Page 3 of 13 results (0.002 seconds)

CVSS: 10.0EPSS: 2%CPEs: 12EXPL: 0

Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allow user-assisted remote attackers to execute arbitrary code via a crafted project file, related to the HMI web server and runtime loader. Siemens WinCC flexible 2004, 2005, 2007 y 2008; WinCC V11 (TIA portal); TP, OP, MP, Comfort Panels y Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced y WinCC flexible Runtime permiten a atacantes remotos asistidos por el usuario ejecutar código arbitrario a través de un archivo de proyecto, relacionado con un servidor web y el cargador de tiempo de ejecución ("runtime loader"). • http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf •

CVSS: 10.0EPSS: 0%CPEs: 12EXPL: 0

The TELNET daemon in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not perform authentication, which makes it easier for remote attackers to obtain access via a TCP session. El demonio TELNET de Siemens WinCC flexible 2004, 2005, 2007 y 2008; WinCC V11 (TIA portal); TP, OP, MP, Comfort Panels y Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; y WinCC flexible Runtime no realiza autenticación, lo que facilita a atacantes remotos obtener acceso obtener acceso a través de una sesión TCP. • http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-345442.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf • CWE-287: Improper Authentication •

CVSS: 9.3EPSS: 5%CPEs: 2EXPL: 0

Heap-based buffer overflow in the Siemens WinCC Runtime Advanced Loader, as used in SIMATIC WinCC flexible Runtime and SIMATIC WinCC (TIA Portal) Runtime Advanced, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted packet to TCP port 2308. Desbordamiento de buffer de memoria dinámica en Siemens WinCC Runtime Advanced Loader, tal como se usa en SIMATIC WinCC flexible Runtime y SIMATIC WinCC (TIA Portal) Runtime Advanced, permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria) o posiblemente ejecutar código arbitrario a través de un paquete modificado al puerto TCP 2308. • http://cache.automation.siemens.com/dnl/jI/jI0NDY5AAAA_29054992_FAQ/Siemens_Security_Advisory_SSA-460621_V1_2.pdf http://secunia.com/advisories/46011 http://support.automation.siemens.com/WW/view/en/29054992 http://www.us-cert.gov/control_systems/pdf/ICSA-11-244-01.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/69803 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •