You are here

Cybersecurity

3S-Smart Software Solutions GmbH CODESYS Control V3 OPC UA Server (ICSA-19-255-04)

CISA has published an advisory on a NULL pointer reference vulnerability in 3S-Smart Software Solutions GmbH CODESYS Control V3 OPC UA Server. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could cause a denial-of-service condition. 3S-Smart Software Solutions GmbH has released Version 3.5.15.0 to resolve this vulnerability for all affected CODESYS products. CISA also recommends a series of measures for mitigating the vulnerability.

3S-Smart Software Solutions GmbH CODESYS Control V3 Online User Management (ICSA-19-255-03)

CISA has published an advisory on an incorrect permission assignment for critical resource vulnerability in 3S-Smart Software Solutions GmbH CODESYS Control V3 Online User Management. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could allow unauthorized actors access to unintended functionality and/or information. 3S-Smart Software Solutions GmbH has released Version 3.5.13.0 to resolve this vulnerability for all affected CODESYS products. CISA also recommends a series of measures for mitigating the vulnerability.

3S-Smart Software Solutions GmbH CODESYS V3 Web Server (ICSA-19-255-01)

CISA has published an advisory on path traversal and stack-based buffer overflow vulnerabilities in 3S-Smart Software Solutions GmbH CODESYS V3 web server. Numerous products and versions of these products are affected. Successful exploitation of these vulnerabilities may allow an attacker to create a denial-of-service condition, to perform remote code execution, or to access restricted files. 3S-Smart Software Solutions GmbH has released Versions 3.5.12.80, 3.5.14.10, and 3.5.15.0 to resolve the vulnerabilities for the affected CODESYS products.

We Don’t “WannaCry” Again Over Unpatched Vulnerabilities – BlueKeep Exploit Now Publicly Available

In June, Microsoft (and the NSA) implored organizations to patch now for CVE-2019-0708 which had been released in May. This urging harkened back to May 2017, when unpatched systems were infected with WannaCry, the EternalBlue worm that spread through Server Message Block (SMB). CVE-2019-0708, a worm better known as “BlueKeep,” affects Remote Desktop Services (RDP) residing on earlier versions of Windows, including Windows 2003 and XP, Vista 7, Server 2008 R2, and Server 2008. Similar to 2017, Microsoft issued a patch months ago, prior to any known working exploits in the wild.

Microsoft Releases September 2019 Security Updates

Microsoft has released its monthly update to address vulnerabilities in its software. For this month, Microsoft has released security updates for Microsoft Windows, Internet Explorer, Microsoft Edge (EdgeHTML-based), ChakraCore, Microsoft Office and Microsoft Office Services and Web Apps, Adobe Flash Player, Microsoft Lync, Visual Studio, Microsoft Exchange Server, .NET Framework, Microsoft Yammer, .NET Core, ASP.NET, Team Foundation Server, and Project Rome.

Mitsubishi Electric Europe B.V. smartRTU and INEA ME-RTU (Update A) (ICS-ALERT-19-225-01)

The NCCIC has updated its alert on proof-of-concept exploit code affecting Mitsubishi Electric Europe B.V. smartRTU (Versions 2.02 and prior) and INEA ME-RTU (Versions 3.0 and prior), remote terminal products. According to a public report on the matter, there are multiple vulnerabilities that could be exploited to gain remote code execution with root privileges. CISA has notified Mitsubishi Electric Europe B.V. of the report and has asked them to confirm the vulnerabilities and identify mitigations.

Siemens SIMATIC TDC CP51M1 (ICSA-19-253-05)

The NCCIC has published an advisory on an improper input validation vulnerability in Siemens SIMATIC TDC CP51M1. All versions prior to 1.1.7 are affected. Successful exploitation of this vulnerability could create a denial-of-service condition within UDP communication. Siemens recommends users update to Version 1.1.7 or later. The NCCIC also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Delta Electronics TPEditor (ICSA-19-253-01)

The NCCIC has published an advisory on stack-based buffer overflow, heap-based buffer overflow, and out-of-bounds write vulnerabilities in Delta Electronics TPEditor. Versions 1.94 and prior are affected. Successful exploitation of these vulnerabilities may allow information disclosure, remote code execution, or may crash the application. Delta Electronics recommends affected users update to the latest version of Delta Industrial Automation TPEditor, Version 1.95. The NCCIC also recommends a series of measures to mitigate the vulnerabilities.

OSIsoft PI SQL Client (ICSA-19-253-06) – Product Used in the Energy Sector

The NCCIC has published an advisory on an integer overflow wraparound vulnerability in OSIsoft PI SQL Client. PI SQL Client 2018 (PI SQL Client OLEDB 2018) is affected. Successful exploitation of this vulnerability could allow remote code execution or cause a denial of service, resulting in disclosure, deletion, or modification of information. OSIsoft recommends users upgrade to PI SQL Client 2018 R2 or later to resolve this issue. The NCCIC also recommends a series of measures to mitigate the vulnerability.

Siemens IE-WSN-PA Link WirelessHART Gateway (ICSA-19-253-04) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC has published an advisory on a cross-site scripting vulnerability in Siemens IE/WSN-PA Link WirelessHART Gateway. All versions are affected. Successful exploitation of this vulnerability could allow information disclosure, code execution, or denial-of-service.  Siemens has identified specific workarounds and mitigations that users can apply to reduce the risk. The NCCIC also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Pages

Subscribe to Cybersecurity