and the system.

  • Multiple vulnerabilities in Omron's Equipment (04 Dec 2018)

    Multiple vulnerabilities such as Stack-based Buffer Overflow, Use After Free have been discovered in Omron's Equipment- CX-One. Successful exploitation of these vulnerabilities could allow an attacker to execute code under the privileges of the application.

  • Vulnerability in SpiderControl's Equipment (04 Dec 2018)

    Reflected Cross-site Scripting vulnerability has been discovered in SpiderControl's Equipment- SCADA WebServer. Successful exploitation of this vulnerability could allow an attacker to execute JavaScript on the victim’s browser.

  • Vulnerability Summary (03 Dec 2018)

    Summary of vulnerabilities for the Week of November 26, 2018.

  • Vulnerability in PEPPERL+FUCHS's Equipment (30 Oct 2018)

    Improper Privilege Management vulnerability has been discovered in PEPPERL+FUCHS's Equipment- CT50-Ex. Successful exploitation of this vulnerability could allow a malicious third-party application to gain elevated privileges and obtain access to sensitive information.

  • Vulnerability Summary (29 Oct 2018)

    Summary of vulnerabilities for the Week of October 22, 2018.

  • Vulnerability in GEOVAP's Equipment (25 Oct 2018)

    Cross-site Scripting vulnerability has been discovered in GEOVAP's Equipment- Reliance 4 SCADA/HMI. Successful exploitation of this vulnerability could allow an unauthenticated attacker to use HTTP proxy to inject arbitrary Javascript in a specially crafted HTTP request that may reflect it back in the HTTP response.

  • Multiple vulnerabilities in Advantech's Equipment (25 Oct 2018)

    Multiple vulnerabilities such as Improper Access Control, Stack-based Buffer Overflow have been discovered in Advantech's Equipment- WebAccess. Successful exploitation of these vulnerabilities could allow for arbitrary remote code execution.

  • Vulnerability in Telecrane's Equipment (23 Oct 2018)

    Authentication Bypass by Capture-Replay vulnerability has been discovered in Telecrane's Equipment- F25 Series. Successful exploitation of this vulnerability could allow unauthorized users to view commands, replay commands, control the device, or stop the device from running.

  • Multiple vulnerabilities in GAIN Electronic's Equipment (23 Oct 2018)

    Multiple vulnerabilities such as Authentication Bypass by Capture-replay, Improper Access Control, Improper Authentication have been discovered in GAIN Electronic's Equipment- SAGA1-L series. Successful exploitation of these vulnerabilities could allow remote code execution and potentially delete the product's firmware.

  • Multiple vulnerabilities in Advantech's Equipment (23 Oct 2018)

    Multiple vulnerabilities such as Stack-based Buffer Overflow, External Control of File Name or Path, Improper Privilege Management, Path Traversal have been discovered in Advantech's Equipment- WebAccess. Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, access files and perform actions at a privileged level, or delete files on the system.

  • Multiple vulnerabilities in Omron's Equipment (17 Oct 2018)

    Multiple vulnerabilities such as Improper Restriction of Operations within the Bounds of a Memory Buffer, Out-Of-Bounds Read, Use-After-Free, Incorrect Type Conversion or Cast vulnerabilities have been discovered in Omron's Equipment- CX-Supervisor. Successful exploitation of these vulnerabilities could allow an attacker to execute code under the context of the application, corrupt objects, and force the application to read a value outside of an array.

  • Multiple vulnerabilities in LCDS' Equipment (16 Oct 2018)

    Multiple vulnerabilities such as Untrusted Pointer Dereference, Out-of-Bounds Read, Integer Overflow to Buffer Overflow, Path Traversal, Out-of-bounds Write, and Stack-based Buffer Overflow vulnerabilities have been discovered in LCDS' Equipment- LAquis SCADA. Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, crash the system, or write controlled content to the target system.

  • Vulnerability Summary (15 Oct 2018)

    Summary of vulnerabilities for the Week of October 08, 2018.

  • Multiple vulnerabilities in Delta Electronics' Equipment (11 Oct 2018)

    Multiple vulnerabilities such as Out-of-bounds Write, Stack-based Buffer Overflow vulnerabilities have been discovered in Delta Electronics' Equipment- Delta Industrial Automation TPEditor. Successful exploitation of these vulnerabilities could crash the accessed device, resulting in a buffer overflow condition that may allow remote code execution.

  • Multiple vulnerabilities in NUUO's CMS Equipment (11 Oct 2018)

    Multiple vulnerabilities such as Use of Insufficiently Random Values, Use of Obsolete Function, Incorrect Permission Assignment for Critical Resource, Use of Hard-coded Credentials vulnerabilities have been discovered in NUUO's Equipment- CMS. Successful exploitation of theses vulnerabilities could result in arbitrary remote code execution.

  • Multiple vulnerabilities in NUUO's Equipment (11 Oct 2018)

    Multiple vulnerabilities such as Stack-based Buffer Overflow, Leftover Debug Code vulnerabilities have been discovered in NUUO's Equipment- NVRmini2, NVRsolo. Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution and user account modification.

  • Vulnerability in GE's Equipment (09 Oct 2018)

    Unsafe ActiveX Control Marked Safe For Scripting vulnerability has been discovered in GE's Equipment- Gigasoft component of iFix. Successful exploitation of this vulnerability could cause a buffer overflow condition.

  • Vulnerability in Siemens' Equipment (09 Oct 2018)

    Cryptographic issues has been discovered in Siemens' Equipment- SCALANCE W1750D. Successful exploitation of this vulnerability could allow an attacker to decrypt TLS traffic.

  • Multiple vulnerabilities in Hangzhou's Equipment (09 Oct 2018)

    Multiple vulnerabilities such as Predictable From Observable State, Hidden Functionality, Missing Encryption of Sensitive Data have been discovered in Hangzhou's Equipment- XMeye P2P Cloud Server. Successful exploitation of these vulnerabilities could allow unauthorized access to video feeds with the potential to modify settings, replace firmware, and/or execute code.

  • Vulnerability in Siemens' Equipment (09 Oct 2018)

    Denial of Service from improper input validation vulnerability has been discovered in Siemens' Equipment- SIMATIC S7-1500, SIMATIC S7-1500 Software Controller and SIMATIC ET 200SP Open Controller. An attacker with network access to the PLC may be able to cause a denial-of-service condition on the network stack.

  • Vulnerabilities in Fuji Electric's Equipment (09 Oct 2018)

    Uncontrolled Search Path Element vulnerability has been discovered in Fuji Electric's Equipment- Fuji Electric Energy Savings Estimator. Successful exploitation of this vulnerability may allow an attacker to load a malicious DLL and execute code on the affected system with the same privileges as the application that loaded the malicious DLL.

  • Vulnerability in Siemens' Equipment (09 Oct 2018)

    CSRF vulnerability has been discovered in Siemens' Equipment- SIMATIC S7-1200 CPU Family Version 4. Successful exploitation of this vulnerability could allow a CSRF attack if an unsuspecting user is tricked into accessing a malicious link.

  • Vulnerability in Siemens' Equipment (09 Oct 2018)

    Improper Privilege Management vulnerability has been discovered in Siemens' Equipment- ROX II. Successful exploitation of these vulnerabilities could allow valid users to escalate their privileges and execute arbitrary commands.

  • Vulnerability Summary (08 Oct 2018)

    Summary of vulnerabilities for the Week of October 01, 2018.

  • Multiple vulnerabilities in WECON's Equipment (04 Oct 2018)

    Multiple vulnerabilities such as Stack-based Buffer Overflow, Out-of-Bounds Write, Information Exposure Through XML External Entity Reference, Out-of-Bounds Read have been discovered in WECON's Equipment- PI Studio. Successful exploitation of these vulnerabilities may allow remote code execution, execution of code in the context of an administrator, read past the end of an allocated object or allow an attacker to disclose sensitive information under the context of administrator.

  • Vulnerability in Change Healthcare's Equipment (04 Oct 2018)

    Information Exposure Through an Error Message vulnerability has been discovered in Change Healthcare's Equipment- PeerVue Web Server. Successful exploitation of this vulnerability could allow an attacker to obtain technical information about the PeerVue Web Server, allowing an attacker to target a system for attack.

  • Vulnerability in Carestream's Equipment (04 Oct 2018)

    Information Exposure Through an Error Message vulnerability has been discovered in Carestream's Equipment- Carestream Vue RIS. An attacker with access to the network of the affected system can passively read traffic.

  • Vulnerability in Entes' Equipment (02 Oct 2018)

    Multiple vulnerabilities such as Improper Authentication, Information Exposure Through Query Strings in GET Request have been discovered in Delta Electronics' Equipment- EMG 12. Successful exploitation of these vulnerabilities may allow attackers to gain unauthorized access and could allow the ability to change device configuration and settings.

  • Vulnerability in GE's Equipment (02 Oct 2018)

    Heap-based Buffer Overflow vulnerability has been discovered in GE's Equipment- Communicator. Exploitation could allow attackers to execute arbitrary code or create a denial-of-service condition.

  • Vulnerability in Delta Electronics' Equipment (02 Oct 2018)

    Stack-based Buffer Overflow vulnerability has been discovered in Delta Electronics' Equipment- ISPSoft. Successful exploitation of this vulnerability could allow an attacker to execute code under the context of the application.

  • Vulnerability Summary (01 Oct 2018)

    Summary of vulnerabilities for the Week of September 24, 2018.

  • Multiple vulnerabilities in Fuji Electric's Equipment (27 Sep 2018)

    Multiple vulnerabilities such as Buffer Over-read, Out-of-Bounds Read, Stack-based Buffer Overflow have been discovered in Fuji Electric's Equipment- FRENIC Loader, FRENIC-Mini (C1), FRENIC-Mini (C2), FRENIC-Eco, FRENIC-Multi, FRENIC-MEGA, FRENIC-Ace. Successful exploitation of these vulnerabilities could allow for arbitrary remote code execution affecting the availability of the device.

  • Vulnerability in Delta Electronics' Equipment (27 Sep 2018)

    Out-of-Bounds Read vulnerability has been discovered in Delta Electronics' Equipment- Delta Industrial Automation PMSoft. Successful exploitation of this vulnerability could allow an attacker to read confidential information.

  • Multiple vulnerabilities in Fuji Electric's Alpha5 Smart Loader Equipment (27 Sep 2018)

    Multiple vulnerabilities such as Classic Buffer Overflow, Heap-based Buffer Overflow have been discovered in Fuji Electric's Equipment- Alpha5 Smart Loader. Successful exploitation of these vulnerabilities could allow for arbitrary remote code execution on the device.

  • Multiple vulnerabilities in Emerson's Equipment (27 Sep 2018)

    Stack-based Buffer Overflow vulnerability has been discovered in Emerson's Equipment- AMS Device Manager. Successful exploitation of these vulnerabilities could allow arbitrary remote code execution and malware injection.

  • Vulnerability Summary (24 Sep 2018)

    Summary of vulnerabilities for the Week of September 17, 2018.

  • Vulnerability in Rockwell Automation's Equipment (20 Sep 2018)

    Multiple vulnerabilities such as Stack-based Buffer Overflow, Heap-based Buffer Overflow, Resource Exhaustion have been discovered in Rockwell Automation's Equipment- RSLinx Classic. Successful exploitation of these vulnerabilities could crash the device being accessed or allow arbitrary code execution on the device.

  • Vulnerability in Tec4Data's Equipment (20Sep 2018)

    Missing Authentication for Critical Function vulnerability has been discovered in Tec4Data's Equipment- SmartCooler. Successful exploitation of this vulnerability could cause the device to shut down by exploiting missing authentication for a critical function.

  • Vulnerability in WECON's Equipment (18 Sep 2018)

    Stack-based Buffer Overflow vulnerability has been discovered in WECON's Equipment- PLC Editor. Successful exploitation of this vulnerability could result in unauthorized code execution within the current process.

  • Vulnerability Summary (17 Sep 2018)

    Summary of vulnerabilities for the Week of September 10, 2018.

  • Vulnerability in Honeywell's Equipment (13 Sep 2018)

    Improper Privilege Management vulnerability has been discovered in Honeywell's Equipment- Mobile Computers. A vulnerability in a system service on CT60, CN80, CT40, CK75, CN75, CT50, D75e, CN51, and EDA series mobile computers running the Android Operating System (OS) could allow a malicious third-party application to gain elevated privileges.

  • Multiple vulnerabilities in Fuji Electric's Equipment (11 Sep 2018)

    Multiple vulnerabilities such as Use-After Free, Untrusted Pointer Dereference, Heap-based Buffer Overflow, Out-of-Bounds Write, Integer Underflow, Out-of-Bounds Read, and Stack-based Buffer Overflow have been discovered in Fuji Electric's Equipment- V-Server. Successful exploitation of these vulnerabilities could allow for remote code execution on the device, causing a denial of service condition or information exposure.

  • Vulnerability in Fuji Electric's V-Server Lite Equipment (11 Sep 2018)

    Classic Buffer Overflow vulnerability has been discovered in Fuji Electric's V-Server Lite Equipment. Successful exploitation of this vulnerability could allow a remote attacker to view sensitive information and disrupt the availability of the device.

  • Vulnerability in Siemens' SCALANCE X Switches Equipment (11 Sep 2018)

    Improper Input Validation vulnerability has been discovered in Siemens' SCALANCE X Switches Equipment. Successful exploitation of this vulnerability could allow an attacker with network access to the device to cause a denial-of-service condition.

  • Vulnerability in Siemens' SIMATIC WinCC OA Equipment (11 Sep 2018)

    Improper Access Control vulnerability has been discovered in Siemens' SIMATIC WinCC OA Equipment. Successful exploitation of this vulnerability could allow an unauthenticated remote user to escalate their privileges in the context of the program.

  • Vulnerability in Siemens' TD Keypad Designer Equipment (11 Sep 2018)

    Uncontrolled Search Path Element vulnerability has been discovered in Siemens' TD Keypad Designer Equipment. Successful exploitation of this vulnerability could allow a local low-privileged attacker to escalate their privileges.

  • Vulnerability Summary (10 Sep 2018)

    Summary of vulnerabilities for the Week of September 3, 2018.

  • Multiple vulnerabilities in Ice Qube's Equipment (06 Sep 2018)

    Multiple vulnerabilities such as Improper Authentication, Unprotected Storage of Credentials have been discovered in Ice Qube's Equipment- Thermal Management Center. Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access to configuration files or obtain sensitive information.

  • Vulnerability in Opto22's Equipment (04 Sep 2018)

    Stack-based Buffer Overflow vulnerability has been discovered in Opto22's Equipment- PAC Control Basic and PAC Control Professional. Successful exploitation of this vulnerability could crash the device being accessed, and a buffer overflow condition may then allow remote code execution.

  • Vulnerability Summary (03 Sep 2018)

    Summary of vulnerabilities for the Week of August 27, 2018.

  • Multiple vulnerabilities in Philips' Equipment (30 Aug 2018)

    Multiple vulnerabilities such as Improper Input Validation, Cross-site Scripting, Information Exposure, Incorrect Default Permissions, Cleartext Transmission of Sensitive Information, Cross-site Request Forgery, Session Fixation, Resource Exhaustion, Use of Hard-coded Credentials have been discovered in Philips' Equipment- Philips e-Alert Unit. Successful exploitation from an attacker within the same subnet may impact or compromise user contact details, unit integrity, and/or unit availability.

  • Vulnerability in Qualcomm Life's Equipment (28 Aug 2018)

    Code Weakness vulnerability has been discovered in Qualcomm Life's Equipment- Capsule Datacaptor Terminal Server (DTS). Successful exploitation of this vulnerability could allow an attacker to execute unauthorized code to obtain administrator-level privileges on the device.

  • Vulnerability in Schneider Electric's Equipment (28 Aug 2018)

    Cross-site Scripting vulnerability has been discovered in Schneider Electric's Equipment- PowerLogic PM5560. Successful exploitation of this vulnerability could allow user input to be manipulated, allowing for remote code execution.

  • Vulnerability in ABB's eSOMS Equipment (28 Aug 2018)

    Improper Authentication vulnerability has been discovered in ABB's eSOMS Equipment. Successful exploitation of this vulnerability requires an attacker to discover a valid user account, which could be used to gain access to the application without authentication.

  • Vulnerability Summary (27 Aug 2018)

    Summary of vulnerabilities for the Week of August 20, 2018.

  • Vulnerability in BD's Equipment (23 Aug 2018)

    Improper Authentication vulnerability has been discovered in BD's Equipment- Alaris GS, Alaris GH, Alaris CC, Alaris TIVA. Successful exploitation of this vulnerability may allow a remote attacker to gain unauthorized access to various Alaris Syringe pumps and impact the intended operation of the pump when it is connected to a terminal server via the serial port.

  • Vulnerability in Philips's Equipment (21 Aug 2018)

    Resource Exhaustion vulnerability has been discovered in Philips's Equipment- Philips IntelliVue Information Center iX. Successful exploitation of this vulnerability may result in a denial of service, the operating system will become unresponsive due to the network attack, which will affect the applications ability to meet the intended use.

  • Vulnerability in Yokogawa's Equipment (21 Aug 2018)

    Stack-based Buffer Overflow vulnerability has been discovered in Yokogawa's Equipment- iDefine, STARDOM, ASTPLANNER, and TriFellows. Successful exploitation of this vulnerability may allow arbitrary code execution, or the stopping of the license management function.

  • Multiple vulnerabilities in Philips' Equipment (16 Aug 2018)

    Multiple vulnerabilities such as Improper Input Validation, Use of Hard Coded Credentials have been discovered in Philips' Equipment- PageWriter TC10, TC20, TC30, TC50, TC70 Cardiographs. Successful exploitation of these vulnerabilities could allow buffer overflows, or allow an attacker to access and modify settings on the device.

  • Multiple vulnerabilities in Emerson's Equipment (16 Aug 2018)

    Multiple vulnerabilities such as Uncontrolled Search Path Element, Relative Path Traversal, Improper Privilege Management, Stack-Based Buffer Overflow have been discovered in Emerson's Equipment- DeltaV DCS Workstations. Successful exploitation of these vulnerabilities could allow arbitrary code execution, malware injection, or malware to spread to other workstations.

  • Multiple vulnerabilities in Tridium's Equipment (16 Aug 2018)

    Multiple vulnerabilities such as Path Traversal, Improper Authentication have been discovered in Tridium's Equipment- Niagara. Successful exploitation of these vulnerabilities could crash the device being accessed; a buffer overflow condition may allow remote code execution.

  • Multiple vulnerabilities in Philips' Equipment (14 Aug 2018)

    Multiple vulnerabilities such as Improper Privilege Management, Unquoted Search Path or Element have been discovered in Philips' Equipment- Philips’ IntelliSpace Cardiovascular (ISCV) products. Successful exploitation of these vulnerabilities could allow an attacker with local access and users privileges to the ISCV/Xcelera server to escalate privileges on the ISCV/Xcelera server and execute arbitrary code.

  • Vulnerability in Siemens' SIMATIC STEP 7 (TIA Portal) and SIMATIC WinCC (TIA Portal) Equipment (14 Aug 2018)

    Incorrect Default Permissions vulnerability has been discovered in Siemens' Equipment. Successful exploitation of these vulnerabilities may allow an attacker with local file write access to manipulate files and cause a denial-of-service-condition, or execute code both on the manipulated installation as well as devices configured using the manipulated installation.

  • Vulnerability in Siemens' Industrial Products Equipment (14 Aug 2018)

    Cleartext Transmission of Sensitive Information vulnerability has been discovered in Siemens' Industrial Products Equipment. Successful exploitation of this vulnerability could result in unencrypted data being transmitted by the SSL/TLS record layer.

  • Multiple vulnerabilities in Siemens' Equipment (14 Aug 2018)

    Multiple vulnerabilities such as Relative Path Traversal, Improper Input Validation have been discovered in Siemens' Equipment- Automation License Manager. Successful exploitation of these vulnerabilities could allow remote code execution or allow an attacker to determine port status on another remote system.

  • Multiple vulnerabilities in Crestron's Equipment (09 Aug 2018)

    Multiple vulnerabilities such as OS Command Injections, Improper Access Control, Insufficiently Protected Credentials have been discovered in Crestron's Equipment- TSW-X60 and MC3. Successful exploitation of these vulnerabilities may allow remote code execution with escalated system privileges.

  • Multiple vulnerabilities in NetComm Wireless' Equipment (09 Aug 2018)

    Multiple vulnerabilities such as Information Exposure, Cross-site Request Forgery, Cross-site Scripting, Information Exposure through Directory Listing have been discovered in NetComm Wireless' Equipment- 4G LTE Light Industrial M2M Router. Successful exploitation of these vulnerabilities could allow for the exposure of sensitive information.

  • Multiple vulnerabilities in Medtronic's Equipment (07 Aug 2018)

    Multiple vulnerabilities such as Insufficient Verification of Data Authenticity, Storing Passwords in a Recoverable Format have been discovered in Medtronic's Equipment- MyCareLink Patient Monitor. Successful exploitation of these vulnerabilities may allow an attacker with physical access to obtain per-product credentials that are utilized to authenticate data uploads and encrypt data at rest.

  • Multiple vulnerabilities in Delta Electronics' Equipment (07 Aug 2018)

    Multiple vulnerabilities such as Stack-based Buffer Overflow, Out-of-Bounds Read have been discovered in Delta Electronics' Equipment- CNCSoft and ScreenEditor. Successful exploitation of these vulnerabilities could allow an attacker to gain remote code execution with administrator privileges.

  • Multiple vulnerabilities in WECON's Equipment (31 July 2018)

    Multiple vulnerabilities such as Stack-based Buffer Overflow, Heap-based Buffer Overflow have been discovered in WECON's Equipment- LeviStudioU. Successful exploitation of these vulnerabilities could allow an attacker to execute remote code.

  • Vulnerability in Johnson Controls' Equipment (31 July 2018)

    Information Exposure Through an Error Message vulnerability has been discovered in Johnson Controls' Equipment- Metasys and BCPro. Successful exploitation of this vulnerability could allow an attacker to obtain technical information about the Metasys or BCPro server, allowing an attacker to target a system for attack.

  • Vulnerability in Davolink's Equipment (31 July 2018)

    Use of Password Hash With Insufficient Computational Effort vulnerability has been discovered in Davolink's Equipment- DVW-3200N. Successful exploitation of this vulnerability may result in a remote attacker obtaining the password to the device.

  • Vulnerability in AVEVA's Equipment (19 July 2018)

    Stack-based Buffer Overflow vulnerability has been discovered in AVEVA's Equipment- InduSoft Web Studio and InTouch Machine Edition. The listed products are vulnerable only if the TCP/IP Server Task is enabled. A remote attacker could send a carefully crafted packet during a tag, alarm, or event related action such as read and write, which may allow remote code execution.

  • Multiple vulnerabilities in Echelon's Equipment (19 July 2018)

    Multiple vulnerabilities such as Information Exposure, Authentication Bypass Using an Alternate Path or Channel, Unprotected Storage of Credentials, Cleartext Transmission of Sensitive Information have been discovered in Echelon's Equipment- SmartServer 1, SmartServer 2, i.LON 100, i.LON 600. Successful exploitation of these vulnerabilities could allow for remote code execution on the device.

  • Vulnerability in Moxa's Equipment (19 July 2018)

    Resource Exhaustion vulnerability has been discovered in Moxa's Equipment- NPort 5210, 5230, 5232. Successful exploitation of this vulnerability could allow a remote attacker to send TCP SYN packages, causing a resource exhaustion condition that would cause the device to become unavailable.

  • Vulnerability in ABB's Equipment (17 July 2018)

    Improper Input Validation has been discovered in ABB's Equipment- Panel Builder 800. An attacker could exploit the vulnerability by tricking a user to open a specially crafted file, allowing the attacker to insert and run arbitrary code. This vulnerability requires user interaction, and the exploit is only triggered when a local user runs the affected product and loads the specially crafted file.

  • Multiple vulnerabilities in WAGO's Equipment (17 July 2018)

    Multiple vulnerabilities such as Cross-site Scripting, Unrestricted Upload of File with Dangerous Type, and Incorrect Permissions for Critical Resource have been discovered in WAGO's Equipment- e!DISPLAY Web-Based-Management (WBM). Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the user, execute code within the user’s browser, place malicious files within the filesystem, and replace existing files to allow privilege escalation.

  • Vulnerability in VisuNet RM, VisuNet PC, Box Thin Client(BTC) (17 July 2018)

    Improper Authentication vulnerability has been discovered in VisuNet RM, VisuNet PC, Box Thin Client (BTC). Successful exploitation of this vulnerability could allow attackers to intercept sensitive communications, establish a man-in-the-middle attack, achieve administrator privileges, and execute remote code.

  • Vulnerability in Eaton's Equipment (12 July 2018)

    Stack-based Buffer Overflow vulnerability has been discovered in Eaton's Equipment- 9000X Drive. Successful exploitation of this vulnerability may allow remote code execution.

  • Multiple vulnerabilities in SEL's Equipment (10 July 2018)

    Multiple vulnerabilities such as Incorrect Default Permissions, XXE, Resource Exhaustion have been discovered in SEL's Equipment- Compass and AcSELerator Architect. Successful exploitation of these vulnerabilities could allow modification/replacement of files within the Compass installation directory, disclosure of information, or denial of service.

  • Multiple vulnerabilities in Universal Robots' Equipment (10 July 2018)

    Multiple vulnerabilities such as Use of Hard-coded Credentials, Missing Authentication for Critical Function have been discovered in Universal Robots' Equipment- Robot Controllers. Successful exploitation of these vulnerabilities could allow a remote attacker to run arbitrary code on the device.

  • Cyber Security Advisory on Trickbot (11 July 2018)

    Cyber Security Advisory on Trickbot Malware, a variant of Dridex which is distributed through email campaign.

  • Advisories and Patches for June 2018 (05 July 2018)

    A consolidated list of various Advisories and Patches released during the month of June 2018.

  • Multiple vulnerabilities in Rockwell Automation 's Equipment (03 July 2018)

    Improper Input Validation, Improper Certificate Validation and Resource Management Errors vulnerabilities have been discovered in Rockwell Automation 's Equipment- Allen-Bradley Stratix 5950. Successful exploitation of these vulnerabilities could allow an attacker to bypass client certification to create connections to the affected device or cause the device to crash.

  • Multiple vulnerabilities in Delta Industrial Automation DOPSoft Equipment (31 May 2018)

    Multiple vulnerabilities such as Out-of-bounds Read, Heap-based Buffer Overflow, Stack-based Buffer Overflow have been discovered in Delta Electronics' Equipment- Delta Industrial Automation DOPSoft. Successful exploitation of these vulnerabilities could allow a remote attacker to read sensitive information, execute arbitrary code, and/or crash the application.

  • Multiple vulnerabilities in GE's Equipment (31 May 2018)

    Multiple vulnerabilities such as Improper Authentication, Improper Restriction of XML External Entity Reference, Relative Path Traversal have been discovered in GE's Equipment- MDS PulseNET and MDS PulseNET Enterprise. Exploitation of these vulnerabilities may allow elevation of privilege and exfiltration of information on the host platform.

  • Vulnerability in Yokogawa's Equipment (31 May 2018)

    Hard-coded Credentials vulnerability has been discovered in Yokogawa's Equipment- STARDOM Controllers. Successful exploitation of this vulnerability could allow an attacker to gain access to the affected device, which could result in remote code execution.

  • Multiple vulnerabilities in BeaconMedaes Equipment (24 May 2018)

    Multiple vulnerabilities such as Improper Access Control, Insufficiently Protected Credentials and Unprotected Storage of Credentials have been discovered in BeaconMedaes Equipment- TotalAlert Scroll Medical Air Systems web application. Successful exploitation of these vulnerabilities could allow an attacker to view and potentially modify some device information and web application setup information.

  • Multiple vulnerabilities in Schneider Electric's Equipment (24 May 2018)

    Multiple vulnerabilities such as Heap-based Buffer Overflow, Improper Restriction of Operations within the Bounds of a Memory Buffer and Open Redirect have been discovered in Schneider Electric's Equipment- Floating License Manager. Successful exploitation of these vulnerabilities could cause a denial of service, allow arbitrary execution of code with system level privileges, or send users to arbitrary websites.

  • VPNFilter Malware (23 May 2018)

  • Darkhotel IOC (22 May 2018)

  • Vulnerability in BD Kiestra and InoqulA systems (22 May 2018)

    Product UI does not Warn User of Unsafe Actions vulnerability has been discovered in BD Kiestra and InoqulA systems. Successful exploitation of this vulnerabiliy may lead to loss or corruption of data.

  • Multiple vulnerabilities in Martem's Equipment (22 May 2018)

    Multiple vulnerabilities such as Missing Authentication for Critical Function, Resource Exhaustion and Cross-Site Scripting have been discovered in Martem's TELEM-GW6/GWM. Successful exploitation of these vulnerabilities could allow execution of unauthorized industrial process control commands, denial of service, or client-side code execution.

  • Vulnerability in Medtronic Equipment (17 May 2018)

    Missing Encryption of Sensitive Data vulnerability has been discovered in Medtronic N'Vision Clinician Programmer. Successful exploitation of this vulnerability may allow an attacker with physical access to an 8870 N’Vision Compact Flash card to access information.

  • Improper Input Validation vulnerability in GE Equipments (17 May 2018)

    Vulnerability in PACSystems CPE305/310, CPE330, CPE400, RSTi-EP CPE 100, CPU320/CRU320, RXi has been discovered. Successful exploitation of this vulnerability could cause the device to reboot and change its state, causing the device to become unavailable.

  • Multiple vulnerabilities in PHOENIX CONTACT's Equipment (17 May 2018)

    Multiple vulnerabilities such as Command Injection, Information Exposure, Stack-based Buffer Overflow have been discovered in PHOENIX CONTACT's FL SWITCH 3xxx/4xxx/48xx Series. Successful exploitation of these vulnerabilities could allow for remote code execution and information disclosure.

  • Vulnerability in Siemens' Equipment (17 May 2018)

    Improper Input Validation vulnerability has been discovered in Siemens' SINAMIC S7-400 CPU. Successful exploitation of this vulnerability could cause a denial-of-service condition of the CPU. The CPU will remain in DEFECT mode until a manual restart is performed.

  • Vulnerability in Delta Electronics' Equipment (17 May 2018)

    Heap-based Buffer Overflow vulnerability has been discovered in Delta Electronics' Equipment - Delta Industrial Automation TPEditor. Successful exploitation of this vulnerability could crash the accessed device, resulting in a buffer overflow condition that may allow remote code execution.

  • Multiple vulnerabilities in Advantech's WebAccess (15 May 2018)

    Multiple vulnerabilities such as SQL Injection, Improper Authorization, Path Traversal, Heap-based Buffer Overflow, Stack-based Buffer Overflow, Untrusted Pointer Dereference, Improper Privilege Management, and External Control of File Name or Path have been discovered in Advantech's WebAccess. Successful exploitation of these vulnerabilities could allow an attacker to disclose sensitive information from the host and/or target, execute arbitrary code, or delete files.

  • Multiple vulnerabilities in Philips Brilliance Computed Tomography (CT) System (03 May 2018)

    Multiple vulnerabilities such as Execution with Unnecessary Privileges, Exposure of Resource to Wrong Sphere and Use of Hard-coded Credentials have been discovered in Philips Brilliance CT Scanners. Successful exploitation of these vulnerabilities may allow an attacker to attain elevated privileges and access unauthorized system resources, including access to execute software or to view/update files including patient health information (PHI), directories, or system configuration.

  • Multiple vulnerabilities in Lantech IDS 2102 (03 May 2018)

    Multiple vulnerabilities such as Improper Input Validation and Stack-based Buffer Overflow have been discovered in Lantech IDS 2102. Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code on the system through crafting malicious input.