You are here

Cybersecurity

Schneider Electric Magelis HMI Panels (ICSA-20-044-02)

CISA has published an advisory on an improper check for unusual or exceptional conditions vulnerabilities in Schneider Electric Magelis HMI Panels. All firmware versions of multiple products are affected. Successful exploitation of this vulnerability could allow a denial-of-service condition. Schneider Electric recommends users set up network segmentation and implement a firewall to block all unauthorized access to Ports 44818/TCP, 502/TCP, 6000/TCP, 6002/TCP, 8080/TCP, 8014/TCP, and 6001/TCPP. CISA also recommends a series of measures to mitigate the vulnerability.

Schneider Electric Modicon Ethernet Serial RTU (ICSA-20-044-01)

CISA has published an advisory on improper check for unusual or exceptional conditions and improper access control vulnerabilities in Schneider Electric Modicon BMXNOR0200H. All firmware versions are affected. Successful exploitation of these vulnerabilities could limit system availability. Schneider Electric recommends users set up network segmentation and implement a firewall to block all unauthorized access to Port 2404/TCP and SNMP Port 161/UDP. CISA also recommends a series of measures to mitigate the vulnerabilities.

FBI’s Internet Crime Complaint Center Releases 2019 Report

The last calendar year saw both the highest number of complaints and the highest dollar losses reported to the FBI’s Internet Crime Complaint Center (IC3), according to an annual report just published by the group. In the 2019 Internet Crime Report, the IC3 notes it received 467,361 complaints in 2019 and recorded more than $3.5 billion in losses to individual and business victims. The report describes some of the new tactics and techniques criminals deployed to carry out existing scams.

Digi ConnectPort LTS 32 MEI (ICSA-20-042-13)

CISA has published an advisory on unrestricted upload of file with dangerous type and cross-site scripting vulnerabilities in Digi International ConnectPort LTS 32 MEI. Firmware Version 1.4.3 (82002228_K 08/09/2018), bios Version 1.2 is affected. Successful exploitation of these vulnerabilities could limit system availability. Digi recommends users upgrade to the mandatory release of ConnectPort LTS Version 1.4.5, released on November 8, 2019. Additionally, it recommends a series of best practices. CISA also recommends a series of measures to mitigate the vulnerabilities.

Siemens SIPROTEC 4 and SIPROTEC Compact (ICSA-20-042-12)

CISA has published an advisory on an improper input validation vulnerability in SIPROTEC 4 and SIPROTEC Compact. All versions of both products are affected. This vulnerability could allow an attacker to conduct a denial-of-service attack over the network. Siemens has identified specific workarounds and mitigations users can apply to reduce the risk. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Siemens SIMATIC S7-1500 (ICSA-20-042-11)

CISA has published an advisory on a resource exhaustion vulnerability in Siemens SIMATIC S7-1500 CPU family. Multiple products and versions of these products are affected. This vulnerability could allow a remote attacker to conduct denial-of-service attacks. Siemens has released updates for several affected products, is working on updates for the remaining affected products, and recommends specific countermeasures until fixes are available. CISA also recommends a series of measures to mitigate the vulnerabilities.

Siemens OZW Web Server (ICSA-20-042-09)

CISA has published an advisory on an information disclosure vulnerability in Siemens OZW web server. All versions prior to 10.0 are affected. Successful exploitation of this vulnerability could allow unauthenticated users to access project files. Siemens recommends users update OZW672 and OZW77 to version 10.0 and has identified specific workarounds and mitigations users can apply to reduce the risk. CISA also recommends a series of measures to mitigate the vulnerability.

Siemens SIPORT MP (ICSA-20-042-08)

CISA has published an advisory on an insufficient logging vulnerability in Siemens SIPORT MP. All versions prior to 3.1.4 are affected. Successful exploitation of this vulnerability could allow the attacker to create special accounts with administrative privileges. Siemens recommends users update to Version 3.1.4 and has identified specific workarounds and mitigations users can apply to reduce the risk. CISA also recommends a series of measures to mitigate the vulnerability.

Siemens SCALANCE X Switches (ICSA-20-042-07)

CISA has published an advisory on a protection mechanism failure vulnerability in Siemens SCALANCE X switches. Multiple products and versions of these products are affected. Successful exploitation of this vulnerability could allow an attacker to perform administrative actions. Siemens has released updates, which are recommended to be applied when possible. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Siemens SIMATIC CP 1543-1 (ICSA-20-042-03) – Products Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on improper access control and loop with unreachable exit condition vulnerabilities in Siemens SIMATIC CP-1543-1. All versions starting at 2.0 and prior to 2.2. are affected. Successful exploitation of these vulnerabilities could allow remote attackers to conduct a denial-of-service attack by sending specially crafted packets to Port 161/UDP (SNMP). The latest update for SIMATIC CP 1543-1 contains fixes for the vulnerabilities within its embedded ProFTPD FPT server. Siemens recommends updating SIMATIC CP 1543-1 modules to Version 2.2.

Pages

Subscribe to Cybersecurity