id
stringlengths
12
16
title
stringlengths
6
140
description
stringlengths
76
139k
cpes
listlengths
0
0
cvss_v4_0
null
cvss_v3_1
float64
2.5
10
cvss_v3_0
float64
1.9
10
cvss_v2_0
null
ICSA-19-225-02
OSIsoft PI Web API
Successful exploitation of this vulnerability may allow disclosure of sensitive information.CVE-2019-13515 has been assigned to this vulnerability. A CVSS v3 base score of 8.5 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H). The affected product is vulnerable to a direct attack due to...
[]
null
null
7.8
null
ICSA-21-266-01
Trane Symbio (Update B)
The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.CVE-2021-38448 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:P/AC:...
[]
null
null
7.5
null
ICSA-19-036-04
Siemens SIMATIC S7-1500 CPU
Specially crafted network packets sent to port 80/tcp or 443/tcp could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems on port 80/tcp or 443/tcp. Successful exploitatio...
[]
null
7.5
null
null
ICSA-22-153-01
Carrier LenelS2 HID Mercury access panels
An unauthenticated attacker can update the hostname with a specially crafted name, allowing shell command execution during the core collection process.CVE-2022-31479 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H)....
[]
null
null
8.8
null
ICSA-18-079-02
Siemens SIMATIC, SINUMERIK, and PROFINET IO (Update D)
Responding to a PROFINET DCP request with a specially crafted PROFINET DCP packet could cause a denial of service condition of the requesting system. The security vulnerability could be exploited by an attacker located on the same Ethernet segment (OSI Layer 2) as the targeted device. A manual restart is required to...
[]
null
6.5
null
null
ICSA-22-132-12
Siemens Industrial Products
In OPC Foundation Local Discovery Server (LDS) before 1.04.402.463, remote attackers can cause a denial of service condition by sending carefully crafted messages that lead to access of a memory location after the end of a buffer.
[]
null
7.5
null
null
ICSA-24-046-09
Siemens SCALANCE SC-600 Family
Affected products do not properly validate the content of uploaded X509 certificates which could allow an attacker with administrative privileges to execute arbitrary code on the device. Affected devices use a weak checksum algorithm to protect the configuration backup that an administrator can export from the device. ...
[]
null
7.2
null
null
ICSA-21-266-01
Trane Symbio (Update B)
The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.CVE-2021-38448 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:P/AC:...
[]
null
null
7.5
null
ICSA-23-194-03
Siemens SIMATIC CN 4100
Affected device consists of improper access controls in the configuration files that leads to privilege escalation. An attacker could gain admin access with this vulnerability leading to complete device control. Affected device consists of an incorrect default value in the SSH configuration. This could allow an attacke...
[]
null
7.4
null
null
ICSA-20-196-05
Siemens UMC Stack (Update H)
A component within the affected application calls a helper binary with SYSTEM privileges during startup while the call path is not quoted. This could allow a local attacker with administrative privileges to execute code with SYSTEM level privileges. Sending multiple specially crafted packets to the affected service cou...
[]
null
5.3
null
null
ICSA-22-263-03
Dataprobe iBoot-PDU
A specific function does not sanitize the input provided by the user, which may expose the affected an OS command injection vulnerability. CVE-2022-3183 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The device�s e...
[]
null
null
6.5
null
ICSA-24-060-01
Delta Electronics CNCSoft-B
Delta Electronics CNCSoft-B versions 1.0.0.4 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
[]
null
7.8
null
null
ICSA-24-030-07
Rockwell Automation LP30/40/50 and BM40 Operator Interface
After successful authentication, specifically crafted communication requests with inconsistent content can cause the CmpFiletransfer component to read internally from an invalid address, potentially leading to a denial-of-service condition. After successful authentication, specifically crafted communication requests c...
[]
null
6.5
null
null
ICSA-24-226-02
Rockwell Automation AADvance Standalone OPC-DA Server
An arbitrary code execution vulnerability exists in the affected product. The log4net config file does not disable XML external entities. An arbitrary code execution vulnerability exists in the affected product. The vulnerability occurs due to a vulnerable component, the format string in log4net.
[]
null
5.3
null
null
ICSA-19-073-02
Gemalto Sentinel UltraPro
The uncontrolled search path element vulnerability enables an attacker to load and execute a malicious file from the ux32w.dll in Sentinel UltraPro.CVE-2019-6534 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
6.5
null
ICSA-21-315-04
Siemens Mendix
Applications built with affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. This could allow a local attacker to read those documents by exploring the browser cache.
[]
null
4
null
null
ICSA-19-029-03
AVEVA Wonderware System Platform
Wonderware System Platform uses an ArchestrA network user account for authentication of system processes and inter-node communications. A user with low privileges could make use of an API to obtain the credentials for this account.CVE-2019-6525 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has be...
[]
null
null
8.8
null
ICSA-23-131-15
Rockwell Automation ThinManager
The affected product allows the use of medium-strength ciphers. If the client requests an insecure cipher, then a malicious actor could decrypt traffic sent between the client and server API. CVE-2023-2443 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is ...
[]
null
7.5
null
null
ICSA-24-004-02
Mitsubishi Electric Factory Automation Products
The affected products contain an observable timing discrepancy vulnerability in their RSA decryption implementation. By sending specially crafted packets and performing a Bleichenbacher style attack, an attack method to decrypt ciphertext by observing the behavior when a padding error occurs, an attacker could decrypt ...
[]
null
7.4
null
null
ICSA-20-343-09
Siemens SIMATIC Controller Web Servers
The web server of the affected products contains a vulnerability that could allow a remote attacker to trigger a denial-of-service condition by sending a specially crafted HTTP request.
[]
null
5.3
null
null
ICSA-22-349-15
Siemens Teamcenter Visualization and JT2Go
The APDFL.dll contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. The APDFL.dll contains an out of bounds write past the fixed-length heap-based buffer while parsing sp...
[]
null
7.8
null
null
ICSA-19-213-04
3S-Smart Software Solutions GmbH CODESYS V3 (Update A)
The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport.CVE-2019-9013 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
8.8
null
ICSA-24-354-05
Tibbo AggreGate Network Manager
There is an unrestricted file upload vulnerability where it is possible for an authenticated user (low privileged) to upload an jsp shell and execute code with the privileges of user running the web server.
[]
null
8.8
null
null
ICSA-20-175-03
ABB Device Library Wizard
The software writes sensitive system information to an unprotected file, and a low-privileged user could read confidential data from such a file. This could allow the user to take control of the productCVE-2020-8482 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vecto...
[]
null
null
7.8
null
ICSA-21-124-01
Advantech WISE-PaaS RMM
The affected product allows attackers to obtain sensitive information from the WISE-PaaS dashboard. The system contains a hard-coded administrator username and password that can be used to query Grafana APIs. Authentication is not required for exploitation.CVE-2021-27437 has been assigned to this vulnerability. A CVSS ...
[]
null
null
9.1
null
ICSA-24-030-05
Rockwell Automation ControlLogix and GuardLogix
A Denial-of-Service (DoS) vulnerability exists in the affected products, listed above. If exploited, the product could potentially experience a major nonrecoverable fault (MNRF). The device will restart itself to recover from the MNRF.
[]
null
8.6
null
null
ICSA-23-103-11
Siemens Teamcenter Visualization and JT2Go
The APDFL.dll contains a memory corruption vulnerability while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
[]
null
7.8
null
null
ICSA-22-242-08
Honeywell Trend Controls Inter-Controller Protocol
Several Trend Controls IQ Series building automation controllers utilize an Inter-Controller (IC) protocol that uses a 4-digit authentication PIN transmitted in plaintext, allowing usernames and passwords to be transmitted in plaintext when utilizing unsupported legacy versions of the controller. This may allow an atta...
[]
null
null
7.1
null
ICSA-22-237-01
FATEK Automation FvDesigner
The affected product is vulnerable to an out-of-bounds write while processing project files. If a valid user is tricked into using maliciously crafted project files, an attacker could achieve arbitrary code execution.CVE-2022-2866 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated;...
[]
null
null
7.8
null
ICSA-21-021-02
Delta Electronics TPEditor
An untrusted pointer dereference has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.CVE-2020-27288 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector ...
[]
null
null
7.8
null
ICSA-21-159-02
Open Design Alliance Drawings SDK
The affected products are vulnerable to an out-of-bounds read due to parsing of DWG files resulting from the lack of proper validation of user-supplied data. This can result in a read past the end of an allocated buffer and allows attackers to cause a denial-of service condition or read sensitive information from memor...
[]
null
null
7.8
null
ICSA-21-189-01
Rockwell Automation MicroLogix 1100
A remote, unauthenticated attacker sending specially crafted commands could cause the PLC to fault when the controller is switched to RUN mode, which results in a denial-of-service condition. If successfully exploited, this vulnerability will cause the controller to fault when the controller is switched to RUN mode.CVE...
[]
null
null
8.6
null
ICSA-18-277-01
WECON PI Studio (Update A)
When parsing specific files the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of an administrator.CVE-2018-14818 has been assigned to this vulnerability. A CVSS v...
[]
null
null
3.3
null
ICSA-19-339-02
Weidmueller Industrial Ethernet Switches
The authentication mechanism has no brute-force prevention.CVE-2019-16670 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Remote authenticated users can crash a device by using a special packet.CVE-2019-16671 has ...
[]
null
null
9.8
null
ICSA-18-114-01
Vecna VGo Robot (Update A)
An attacker may be able to capture firmware updates through the adjacent network.CVE-2018-8860 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). User accounts may be able to execute commands that are outside the sco...
[]
null
null
4.7
null
ICSA-21-110-06
Eaton Intelligent Power Manager
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated SQL injection. A malicious user can send a specially crafted packet to exploit this vulnerability. Successful exploitation of this vulnerability can allow attackers to add users in the data base.CVE-2021-23276 has been assigned to this v...
[]
null
null
8.3
null
ICSA-18-324-01
Teledyne DALSA Sherlock
A stack-based buffer overflow vulnerability has been identified, which may allow remote code execution.CVE-2018-17930 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
7.3
null
ICSA-20-014-05
Siemens TIA Portal (Update F)
Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. This vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required.CVE-2019-10934 has been assigned to this vulnerabilit...
[]
null
null
7.8
null
ICSA-23-222-12
Network Mirroring in Siemens RUGGEDCOM
The affected products insufficiently block data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior.
[]
null
9.1
null
null
ICSA-17-299-02
Rockwell Automation Stratix 5100 (Update A)
Key reinstallation attacks (KRACK) work against the four-way handshake of the WPA2 protocol. KRACK takes advantage of the retransmission of a handshake message to prompt the installation of the same encryption key every time it receives message 3 from the access point. Retransmission of the handshake message from the a...
[]
null
null
6.9
null
ICSA-22-167-06
Siemens Apache HTTP Server
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier. CVE-2021-34798 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ap_escape_quotes() may ...
[]
null
9
null
null
ICSA-23-194-01
Siemens RUGGEDCOM ROX
A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly cr...
[]
null
9.1
null
null
ICSA-18-023-01
Advantech WebAccess/SCADA
An attacker has read access to files within the directory structure of the target device. CVE-2018-5445 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). WebAccess/SCADA does not properly sanitize its inputs for SQL...
[]
null
null
5.3
null
ICSA-21-161-01
Rockwell Automation FactoryTalk Services Platform
FactoryTalk Services Platform contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine.CVE-2021-32960 has ...
[]
null
null
8.5
null
ICSA-19-094-01
Omron CX-Programmer
When processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.CVE-2019-6556 has been assigned to this vulnerability. A CVSS v3 base score of 6.6 has been assigned...
[]
null
null
6.6
null
ICSA-18-219-01
Delta Electronics CNCSoft and ScreenEditor
Multiple stack-based buffer overflow vulnerabilities cause the software to crash due to lacking user input validation before copying data from project files onto the stack. CVE-2018-10636 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI...
[]
null
null
4.3
null
ICSA-20-212-01
Inductive Automation Ignition 8
The affected product is vulnerable to an information leak, which may allow an attacker to obtain sensitive information. An HTTP request to the unprotected API could be used to determine whether an arbitrary file path exists on the filesystem. No authentication is required to perform this exploit.CVE-2020-14520 has been...
[]
null
null
7.5
null
ICSA-23-236-01
KNX Protocol
KNX devices that use KNX Connection Authorization and support Option 1 are, depending on the implementation, vulnerable to being locked and users being unable to reset them to gain access to the device. The BCU key feature on the devices can be used to create a password for the device, but this password can often not b...
[]
null
null
7.5
null
ICSMA-23-285-01
Santesoft Sante DICOM Viewer Pro
Sante DICOM Viewer Pro lacks proper validation of user-supplied data when parsing DICOM files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. Sante DICOM Viewer Pro lacks proper validation of user-supplied data wh...
[]
null
null
7.8
null
ICSA-23-075-05
Siemens Mendix SAML Module
The affected versions of the module insufficiently verifies the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application.
[]
null
9.1
null
null
ICSA-19-318-01
Siemens Mentor Nucleus Networking Module
By sending specially crafted DHCP packets to a device, an attacker may be able to affect availability and integrity of the device. Adjacent network access, but no authentication and no user interaction is needed to conduct this attack. At the time of advisory publication no public exploitation of this security vulnerab...
[]
null
null
7.1
null
ICSA-19-353-03
WECON PLC Editor
Multiple buffer overflow vulnerabilities exist when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.CVE-2019-18236 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vecto...
[]
null
null
7.8
null
ICSA-22-242-09
Omron CX-Programmer
Opening a specially crafted file could cause the affected product to fail to release its memory reference potentially resulting in arbitrary code execution.CVE-2022-2979 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A...
[]
null
null
7.8
null
ICSA-22-333-01
Mitsubishi Electric GOT2000
The affected GOT2000 Series devices with FTP server versions 01.39.000 and prior are vulnerable to improper input validation, which could allow an attacker to cause a denial-of-service condition by sending a specially crafted command.CVE-2022-40266 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 ha...
[]
null
null
5.3
null
ICSA-23-068-04
Step Tools Third-Party
STEPTools v18SP1 ifcmesh library (v18.1) is affected due to a null pointer dereference, which could allow an attacker to deny application usage when reading a specially constructed file, resulting in an application crash. CVE-2023-0973 has been assigned to this vulnerability. A CVSS v3 base score of 2.2 has been assign...
[]
null
null
2.2
null
ICSA-21-336-08
Hitachi Energy RTU500 series
The Raccoon attack exploits a flaw in the TLS specification, which can lead to an attacker computing pre-master secret in connections that have used a Diffie-Hellman- based cipher suite. An attacker can then eavesdrop on all encrypted communications sent over the exploited TLS connection.CVE-2020-1968 has been assigned...
[]
null
null
8.6
null
ICSA-23-157-01
Delta Electronics CNCSoft-B DOPSoft
Delta Electronics' DOPSoft versions prior to v4.0.0.82, a component of CNCSoft-B 1.0.0.4, are vulnerable to stack-based buffer overflow, which could allow an attacker to execute arbitrary code. Delta Electronics' DOPSoft versions prior to v4.0.0.82, a component of CNCSoft-B 1.0.0.4, are vulnerable to heap-based buffer...
[]
null
null
7.8
null
ICSA-23-040-02
LS ELECTRIC XBC-DN32U
LS ELECTRIC XBC-DN32U with operating system version 01.80 is missing authentication to perform critical functions to the PLC. This could allow an attacker to change the PLC's mode arbitrarily.-CVE-2023-22803 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string i...
[]
null
null
7.5
null
ICSA-23-290-02
Rockwell Automation FactoryTalk Linx
FactoryTalk Linx, in the Rockwell Automation PanelView Plus, allows an unauthenticated threat actor to read data from memory via crafted malicious packets. Sending a size larger than the buffer size results in leakage of data from memory resulting in an information disclosure. If the size is large enough, it causes com...
[]
null
null
8.2
null
ICSA-22-258-01
Siemens Mobility CoreShield OWG Software
The default installation sets insecure file permissions that could allow a local attacker to escalate privileges to local administrator.
[]
null
7.8
null
null
ICSA-21-280-05
InHand Networks IR615 Router (Update A)
The affected product 's management portal does not contain an X-FRAME-OPTIONS header, which an attacker may take advantage of by sending a link to an administrator that frames the router 's management portal and could lure the administrator to perform changes.CVE-2021-38472 has been assigned to this vulnerability. A CV...
[]
null
null
9.8
null
ICSA-24-165-19
Motorola Solutions Vigilant License Plate Readers
The affected product is vulnerable to an attacker modifying the bootloader by using custom arguments to bypass authentication and gain access to the file system and obtain password hashes. An unauthorized user is able to gain access to sensitive data, including credentials, by physically retrieving the hard disk of the...
[]
null
6.8
null
null
ICSA-18-142-01
Martem TELEM-GW6/GWM (Update B)
The RTU does not perform authentication of IEC-104 control commands, which may allow a rogue node a remote control of the industrial process.CVE-2018-10603 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L). Using de...
[]
null
null
7.4
null
ICSA-23-269-03
Mitsubishi Electric FA Engineering Software
In all versions of Mitsubishi Electric GX Works3, code execution is possible due to permission issues. This could allow an attacker to cause information disclosure, tampering with and deletion of information, or a denial-of-service (DoS) condition.
[]
null
null
9.3
null
ICSA-21-257-20
Siemens LOGO! CMR and SIMATIC RTU 3000
The calculations performed in the third-party component Mbed TLS are not limited. Supplying overly large parameters could lead to denial-of-service condition when generating Diffie-Hellman key pairs.CVE-2020-36475 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector st...
[]
null
null
7.5
null
ICSA-23-241-01
PTC Codebeamer
If an attacker tricks an admin user of PTC Codebeamer into clicking on a malicious link, it may allow the attacker to inject arbitrary code to be executed in the browser on the target device.
[]
null
null
8.8
null
ICSA-23-215-04
Sensormatic Electronics VideoEdge
In Sensormatic VideoEdge versions prior to 6.1.1, a local user could edit the VideoEdge configuration file and interfere with VideoEdge operation.
[]
null
null
7.1
null
ICSA-24-065-01
Nice Linear eMerge E3-Series
Nice Linear eMerge E3-Series versions 1.00-06 and prior are vulnerable to path traversal. This could allow an attacker to gain unauthorized access to the system and sensitive data. Versions of Nice Linear eMerge E3-Series firmware 1.00-06 and prior are vulnerable to a file inclusion through path traversal, which could...
[]
null
6.1
9.8
null
ICSA-23-236-02
OPTO 22 SNAP PAC S1
There is no limit on the number of login attempts. This could allow a brute force attack on the built-in web server login. There are no requirements for setting a complex password, which could allow a successful brute force attack if users don't setup complex credentials. The File Transfer Protocol (FTP) port is open ...
[]
null
null
5.9
null
ICSA-22-067-02
AVEVA System Platform
The affected product stores sensitive information in cleartext, which may allow access to an attacker or a low-privileged user.CVE-2022-0835 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L).
[]
null
null
8.1
null
ICSA-21-040-03
Siemens SINEMA Server & SINEC NMS
When uploading files to an affected system using a zip container, the system does not correctly check if the relative file path of the extracted files is still within the intended target directory. With this an attacker could create or overwrite arbitrary files on an affected system. This type of vulnerability is also ...
[]
null
8.8
null
null
ICSA-24-046-08
Siemens RUGGEDCOM APE1808
A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication.
[]
null
5.3
null
null
ICSA-22-202-04
ICONICS Suite and Mitsubishi Electric MC Works64 Products
ICONICS MobileHMI and IoTWorX IoT Visualizer products are affected by a path traversal vulnerability. If exploited, then this could allow traversing of the file system and access to files or directories that are outside the restricted directory on the MobileHMI server or the IoTWorX IoT Visualizer server. This traversa...
[]
null
null
7.8
null
ICSA-18-172-01
Delta Electronics Delta Industrial Automation COMMGR
The application utilizes a fixed-length stack buffer where an unverified length value can be read from the network packets via a specific network port, causing the buffer to be overwritten. This may allow remote code execution, cause the application to crash, or result in a denial-of-service condition in the applicatio...
[]
null
null
7.3
null
ICSA-20-051-04
Auto-Maskin RP210E, DCU210E, and Marine Observer Pro (Android App)
The embedded web server software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.CVE-2018-5402 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H...
[]
null
null
7.5
null
ICSA-21-341-01
Hitachi Energy RTU500 OpenLDAP
A vulnerability exists in the affected OpenLDAP versions leading to an LDAP service crash in the parsing of a keystring, resulting in a denial-of-service condition.CVE-2020-36229 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/...
[]
null
null
7.5
null
ICSA-18-296-02
GAIN Electronic Co. Ltd SAGA1-L Series
This product is vulnerable to a replay attack and command forgery.CVE-2018-17903 has been assigned to this vulnerability. A CVSS v3 base score of 8.3 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H). This vulnerability may allow an attacker to force-pair the device without human inte...
[]
null
null
6.1
null
ICSA-23-138-01
Carlo Gavazzi Powersoft
Carlo Gavazzi Powersoft versions 2.1.1.1 and prior have a directory traversal vulnerability that can allow an attacker to access and retrieve any file through specially crafted GET requests to the server.
[]
null
null
7.5
null
ICSA-17-292-01
SpiderControl MicroBrowser
An uncontrolled search path element vulnerability has been identified which could be exploited by placing a specially crafted DLL file in the search path. If the malicious DLL is loaded prior to the valid DLL, an attacker could execute arbitrary code on the system.CVE-2017-14010 has been assigned to this vulnerability....
[]
null
null
8.8
null
ICSA-21-194-11
Siemens Teamcenter Active Workspace
By sending malformed requests, a remote attacker could leak an application token due to an error not properly handled by the system. A reflected cross-site scripting (XSS) vulnerability exists in the web interface of the affected devices that could allow an attacker to execute malicious JavaScript code by tricking user...
[]
null
5.3
null
null
ICSA-21-355-03
WECON LeviStudioU
The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.CVE-2021-23138 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The affected product is vuln...
[]
null
null
7.8
null
ICSA-21-208-01
KUKA KR C4
An attacker can gain full access (read/write/delete) to sensitive folders due to hard-coded credentials.CVE-2021-33016 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). An attacker can gain VxWorks Shell after login...
[]
null
null
8.8
null
ICSA-19-192-06
Schneider Electric Interactive Graphical SCADA System
An out-of-bounds vulnerability exists and could be exploited by the application processing a specially crafted project file. Exploitation could cause a software crash when data in the mdb database is manipulated or allow code execution.CVE-2019-6827 has been assigned to this vulnerability. A CVSS v3 base score of 7.0 h...
[]
null
null
7
null
ICSA-20-282-01
Johnson Controls Sensormatic Electronics American Dynamics victor Web Client and Software House C•CURE Web Client (Update A)
American Dynamics victor Web Client does not perform an authorization check when an attacker with access from an adjacent network attempts to delete arbitrary files on the system.CVE-2020-9048 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:A/AC:L/...
[]
null
null
7.1
null
ICSA-23-346-01
Schneider Electric Easy UPS Online Monitoring Software
A path traversal vulnerability exists that could cause arbitrary file deletion upon service restart when accessed by a local and low-privileged attacker.
[]
null
5.3
null
null
ICSA-21-350-13
Siemens Questa and ModelSim
The affected product is vulnerable to insufficiently protected keys required for decrypting intellectual property data, which could allow an attacker to discover the keys and bypass the protection intended by IEEE 1735 standard. CVE-2021-42023 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has bee...
[]
null
null
9
null
ICSMA-22-167-01
Hillrom Medical Device Management
The affected products contain hard-coded (unchangeable) passwords used for inbound authentication or outbound communication to external components.CVE-2022-26388 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L). The...
[]
null
null
7.7
null
ICSA-23-348-11
Siemens SINUMERIK
Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a denial of service condition. A restart is needed to restore normal operations.
[]
null
7.5
null
null
ICSA-22-179-02
Omron SYSMAC CS/CJ/CP Series and NJ/NX Series
Omron SYSMAC CS1/CJ1/CP1/CP2 series is vulnerable to a password used to restrict engineering operation is transmitted in plaintext. CVE-2022-31204 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N). The CP1W-CIF41 Ether...
[]
null
null
4.4
null
ICSA-20-196-04
Siemens SIMATIC HMI Panels
Unencrypted communication between the configuration software and the respective device could allow an attacker to capture potential plain text communication and have access to sensitive information.
[]
null
5.7
null
null
ICSA-22-088-03
Hitachi Energy LinkOne WebView
Multiple stored XSS vulnerabilities exist in the LinkOne application, allowing multiple web attacks and the theft of sensitive information.CVE-2021-40337 has been assigned to these vulnerabilities. A CVSS v3 base score of 4.2 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N). When an ...
[]
null
null
3.7
null
ICSA-23-103-06
Siemens SIPROTEC 5 Devices
Affected devices lack proper validation of http request parameters of the hosted web service. An unauthenticated remote attacker could send specially crafted packets that could cause denial of service condition of the target device.
[]
null
7.5
null
null
ICSA-21-357-02
Johnson Controls exacq Enterprise Manager
An attacker could enter malicious data into the affected product, causing remote code execution.CVE-2021-44228 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
[]
null
null
10
null
ICSA-22-286-06
Siemens Desigo PXM Devices
There exists an Improper Neutralization of Special Elements used in an OS Command with root privileges during a restore operation due to the missing validation of the names of files included in the input package. By restoring a specifically crafted package, a remote low-privileged attacker can execute arbitrary system ...
[]
null
8.8
null
null
ICSA-23-152-01
Advantech WebAccess/SCADA
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution. In Advantech ...
[]
null
null
7.2
null
ICSA-21-131-05
Siemens Mendix Database Replication Module
Uploading a table mapping using a manipulated XML File results in an exception that could expose information about the Application-Server and the used XML-Framework.
[]
null
4.3
null
null
ICSA-22-041-07
Siemens Solid Edge, JT2Go, and Teamcenter Visualization
The Datalogics APDFL library used in affected products is vulnerable to memory corruption condition while parsing specially crafted PDF files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15106, ZDI-CAN-15108, ZDI-CAN-15113). CVE-2021-38405 has been assig...
[]
null
7.8
null
null
ICSA-22-298-03
Siemens Siveillance Video Mobile Server
The mobile server component of affected applications improperly handles the log in for Active Directory accounts that are part of Administrators group. This could allow an unauthenticated remote attacker to access the application without a valid account.
[]
null
9.4
null
null
ICSA-23-131-13
PTC Vuforia Studio
The local Vuforia web application does not support HTTPS, and federated credentials are passed via basic authentication. CVE-2023-29168 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). An attacker with local access...
[]
null
null
5.7
null
ICSA-19-330-02
ABB Relion 650 and 670 Series
An attacker may use a specially crafted message to force the device to reboot, which could cause a denial of service.CVE-2019-18247 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[]
null
null
5.3
null