Today we look at three vendor disclosures from Siemens (2) and Schneider. There are also six vendor updates from Siemens (5) and Schneider.
Siemens Advisories
This advisory describes four vulnerabilities in the DNS modules of their Nucleus products. These are the NAME:WRECK DNS vulnerabilities. Siemens has updates that mitigate the vulnerabilities in some of the affected products.
The four reported vulnerabilities are:
• Improper null termination - CVE-2020-27736,
• Out-of-bounds read - CVE-2020-27737,
• Access of memory location after
end of buffer - CVE-2020-27738, and
• Use of insufficiently random
variables - CVE-2021-25677
This advisory describes a use of hard-coded cryptographic key vulnerability in their Smartclient installer. Siemens has provides workarounds to mitigate the vulnerability.
Schneider Advisory
This advisory discusses two Windows® vulnerabilities in their s NTZ Mekhanotronika Rus. LLC control panels. Schneider provides links to two Microsoft updates that mitigate the vulnerabilities.
The two reported vulnerabilities are:
• Windows NTLM tampering
vulnerability - CVE-2019-1040, and
• Win32k elevation of privilege vulnerability - : CVE-2019-0803
Siemens Updates
This update provides additional details on their GNU/Linux subsystem advisory that was originally published in 2018 and most recently updated on March 9th, 2021. The new information includes adding:
• CVE-2017-12424,
• CVE-2017-20002,
• CVE-2020-14871 (exploit),
• CVE-2021-3428,
• CVE-2021-3450,
• CVE-2021-27219, and
• CVE-2021-28153
NOTE: NCCIC-ICS does not cover this advisory.
This update provides additional details on their CodeMeter advisory that was originally published in 2018 and most recently updated on March 9th, 2021. The new information includes updating the solution for:
• PSS CAPE, and
• SIMIT
NOTE: NCCIC-ICS does not update their CodeMeter
advisory for changes in vendor advisories since the NCCIC-ICS advisory
links to the latest version of the vendor advisory.
This update provides additional details on their DNSpooq advisory that was originally published on January 19th, 2021 and most recently updated on March 9th, 2021. The new information includes adding solutions for:
• SCALANCE M-800/S615, and
• RUGGEDCOM RM1224
NOTE: NCCIC-ICS does not update their DNSSpooq advisory
for changes in vendor advisories since the NCCIC-ICS advisory links to the
latest version of the vendor advisory.
This update provides additional details on the Solid Edge advisory that was originally published on March 9th, 2021. The new information includes:
• Adding fix information for two of
the vulnerabilities, and
• Adding a reference to SSA-574442.
NOTE: NCCIC-ICS should have updated their advisory.
This update provides additional details on their SiNVR/SiVMS Video Server advisory that was originally published on March 10th, 2020. The new information includes:
• Adding a partial solution for
SiNVR/SiVMS Video Server, and
• Removing information for Control Center Server (CCS), which is now addressed in SSA-761844
NOTE: NCCIC-ICS should have updated their advisory.
Schneider Update
This update
provides additional information on their Ripple20 advisory that was originally
published on June 23, 2020 and most
recently updated on March 9th, 2021. The new information
includes adding remediation for Acti9 PowerTag Link C.
No comments:
Post a Comment