You are here

siemens

Siemens SIPROTEC 4, SIPROTEC Compact, and Reyrolle Devices Using the EN100 Ethernet Communication Module Extension (ICSA-18-067-02)

ICS-CERT has released an advisory on vulnerabilities in Siemens SIPROTEC 4, SIPROTEC Compact, and Reyrolle Devices using the EN100 Ethernet Communication Module Extension. Numerous versions of these product are affected. Successful exploitation of this vulnerability could allow an attacker to either upgrade or downgrade the firmware of the device, including downgrading to older versions with known vulnerabilities. For EN100 Ethernet module IEC 61850 variant (all versions prior to V4.30), Siemens recommends users update to V4.30.

Tags: 
ics-cert siemens

Siemens SIMATIC, SIMOTION, and SINUMERIK (ICSA-18-060-01) – Product Used in the Water and Wastewater and Energy Sectors

ICS-CERT has released an advisory on a Siemens SIMATC, SIMOTION, and SINUMERIK vulnerability. Numerous versions of this product are affected. Successful exploitation of these vulnerabilities could result in execution of arbitrary code, extended privileges, and unauthenticated access to sensitive data. As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms.

Tags: 
ics-cert siemens

Siemens TeleControl Server Basic (ICSA-18-030-02)

ICS-CERT has released an advisory on a Siemens TeleControl Server Basic vulnerability. Versions prior to V3.1 are affected. Successful exploitation of these vulnerabilities could allow for escalation of privileges to perform administrative actions. Siemens recommends that users install the latest version of TeleControl Server Basic. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.

Tags: 
ics-cert siemens

Siemens LOGO! Soft Comfort (ICSA-17-353-04)

ICS-CERT has released an alert on a Siemens LOGO! Soft Comfort vulnerability. All versions of LOGO! Soft Comfort prior to V8.2 are affected. Successful exploitation of this vulnerability could allow a remote attacker in a privileged network position to manipulate a software package during download. Siemens removed the Update Center from LOGO! Soft Comfort V8.2 and provides SHA-256 checksums for all LOGO! Soft Comfort software packages via a secured HTTPS channel.

Tags: 
ics-cert siemens

Siemens SWT3000 (ICSA-17-334-01) – Product Used in Energy Sector

ICS-CERT has released an advisory on a Siemens SWT3000 vulnerability. Multiple versions of this product are affected. Successful exploitation of these vulnerabilities under certain conditions may allow attackers to perform a denial-of-service attack. Siemens has provided updated firmware that fixes the vulnerabilities and recommends users update to the newest version. Additionally, ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of the vulnerability.

Tags: 
ics-cert siemens

Siemens SCALANCE W1750D, M800, and S615 (ICSA-17-332-01) – Product Used in Water and Wastewater and Energy Sectors

ICS-CERT has released an advisory on a Siemens SCALANCE W1750D, M800, and S615 vulnerability. All versions of these products are affected. Successful exploitation of these vulnerabilities could allow a remote attacker to crash the DNS service or execute arbitrary code by crafting malicious DNS responses. Siemens reports it is preparing updates for the affected products and recommends a series of mitigations. Additionally, ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of the vulnerability.

Tags: 
ics-cert siemens

Siemens SICAM (ICSA-17-320-02) – Product Used in Energy Sector

ICS-CERT has released an advisory on a Siemens SICAM vulnerability. All versions of SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, DNPi00 are affected. Successful exploitation of these vulnerabilities could allow an unauthenticated remote attacker to execute arbitrary code. Siemens provides a series of steps to mitigate this vulnerability, which includes disabling the web server after commissioning. Additionally, ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of the vulnerability.

Tags: 
ics-cert siemens

Pages

Subscribe to siemens