Page 12 of 127 results (0.006 seconds)

CVSS: 6.7EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in SIMATIC WinCC OA UI for Android (All versions < V3.15.10), SIMATIC WinCC OA UI for iOS (All versions < V3.15.10). Insufficient limitation of CONTROL script capabilities could allow read and write access from one HMI project cache folder to other HMI project cache folders within the app's sandbox on the same mobile device. This includes HMI project cache folders of other configured WinCC OA servers. The security vulnerability could be exploited by an attacker who tricks an app user to connect to an attacker-controlled WinCC OA server. Successful exploitation requires user interaction and read/write access to the app's folder on a mobile device. • http://www.securityfocus.com/bid/103475 https://cert-portal.siemens.com/productcert/pdf/ssa-822928.pdf https://ics-cert.us-cert.gov/advisories/ICSA-18-081-01 • CWE-269: Improper Privilege Management CWE-284: Improper Access Control •

CVSS: 4.9EPSS: 0%CPEs: 3EXPL: 0

An Improper Input Validation issue was discovered in Siemens SIMATIC PCS 7 V8.1 prior to V8.1 SP1 with WinCC V7.3 Upd 13, and V8.2 all versions. The improper input validation vulnerability has been identified, which may allow an authenticated remote attacker who is a member of the administrators group to crash services by sending specially crafted messages to the DCOM interface. Se ha descubierto un problema de validación incorrecta de entradas en Siemens SIMATIC PCS 7 V8.1 en versiones anteriores a V8.1 SP1 con WinCC V7.3 Upd 13 y V8.2 en todas las versiones. Se ha identificado la vulnerabilidad de validación incorrecta de entradas, que podría permitir que un atacante remoto autenticado que sea miembro del grupo de administradores provoque el cierre inesperado de servicios mediante el envío de mensajes especialmente manipulados a la interfaz DCOM. • http://www.securityfocus.com/bid/101680 http://www.securitytracker.com/id/1039729 https://ics-cert.us-cert.gov/advisories/ICSA-17-306-01 • CWE-20: Improper Input Validation •

CVSS: 8.2EPSS: 0%CPEs: 4EXPL: 0

An XXE vulnerability has been identified in OPC Foundation UA .NET Sample Code before 2017-03-21 and Local Discovery Server (LDS) before 1.03.367. Among the affected products are Siemens SIMATIC PCS7 (All versions V8.1 and earlier), SIMATIC WinCC (All versions < V7.4 SP1), SIMATIC WinCC Runtime Professional (All versions < V14 SP1), SIMATIC NET PC Software, and SIMATIC IT Production Suite. By sending specially crafted packets to the OPC Discovery Server at port 4840/tcp, an attacker might cause the system to access various resources chosen by the attacker. Se ha identificado una vulnerabilidad XXE en OPC Foundation UA .NET Sample Code antes del 21-03-2017 y Local Discovery Server (LDS) antes de la versión 1.03.367. Los siguientes productos se han visto afectados por esta vulnerabilidad, entre otros: Siemens SIMATIC PCS7 (todas las versiones V8.1 y anteriores), SIMATIC WinCC (todas las versiones anteriores a V7.4 SP1), SIMATIC WinCC Runtime Professional (todas las versiones anteriores a V14 SP1), SIMATIC NET PC Software y SIMATIC IT Production Suite. • http://www.securityfocus.com/bid/100559 http://www.securitytracker.com/id/1039510 https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2017-12069.pdf https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-535640.pdf • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 0

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2) and SIMATIC WinCC Sm@rtClient for Android Lite (All versions before V1.0.2.2). An attacker with physical access to an unlocked mobile device, that has the affected app running, could bypass the app's authentication mechanism under certain conditions. Se ha descubierto una vulnerabilidad en Siemens SIMATIC WinCC Sm@rtClient para Android (todas las versiones anteriores a la V1.0.2.2) y SIMATIC WinCC Sm@rtClient para Android Lite (todas las versiones anteriores a la V1.0.2.2). Un atacante con acceso físico a un dispositivo móvil desbloqueado que esté ejecutando la app afectada podría eludir el mecanismo de autenticación de la app bajo ciertas condiciones. • http://www.securityfocus.com/bid/99582 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf • CWE-287: Improper Authentication CWE-288: Authentication Bypass Using an Alternate Path or Channel •

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack. Se ha descubierto una vulnerabilidad en Siemens SIMATIC WinCC Sm@rtClient para Android (todas las versiones anteriores a la V1.0.2.2). La implementación del protocolo TLS existente podría permitir que un atacante lea y modifique datos en una sesión TLS mientras realiza un ataque Man-in-the-Middle (MitM). • http://www.securityfocus.com/bid/99582 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-589378.pdf • CWE-300: Channel Accessible by Non-Endpoint •