Page 8 of 1803 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in SENTRON 3KC ATC6 Expansion Module Ethernet (3KC9000-8TL75) (All versions). Affected devices expose an unused, unstable http service at port 80/tcp on the Modbus-TCP Ethernet. This could allow an attacker on the same Modbus network to create a denial of service condition that forces the device to reboot. Se ha identificado una vulnerabilidad en SENTRON 3KC ATC6 Expansion Module Ethernet (3KC9000-8TL75) (Todas las versiones). Los dispositivos afectados exponen un servicio http inestable y no utilizado en el puerto 80/tcp en Modbus-TCP Ethernet. • https://cert-portal.siemens.com/productcert/html/ssa-918992.html • CWE-912: Hidden Functionality •

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 0

A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems improperly handles memory buffers when parsing X.509 certificates. This could allow an unauthenticated remote attacker to crash the network service. Se ha identificado una vulnerabilidad en Cerberus PRO EN Engineering Tool (todas las versiones), Cerberus PRO EN Fire Panel FC72x (todas las versiones &lt; IP8 SR4), Cerberus PRO EN X200 Cloud Distribution (todas las versiones &lt; V4.3.5618), Cerberus PRO EN X300 Cloud Distribución (todas las versiones &lt; V4.3.5617), Sinteso FS20 EN Engineering Tool (todas las versiones), Sinteso FS20 EN Fire Panel FC20 (todas las versiones &lt; MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution (todas las versiones &lt; V4.3.5618), Sinteso Distribución en la nube FS20 EN X300 (todas las versiones • https://cert-portal.siemens.com/productcert/html/ssa-225840.html https://cert-portal.siemens.com/productcert/html/ssa-953710.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 0

A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems insufficiently validates HMAC values which might result in a buffer overread. This could allow an unauthenticated remote attacker to crash the network service. Se ha identificado una vulnerabilidad en Cerberus PRO EN Engineering Tool (todas las versiones), Cerberus PRO EN Fire Panel FC72x (todas las versiones &lt; IP8 SR4), Cerberus PRO EN X200 Cloud Distribution (todas las versiones &lt; V4.3.5618), Cerberus PRO EN X300 Cloud Distribución (todas las versiones &lt; V4.3.5617), Sinteso FS20 EN Engineering Tool (todas las versiones), Sinteso FS20 EN Fire Panel FC20 (todas las versiones &lt; MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution (todas las versiones &lt; V4.3.5618), Sinteso Distribución en la nube FS20 EN X300 (todas las versiones • https://cert-portal.siemens.com/productcert/html/ssa-225840.html https://cert-portal.siemens.com/productcert/html/ssa-953710.html • CWE-125: Out-of-bounds Read •

CVSS: 10.0EPSS: 0%CPEs: 9EXPL: 0

A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions < IP8), Cerberus PRO EN Fire Panel FC72x IP6 (All versions < IP6 SR3), Cerberus PRO EN Fire Panel FC72x IP7 (All versions < IP7 SR5), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions < V3.0.6602), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.0.5016), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions < V3.2.6601), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.2.5015), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions < MP8), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions < MP6 SR3), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions < MP7 SR5), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions < V3.0.6602), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions < V3.2.6601), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.2.5015), Sinteso Mobile (All versions < V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow. This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges. Se ha identificado una vulnerabilidad en Cerberus PRO EN Engineering Tool (todas las versiones &lt; IP8), Cerberus PRO EN Fire Panel FC72x (todas las versiones &lt; IP8), Cerberus PRO EN X200 Cloud Distribution (todas las versiones &lt; V4.0.5016), Cerberus PRO EN X300 Distribución en la nube (todas las versiones &lt; V4.2.5015), herramienta de ingeniería Sinteso FS20 EN (todas las versiones &lt; MP8), central de incendios Sinteso FS20 EN FC20 (todas las versiones &lt; MP8), distribución en la nube Sinteso FS20 EN X200 (todas las versiones &lt; V4.0.5016) , Sinteso FS20 EN X300 Cloud Distribution (todas las versiones • https://cert-portal.siemens.com/productcert/html/ssa-225840.html https://cert-portal.siemens.com/productcert/html/ssa-953710.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected applications contain a stack overflow vulnerability while parsing specially crafted PSOBJ files. This could allow an attacker to execute code in the context of the current process. Se ha identificado una vulnerabilidad en Tecnomatix Plant Simulation V2201 (Todas las versiones &lt; V2201.0012), Tecnomatix Plant Simulation V2302 (Todas las versiones &lt; V2302.0006). Las aplicaciones afectadas contienen una vulnerabilidad de desbordamiento en la región stack de la memoria al analizar archivos PSOBJ especialmente manipulados. • https://cert-portal.siemens.com/productcert/html/ssa-017796.html • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •