Showing posts with label IFM. Show all posts
Showing posts with label IFM. Show all posts

Saturday, May 9, 2026

Review – Public ICS Disclosures – Week of 5-2-26 – Part 1

This has been a somewhat busy disclosure week. For Part 1, we have nine vendor disclosures from ABB, Arista (2), Cisco, ifm, Johnson Controls, Palo Alto Networks, Philips, and QNAP. 

Advisories  

ABB Advisory - ABB published an advisory that explains that their System 800xA product comes bundled with Microsoft Edge, but that ABB has not updated the software to include Edge updates. 

Arista Advisory #1 - Arista published an advisory that discusses the Dirty Frag vulnerabilities. 

Arista Advisory #2 - Arista published an advisory that describes an incomplete comparison with missing factors vulnerability in their Arista EOS. 

Cisco Advisory - Cisco published an advisory that describes three vulnerabilities in their IoT Field Network Director. 

Ifm Advisory - CERT-VDE published an advisory that discusses three vulnerabilities in the ifm CR3171 ethernet LTE/GNSS radio modem. 

Johnson Controls Advisory - Johnson Controls published an advisory that discusses an improper access control vulnerability in their Airwall 75 gateway. 

Palo Alto Networks Advisory - PAN published an advisory that describes an out-of-bounds write vulnerability (that is listed in the CISA Known Exploited Vulnerabilities catalog) in their PAN-OS product. 

Philips Advisory - Philips published an advisory that discusses the CopyFail vulnerability. 

QNAP Advisory - QNAP published an advisory that discusses the CopyFail vulnerability. QNAP provides lists of affected and unaffected products. 


For more information on these disclosures, including links to 3rd party advisories, researcher reports, and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-5-c51 - subscription required. 

Saturday, July 5, 2025

Review – Public ICS Disclosures – Week of 7-28-25 – Part 1

This week we have 11 vendor disclosures from ABB, Contec, Delta Electronics, Endress+Hauser, HP (2), HPE, ifm, and Pilz (3).

Advisories

ABB Advisory - ABB published an advisory that describes four vulnerabilities in their web UI REST Interface.

Contec Advisory - Contec published an advisory that describes two vulnerabilities in their CONPROSYS HMI System.

Delta Advisory - Delta published an advisory that describes two deserialization of untrusted data vulnerabilities in their DTM Soft products.

Endress+Hauser Advisory - CERT-VDE published an advisory that discusses 19 vulnerabilities in the Endress+Hauser MEAC300-FNADE4.

HP Advisory #1 - HP published an advisory that describes a stack-based buffer overflow vulnerability in their Universal Print Driver.

HP Advisory #2 - HP published an advisory that discusses 46 vulnerabilities in their Device Manager.

HPE Advisory - HPE published an advisory that discusses a server-side request forgery vulnerability in their Telco Service Orchestrator software.

Ifm Advisory - CERT-VDE published an advisory that describes a missing authentication for critical function vulnerability in the ifm Smart PLC AC4xxS.

Pilz Advisory #1 - CERT-VDE published an advisory that describes an incorrect type conversion or cast vulnerability in the Pilz IndustrialPI 4 with IndustrialPI webstatus.

Pilz Advisory #2 - CERT-VDE published an advisory that describes a missing authentication for critical function vulnerability in the Pilz IndustrialPI 4 with Firmware Bullseye.

Pilz Advisory #3 - CERT-VDE published an advisory that discusses an authentication bypass by primary weakness vulnerability in the Pilz Software PiCtory.

 

For more information on these disclosures, including links to 3rd party advisories, researcher reports, and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-7-cff - subscription required.

Saturday, June 8, 2024

Review – Public ICS Disclosures – Week of 6-1-24

This week we have nine vendor disclosures from ABB (2), Checkpoint, HPE (3), IFM, WatchGuard, and Zyxel. There are also eleven updates from Broadcom (2), CODESYS (2), and HPE (7). Finally, we have three researcher reports of vulnerabilities in products from FortiGuard, and Luxion (2).

Advisories

ABB Advisory #1 - ABB published an advisory that describes a cross-site scripting vulnerability in their WebPro SNMP card.

ABB Advisory #2 - ABB published an advisory that describes two vulnerabilities in their KNX Secure Devices.

Checkpoint Advisory - Checkpoint published an advisory that describes an exposure of sensitive information to an unauthorized actor vulnerability that is listed on the CISA Known Exploited Vulnerability (KEV) catalog.

HPE Advisory #1 - HPE published an advisory that describes an authentication bypass vulnerability in their Cray Parallel Application Launch Service (PALS).

HPE Advisory #2 - HPE published an advisory that discusses two improper input validation vulnerabilities in their StoreEasy Servers.

HPE Advisory #3 - HPE published an advisory that discusses two improper input validation vulnerabilities in their ProLiant DL/ML/Edgeline/Synergy and Alletra Servers.

IFM Advisory - CERT-VDE published an advisory that describes a weak password recovery mechanism for forgotten password vulnerability in the IFM moneo software.

SEL Advisory - SEL announced that the latest versions of their SEL-5030 acSELerator QuickSet Software contains security enhancements.

WatchGuard Advisory - WatchGuard published an advisory that discusses the TunnelVision vulnerability.

Zyxel Advisory - Zyxel published an advisory that describes five vulnerabilities in their NAS products.

Updates

Broadcom Update #1 - Broadcom published an update for their Incident Response Team Contact Information advisory that was originally published on February 7th, 2023.

Broadcom Update #2 - Broadcom published an update for their Brocade Fabric OS advisory that was originally published on April 4th, 2024, and most recently updated on May 5th, 2024.

CODESYS Update #1 - CODESYS published an update for their OPC UA Stack advisory that was originally published on May 22nd, 2024.

CODESYS Update #2 - CODESYS published an update for their Gateway for Windows advisory that was originally published on May 22nd, 2024.

HPE Update #1 - HPE published an update for their Aruba ArubaOS advisory that was originally published on April 30th, 2024 and most recently updated on May 21st, 2024.

HPE Update #2 - HPE published an update for their Aruba Networking ClearPass Policy Manager advisory that was originally published on February 27th, 2024.

HPE Update #3 - HPE published an update for their Aruba Access Points advisory that was originally published on May 14th, 2024.

HPE Update #4 - HPE published an update for their Aruba ArubaOS advisory that was originally published on March 5th, 2024.

HPE Update #5 - HPE published an update for their ArubaOS-CX Switches advisory that was originally published on May 8th, 2024 and most recently updated on May 28th, 2024.

HPE Update #6 - HPE published an update for their ArubaOS-Switch Switches advisory that was originally published on March 26th, 2024.

HPE Update #7 - HPE published an update for their ProLiant DL/DX/ML/SY/RL/XL/Edgeline Servers advisory that was originally published on April 2nd, 2024 and most recently updated on May 14th, 2024.

Researcher Reports

FortiGuard Report - Horizion3 published a report discusses the SQL injection vulnerability (listed in the CISA KEV catalog) in the FortiClient EMS v7.2.X products.

Luxion Reports - The Zero Day Initiative published two reports discussing vulnerabilities in the Luxion KeyShot product.

 

For more information on these disclosures, including links to third-party advisories, researcher reports, and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-6-8cc - subscription required.

Saturday, December 17, 2022

Review – Public ICS Disclosures – Week of 12-10-22 – Part 1

On this Saturday after Cyber Tuesday, for Part 1 we have nineteen vendor disclosures from Aruba Networks, Contec, Eaton, Festo, FortiGuard Labs, GE Gas Power, Hitachi Energy (4), HP (7), IFM Electronic, and Phoenix Contact.

Vendor Disclosures

Aruba Advisory - Aruba published an advisory that describes thirteen vulnerabilities in their EdgeConnect Enterprise Orchestrator.

CONTEC Advisory - JPCERT published an advisory that describes four vulnerabilities in the CONTEC SolarView Compact. CONTEC has new versions that mitigate the vulnerabilities.

Eaton Advisory - Eaton published an advisory that describes two vulnerabilities in their Intelligent Power Protector (IPP) software.

Festo Advisory - CERT-VDE published an advisory that discusses a link following vulnerability in multiple Festo products.

FortiGuard Advisory - FortiGuard published an advisory that describes a heap-based buffer overflow vulnerability in their FortiOS SSL-VPN.

GE Gas Power - GE published an advisory that discusses two vulnerabilities in FortiOS.

Hitachi Energy Advisory #1 - Hitachi published an advisory that describes five vulnerabilities in their UNEM Product.

Hitachi Energy Advisory #2 - Hitachi published an advisory that describes five vulnerabilities in their FOXMAN-UN Product.

Hitachi Energy Advisory #3 - Hitachi published an advisory that discusses three vulnerabilities in their Lumada Asset Performance Management (APM) Product.

Hitachi Energy Advisory #4 - Hitachi published an advisory that describes an access control vulnerability in their Lumada APM Product. Hitachi

HP Advisory #1 - HP published an advisory that describes five vulnerabilities (one third-party) in their Security Manager product.

HP Advisory #2 - HP published an advisory that discusses five vulnerabilities in their AMD Client UEFI Firmware.

HP Advisory #3 - HP published an advisory that describes a Time-of-Check to Time-of-Use (TOCTOU) vulnerability in their PC BIOS.

HP Advisory #4 - HP published an advisory that discusses an improper restriction of operations within  the bounds of a memory buffer vulnerability in a wide variety of their PCs.

HP Advisory #5 - HP published an advisory that discusses the Text4Shell vulnerability in their Teradici Cloud Access Connector.

HP Advisory #6 - HP published an advisory that describes a privilege escalation vulnerability in their HyperX NGENUITY software.

HP Advisory #7 - HP published an advisory that describes a Time-of-Check to Time-of-Use (TOCTOU) vulnerability in their AMI UEFI Firmware.

IFM Advisory - CERT-VDE published an advisory that describes a weak password recovery vulnerability in the IFM moneo appliance.

Phoenix Contact Advisory - Phoenix Contact published an advisory that discusses two vulnerabilities in their PROFINET SDK product.

 

For more information on these disclosures, including links to third-party advisories and exploits, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-12-9ea - subscription required.

 
/* Use this with templates/template-twocol.html */