Thursday, September 12, 2024

Review – 25 Advisories Published – 9-12-24

Today, CISA’s NCCIC-ICS published 25 control system security advisories for products from Rockwell Automation (8), AutomationDirect, and Siemens (16).

Advisories

Rockwell Advisory #1 - This advisory describes an externally controlled reference to a resource in another sphere vulnerability in the Rockwell Thin Manager.

Rockwell Advisory #2 - This advisory describes two vulnerabilities in the Rockwell Pavilion8 model predictive control software.

Rockwell Advisory #3 - This advisory describes a command injection vulnerability in the Rockwell Factory Talk products.

Rockwell Advisory #4 - This advisory describes an improper authentication vulnerability in the Rockwell FactoryTalk Batch View manufacturing process batch solution.

Rockwell Advisory #5 - This advisory describes an improper input validation vulnerability in the Rockwell 5015-U8IHFT I/O module.

Rockwell Advisory #6 - This advisory discusses two vulnerabilities (one with a publicly available exploit) in the Rockwell AADvance Trusted SIS Workstation.

Rockwell Advisory #7 - This advisory describes an improper privilege management vulnerability in the Rockwell OptixPanel product.

Rockwell Advisory #8 This advisory describes an improper input validation vulnerability in multiple Rockwell controllers.

AutomationDirect Advisory - This advisory describes two vulnerabilities in the AutomationDirect DirectLogic H2-DM1E, a programmable logic controller.

SICAM Advisory - This advisory discusses a classic buffer overflow vulnerability in the Siemens SICAM and SITIPE products.

Industrial Products Advisory #1 - This advisory discusses the regreSSHion vulnerability in the Siemens Industrial Products.

Industrial Products Advisory #2 - This advisory discusses an input validation vulnerability in multiple Siemens Industrial Products.

SIMATIC Advisory #1 - This advisory describes an execution with unnecessary privilege vulnerability in the Siemens SIMATIC SCADA and PCS 7 Systems products.

SIMATIC Advisory #2 - This advisory describes three NULL pointer dereference vulnerabilities in the Siemens SIMATIC, SIPLUS, and TIM products.

SIMATIC Advisory #3 - This advisory describes six vulnerabilities in the Siemens SIMATIC RFID Readers.

SCALANCE Advisory - This advisory describes an injection vulnerability in the Siemens SCALANCE W700.

Tecnomatix Advisory - This advisory describes a stack-based buffer overflow vulnerability in the Siemens Tecnomatix Plant Simulation product.

Industrial Edge Advisory - This advisory describes an authorization bypass through a user controlled key vulnerability in the Siemens Industrial Edge Management products.

Sinema Advisory - This advisory describes seven vulnerabilities in the Siemens SINEMA Remote Connect Client.

Automation License Advisory - This advisory describes an integer overflow or wrap around vulnerability in the Siemens Automation License Manager.

Mendix Advisory - This advisory describes an observable response discrepancy vulnerability in the Siemens Mendix Runtime product.

SINUMERIK Advisory #1 - This advisory describes an insertion of sensitive information into log file vulnerability for the Siemens SINUMERIK systems.

SINUMERIK Advisory #2 - This advisory describes an incorrect permission assignment for critical resource vulnerability for the Siemens SINUMERIK ONE, SINUMERIK 840D, SINUMERIK 828D products.

UMC Advisory - This advisory describes a heap-based buffer overflow vulnerability in the Siemens User Managements Components.

SINEMA Advisory - This advisory describes a session fixation vulnerability in the Siemens SINEMA Remote Connect Server.

 

For more information on these advisories, including links to 3rd party advisories, researcher reports, and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/25-advisories-published-9-12-24 - subscription required.

No comments:

 
/* Use this with templates/template-twocol.html */