You are here

Cybersecurity

NUUO NVRmini2 and NVRsolo (ICSA-18-284-01)

The NCCIC has released an advisory on stack-based buffer overflow and leftover debug code vulnerabilities in NUUO NVRmini2 and NVRsolo. Versions 3.8.0 and prior are affected. Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution and user account modification. NUUO has developed a fix for the reported vulnerabilities and recommends users update to firmware v3.9.1. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

Fuji Electric Energy Savings Estimator (ICSA-18-282-07)

The NCCIC has released an advisory on an uncontrolled search path element vulnerability in Fuji Electric Energy Savings Estimator. Versions 1.0.2.0 and prior are affected. Successful exploitation of this vulnerability may allow an attacker to load a malicious DLL and execute code on the affected system with the same privileges as the application that loaded the malicious DLL. Fuji Electric has released Version V.1.0.2.1 of the software. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

Hangzhou Xiongmai Technology Co., Ltd Xmeye P2P Cloud Server (ICSA-18-282-06)

The NCCIC has released an advisory predictable from observable state, hidden functionality, missing encryption of sensitive vulnerabilities in Hangzhou Xiongmai Technology Co., Ltd Xmeye P2P Cloud Server. Successful exploitation of these vulnerabilities could allow unauthorized access to video feeds with the potential to modify settings, replace firmware, and/or execute code. Hangzhou Xiongmai Technology Co., Ltd has not provided mitigations for these vulnerabilities.

Siemens ROX II (ICSA-18-282-03)

The NCCIC has released an advisory on an improper privilege management vulnerability in Siemens ROX II. All versions prior to v2.12.1 are affected. Successful exploitation of these vulnerabilities could allow valid users to escalate their privileges and execute arbitrary commands. Siemens recommends users update to the new version (v2.12.1) as soon as possible. To reduce risk, Siemens recommends that administrators restrict network access to prevent potential attackers from accessing Port 22/TCP, if possible.

GE iFix (ICSA-18-282-01)

The NCCIC has released an advisory on an unsafe for ActiveX control marked safe for scripting vulnerability in GE iFix. GE iFix 2.0 to 5.0, 5.1, 5.5, and 5.8 are affected. Successful exploitation of this vulnerability could cause a buffer overflow condition. GE released iFIX 5.9 in June 2017 to address this issue by incorporating Gigasoft Version 8.0. Additionally, GE recommends users only use ActiveX from trusted sources. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

Siemens SIMATIC S7-1500, SIMATIC S7-1500 Software Controller and SIMATIC ET 200SP Open Controller (ICSA-18-282-05) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC has released an advisory on a denial of service for improper input validation vulnerability in Siemens SIMATIC S7-1500, SIMATIC S7-1500 Software Controller, and SIMATIC ET 200SP Open Controller. Multiple products and versions of those products are affected. An attacker with network access to the PLC may be able to cause a denial-of-service condition on the network stack. Siemens has provided updates to address this vulnerability and recommends users update to the new version.

Siemens SIMATIC S7-1200 CPU Family Version 4 (ICSA-18-282-04) – Product Used in the Water and Wastewater and Energy Sectors

The NCCIC has released an advisory on a cross-site request forgery (CSRF) vulnerability in SIMATIC S7-1200 CPU Version 4. All versions prior to 4.2.3 are affected. Successful exploitation of this vulnerability could allow a CSRF attack if an unsuspecting user is tricked into accessing a malicious link. Siemens provides a firmware update (v4.2.3) and recommends users update to the new version. To reduce the risk, Siemens recommends users not visit other websites while being authenticated against the PLC.

Siemens SCALANCE W1750D (ICSA-18-282-02) – Product Used in the Water and Wastewater and Energy Sectors

The NCCIC has released an advisory on cryptographic issues in Siemens SCALANCE W1750D. All versions prior to 8.3.0.1 are affected. Successful exploitation of this vulnerability could allow an attacker to decrypt TLS traffic. Siemens provides a firmware update (v8.3.0.1) and recommends users to update to the new version. To reduce the risk, Siemens recommends administrators restrict access to the web interface of the affected devices. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

NCCIC Releases Joint Alert on Worldwide Malicious Activity Using Publicly Available Tools

The NCCIC, in collaboration with the Australian Cyber Security Centre, the Canadian Centre for Cyber Security, the New Zealand National Cyber Security Centre, and the United Kingdom National Cyber Security Centre, has released a joint Activity Alert that highlights five publicly available tools frequently observed in cyber incidents worldwide. The alert provides an overview of each tool, its capabilities, and recommended best practices network defenders can use to protect their networks against these tools.

Pages

Subscribe to Cybersecurity