Page 2 of 9 results (0.010 seconds)

CVSS: 6.2EPSS: 0%CPEs: 6EXPL: 0

A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions). The know-how protection feature in affected products does not properly update the encryption of existing program blocks when a project file is updated. This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the knowledge of the know-how protection password. • https://cert-portal.siemens.com/productcert/pdf/ssa-042050.pdf • CWE-693: Protection Mechanism Failure •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

A vulnerability has been identified in SIMATIC PCS neo (Administration Console) (All versions < V3.1 SP1), SINETPLAN (All versions), TIA Portal (V15, V15.1, V16 and V17). The affected system cannot properly process specially crafted packets sent to port 8888/tcp. A remote attacker could exploit this vulnerability to cause a Denial-of-Service condition. The affected devices must be restarted manually. Se ha identificado una vulnerabilidad en SIMATIC PCS neo (Consola de Administración) (todas las versiones anteriores a V3.1 SP1), SINETPLAN (Todas las versiones), TIA Portal (versiones V15, V15.1, V16 y V17). • https://cert-portal.siemens.com/productcert/pdf/ssa-711829.pdf • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

A vulnerability has been identified in PCS neo (Administration Console) (All versions < V3.1), TIA Portal (V15, V15.1 and V16). Manipulating certain files in specific folders could allow a local attacker to execute code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. Se ha identificado una vulnerabilidad en PCS neo (Consola de administración) (Todas las versiones anteriores a la versión V3.1), TIA Portal (V15, V15.1 y V16). La manipulación de determinados archivos en carpetas específicas podría permitir a un atacante local ejecutar código con privilegios SYSTEM. • https://cert-portal.siemens.com/productcert/pdf/ssa-428051.pdf https://us-cert.cisa.gov/ics/advisories/icsa-21-040-05 https://www.kb.cert.org/vuls/id/466044 • CWE-284: Improper Access Control CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in TIA Portal V14 (All versions), TIA Portal V15 (All versions < V15.1 Update 7), TIA Portal V16 (All versions < V16 Update 6), TIA Portal V17 (All versions < V17 Update 4). Changing the contents of a configuration file could allow an attacker to execute arbitrary code with SYSTEM privileges. The security vulnerability could be exploited by an attacker with a valid account and limited access rights on the system. No user interaction is required. At the time of advisory publication no public exploitation of this security vulnerability was known. • https://cert-portal.siemens.com/productcert/pdf/ssa-629512.pdf • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •