This is another busy week necessitating two-part coverage. In part 1 this week we have nineteen vendor disclosures from ABB, Bender, Bosch, Braun (2), DrayTek, Eaton (5), HPE, Meile, PEPPERL+FUCHS, Philips (2), and Pilz (3).
ABB Advisory - ABB published an
advisory discussing six vulnerabilities in their AC 500 PLCs.
Bender Advisory - CERT-VDE published an advisory describing
seven vulnerabilities in the Bender/ebee Charge Controller products.
Bosch Advisory - Bosch published an
advisory discussing an infinite loop vulnerability in their FL MGUARD and
TC MGUARD safety devices.
Braun Advisory #1 - Braun published an
advisory discussing the NAME:WRECK
vulnerabilities.
Braun Advisory #2 - Braun published an
advisory discussing the Amnesia:33 vulnerabilities.
DrayTek Advisory - DrayTek published an
advisory discussing an infinite loop vulnerability in their Vigor routers.
Eaton Advisory #1 - Eaton published an
advisory discussing TLStorm vulnerabilities
and the Havex
trojan as being used by the Berserk Bear APT group against UPS systems.
Eaton Advisory #2 - Eaton published an
advisory discussing the SpringShell vulnerabilities.
Eaton Advisory #3 - Eaton published an
advisory discussing sixteen vulnerabilities (six with known exploits) in
their Form 7 recloser control. These are third-party (CODESYS) vulnerabilities.
Eaton Advisory #4 – Eaton published an
advisory discussing the INCONTROLLER ICS
attack tools.
Eaton Advisory #5 - Eaton published an
advisory discussing the TLStorm vulnerabilities.
HPE Advisory - HPE published an
advisory discussing three vulnerabilities (one with known exploits) in
their SimpliVity Omnistack for Hyper-V.
Meile Advisory - CERT-VDE published an advisory describing
an improper privilege management vulnerability (with publicly available exploit)
in their Benchmark Programming Tool.
PEPPERL+FUCHS Advisory - CERT-VDE published an advisory
discussing a remote code execution vulnerability in VisuNet devices from
PEPPERL+FUCHS.
Philips Advisory #1 - Philips published an advisory
discussing a remote code execution vulnerability.
Philips Advisory #2 - Philips published an advisory
discussing a denial of service vulnerability.
Pilz Advisory #1 - CERT-VDE published an advisory discussing
ten vulnerabilities (one with publicly available exploit) in the Pilz PMC
programming tool.
Pilz Advisory #2 - CERT-VDE published an advisory discussing
27 vulnerabilities (nine with publicly available exploits) in the Pilz PMC
programming tool.
Pilz Advisory #3 - CERT-VDE published an advisory discussing
18 vulnerabilities (four with publicly available exploits) in motion controller
products from Pilz.
For more details on these advisories, including links to 3rd
party advisories and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-4-bda
- subscription required.
No comments:
Post a Comment