CVE-2023-46096
https://notcve.org/view.php?id=CVE-2023-46096
A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). The PUD Manager of affected products does not properly authenticate users in the PUD Manager web service. This could allow an unauthenticated adjacent attacker to generate a privileged token and upload additional documents. Se ha identificado una vulnerabilidad en SIMATIC PCS neo (todas las versiones < V4.1). El PUD Manager de los productos afectados no autentica adecuadamente a los usuarios en el servicio web PUD Manager. • https://cert-portal.siemens.com/productcert/pdf/ssa-456933.pdf • CWE-306: Missing Authentication for Critical Function •
CVE-2023-38558
https://notcve.org/view.php?id=CVE-2023-38558
A vulnerability has been identified in SIMATIC PCS neo (Administration Console) V4.0 (All versions), SIMATIC PCS neo (Administration Console) V4.0 Update 1 (All versions). The affected application leaks Windows admin credentials. An attacker with local access to the Administration Console could get the credentials, and impersonate the admin user, thereby gaining admin access to other Windows systems. Se ha identificado una vulnerabilidad en SIMATIC PCS neo (Consola de administración) V4.0 (todas las versiones), SIMATIC PCS neo (Consola de administración) V4.0 Update 1 (todas las versiones). La aplicación afectada pierde las credenciales de administrador de Windows. • https://cert-portal.siemens.com/productcert/pdf/ssa-646240.pdf • CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory CWE-668: Exposure of Resource to Wrong Sphere •
CVE-2022-27194
https://notcve.org/view.php?id=CVE-2022-27194
A vulnerability has been identified in SIMATIC PCS neo (Administration Console) (All versions < V3.1 SP1), SINETPLAN (All versions), TIA Portal (V15, V15.1, V16 and V17). The affected system cannot properly process specially crafted packets sent to port 8888/tcp. A remote attacker could exploit this vulnerability to cause a Denial-of-Service condition. The affected devices must be restarted manually. Se ha identificado una vulnerabilidad en SIMATIC PCS neo (Consola de Administración) (todas las versiones anteriores a V3.1 SP1), SINETPLAN (Todas las versiones), TIA Portal (versiones V15, V15.1, V16 y V17). • https://cert-portal.siemens.com/productcert/pdf/ssa-711829.pdf • CWE-400: Uncontrolled Resource Consumption •
CVE-2021-41057
https://notcve.org/view.php?id=CVE-2021-41057
In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions. En WIBU CodeMeter Runtime versiones anteriores a 7.30a, la creación de un enlace simbólico CmDongles diseñado sobrescribirá el archivo enlazado sin comprobar los permisos • https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf https://www.wibu.com/us/support/security-advisories.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2021-20093
https://notcve.org/view.php?id=CVE-2021-20093
A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server. Se presenta una vulnerabilidad de lectura excesiva del búfer en Wibu-Systems CodeMeter versiones anteriores a 7.21a. Un atacante remoto no autenticado puede explotar este problema para revelar el contenido de la memoria de la pila o bloquear el CodeMeter Runtime Server • https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210423-01.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-675303.pdf https://us-cert.cisa.gov/ics/advisories/icsa-21-210-02 https://www.tenable.com/security/research/tra-2021-24 • CWE-125: Out-of-bounds Read •