You are here

ics-cert

WAGO PFC200 Series (ICSA-18-044-01) – Product Used in the Energy Sector

ICS-CERT has released an advisory on a WAGO PFC200 Series vulnerability. Numerous versions of this product are affected. Successful exploitation of this vulnerability could allow a remote attacker unauthorized access to the PLC to perform operations on the file system without authentication. WAGO released a security patch with FW11. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.

Tags: 
ics-cert wago

3S-Smart Software Solutions GmbH CODESYS Web Server (ICSA-18-032-02) – Product Used in the Energy Sector

ICS-CERT has released an advisory on a 3S-Smart Software Solutions GmbH CODESYS Web Server vulnerability. All Microsoft Windows (also WinCE) based CODESYS web servers running stand-alone Version 2.3, or as part of the CODESYS runtime system running prior to Version V1.1.9.19, are affected. Successful exploitation of this vulnerability could cause the device the attacker is accessing to crash, resulting in a buffer overflow condition that may allow remote code execution.

Fuji Electric V-Server VPR (ICSA-18-032-01)

ICS-CERT has released an advisory on a Fuji Electric V-Server VPR vulnerability. Versions 4.0.1.0 and prior are affected. Successful exploitation of this vulnerability could allow a remote attacker to view sensitive information and disrupt the availability of the device. Fuji Electric has produced firmware 4.0.3.0. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.

Gemalto Sentinel License Manager (ICSA-18-032-03)

ICS-CERT has released an advisory on a Gemalto Sentinel License Manager vulnerability. All HASP SRM, Sentinel HASP, and Sentinel LDK products prior to Sentinel LDK RTE 7.55 are affected. Successful exploitation of these vulnerabilities could lead to remote code execution or cause a denial-of-service condition, rendering the Sentinel LDK License Manager service unavailable.

Tags: 
ics-cert gemalto

Siemens TeleControl Server Basic (ICSA-18-030-02)

ICS-CERT has released an advisory on a Siemens TeleControl Server Basic vulnerability. Versions prior to V3.1 are affected. Successful exploitation of these vulnerabilities could allow for escalation of privileges to perform administrative actions. Siemens recommends that users install the latest version of TeleControl Server Basic. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.

Tags: 
ics-cert siemens

PHOENIX CONTACT mGuard (ICSA-18-030-01)

ICS-CERT has released an advisory on a PHOENIX CONTACT mGuard vulnerability. Versions 7.2 to 8.6.0 are affected. Successful exploitation of this vulnerability could allow for an attacker to modify firmware update packages. PHOENIX CONTACT recommends that affected users upgrade to firmware version 8.6.1. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.

Nari PCS-9611 (ICSA-18-025-01) – Product Used in the Energy Sector

ICS-CERT has released an advisory on a Nari PCS-9611 vulnerability. All versions of the PCS-9611 relay, a control and monitoring unit, are affected. Successful exploitation of this vulnerability could allow a remote attacker arbitrary read/write abilities on the system. NCCIC has reached out to Nari and CNCERT but has not received a response. In the meantime, ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.

Advantech WebAccess/SCADA (ICSA-18-023-01) - Product Used in the Water and Wastewater and Energy Sectors

ICS-CERT has released an advisory on an Advantech WebAccess/SCADA vulnerability. Versions prior to V8.2_20170817 are affected. Successful exploitation of these vulnerabilities could allow sensitive information to be disclosed from the target or database without authentication. Advantech has released version 8.3.0 of WebAccess/SCADA to address the reported vulnerabilities. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability.

Pages

Subscribe to ics-cert