Today, CISA’s NCCIC-ICS published 25 control system security advisories for products from Rockwell Automation (8), AutomationDirect, and Siemens (16).
Advisories
Rockwell Advisory #1 -
This advisory
describes an externally controlled reference to a resource in another sphere vulnerability
in the Rockwell Thin Manager.
Rockwell Advisory #2 -
This advisory
describes two vulnerabilities in the Rockwell Pavilion8 model predictive
control software.
Rockwell Advisory #3 -
This advisory
describes a command injection vulnerability in the Rockwell Factory Talk
products.
Rockwell Advisory #4 -
This advisory
describes an improper authentication vulnerability in the Rockwell FactoryTalk
Batch View manufacturing process batch solution.
Rockwell Advisory #5 -
This advisory
describes an improper input validation vulnerability in the Rockwell 5015-U8IHFT
I/O module.
Rockwell Advisory #6 -
This advisory
discusses two vulnerabilities (one with a publicly available exploit) in the
Rockwell AADvance Trusted SIS Workstation.
Rockwell Advisory #7 -
This advisory
describes an improper privilege management vulnerability in the Rockwell OptixPanel
product.
Rockwell Advisory #8 This
advisory
describes an improper input validation vulnerability in multiple Rockwell controllers.
AutomationDirect Advisory
- This advisory
describes two vulnerabilities in the AutomationDirect DirectLogic H2-DM1E, a
programmable logic controller.
SICAM Advisory - This
advisory
discusses a classic buffer overflow vulnerability in the Siemens SICAM and
SITIPE products.
Industrial Products
Advisory #1 - This advisory
discusses the regreSSHion vulnerability
in the Siemens Industrial Products.
Industrial Products
Advisory #2 - This advisory
discusses an input validation vulnerability in multiple Siemens Industrial
Products.
SIMATIC Advisory #1 -
This advisory
describes an execution with unnecessary privilege vulnerability in the Siemens SIMATIC
SCADA and PCS 7 Systems products.
SIMATIC Advisory #2 -
This advisory
describes three NULL pointer dereference vulnerabilities in the Siemens SIMATIC,
SIPLUS, and TIM products.
SIMATIC Advisory #3 -
This advisory
describes six vulnerabilities in the Siemens SIMATIC RFID Readers.
SCALANCE Advisory -
This advisory
describes an injection vulnerability in the Siemens SCALANCE W700.
Tecnomatix Advisory -
This advisory
describes a stack-based buffer overflow vulnerability in the Siemens Tecnomatix
Plant Simulation product.
Industrial Edge
Advisory - This advisory
describes an authorization bypass through a user controlled key vulnerability
in the Siemens Industrial Edge Management products.
Sinema Advisory -
This advisory
describes seven vulnerabilities in the Siemens SINEMA Remote Connect Client.
Automation License
Advisory - This advisory
describes an integer overflow or wrap around vulnerability in the Siemens Automation
License Manager.
Mendix Advisory -
This advisory
describes an observable response discrepancy vulnerability in the Siemens Mendix
Runtime product.
SINUMERIK Advisory #1
- This advisory
describes an insertion of sensitive information into log file vulnerability for
the Siemens SINUMERIK systems.
SINUMERIK Advisory #2
- This advisory
describes an incorrect permission assignment for critical resource vulnerability
for the Siemens SINUMERIK ONE, SINUMERIK 840D, SINUMERIK 828D products.
UMC Advisory - This
advisory
describes a heap-based buffer overflow vulnerability in the Siemens User
Managements Components.
SINEMA Advisory -
This advisory
describes a session fixation vulnerability in the Siemens SINEMA Remote Connect
Server.
For more information on these advisories, including links to
3rd party advisories, researcher reports, and exploits, see my article at CFSN
Detailed Analysis - https://patrickcoyle.substack.com/p/25-advisories-published-9-12-24
- subscription required.
No comments:
Post a Comment