1
0
1
0
1
0
1
0
0
1
1
0
1
0
VulnHub

AI-Powered Cybersecurity Intelligence

Latest Intelligence

All CISA Advisories
Siemens RUGGEDCOM ROX II

The Siemens RUGGEDCOM ROX II family has a critical vulnerability that allows local attackers to bypass authentication and gain root access through the Built-In-Self-Test (BIST) mode. The vulnerability affects multiple models in the RUGGEDCOM ROX II family, and no fix is currently available. Read Original »


Impact: RUGGEDCOM ROX MX5000, RUGGEDCOM ROX RX1536, RUGGEDCOM ROX RX5000, RUGGEDCOM ROX MX5000RE, RUGGEDCOM ROX RX1400, RUGGEDCOM ROX RX1500, RUGGEDCOM ROX RX1501, RUGGEDCOM ROX RX1510, RUGGEDCOM ROX RX1511, RUGGEDCOM ROX RX1512, RUGGEDCOM ROX RX1524

Remediation: Ensure a secure boot password is set as described in the configuration manual to prevent unauthorized access to BIST mode.

PhishingCVEVulnerabilityUpdate

Added:

All CISA Advisories
Siemens SINEC OS

The article discusses vulnerabilities in Siemens products, particularly in the RUGGEDCOM and SCALANCE equipment, with various types of security flaws identified. These vulnerabilities could allow remote code execution and other serious security risks if exploited. Read Original »


Impact: Siemens RUGGEDCOM, Siemens SCALANCE

Remediation: Upgrade to versions 3.1 or later for affected products.

LinuxPhishingCVEVulnerabilityUpdate

Added:

All CISA Advisories
Siemens SIMATIC RTLS Locating Manager

The Siemens SIMATIC RTLS Locating Manager has a critical vulnerability due to improper input validation, allowing authenticated remote attackers to execute arbitrary code with high privileges. Users are advised to update to version 3.2 or later to mitigate this risk. Read Original »


Impact: Siemens SIMATIC RTLS Locating Manager: Versions prior to V3.2

Remediation: Update to V3.2 or later version; protect network access with appropriate mechanisms.

PhishingCVEVulnerabilityUpdate

Added:

All CISA Advisories
Siemens SIPROTEC 5

Siemens SIPROTEC 5 devices have a vulnerability that allows an attacker with physical access to exhaust the device's memory by sending high-bandwidth packets, potentially causing it to stop responding. This issue affects multiple versions of various SIPROTEC 5 models, necessitating updates to mitigate the risk. Read Original »


Impact: Siemens SIPROTEC 5 models including 6MD84, 7SD82, 7SD86, 7SJ81, and others listed in the advisory.

Remediation: Update to V10.0 or later version for affected products.

PhishingCVEVulnerabilityUpdate

Added:

All CISA Advisories
Rockwell Automation Studio 5000 Logix Designer

Rockwell Automation's Studio 5000 Logix Designer has a vulnerability due to improper input validation, which could allow an attacker to crash the device or execute malicious code. The affected versions range from 36.00.02 to 37.00.02, and users are advised to upgrade to version 37.00.02 or later to mitigate risks. Read Original »


Impact: Studio 5000 Logix Designer: Version 36.00.02 to 37.00.02

Remediation: Update to version 37.00.02 or later; apply security best practices.

PhishingCVEVulnerabilityUpdate

Added:

All CISA Advisories
Siemens SIMATIC RTLS Locating Manager

Siemens SIMATIC RTLS Locating Manager has two vulnerabilities that could allow local attackers to cause denial of service or escalate access rights. The vulnerabilities are related to insufficient input validation and credential protection, affecting all versions prior to 3.3. Read Original »


Impact: Siemens SIMATIC RTLS Locating Manager

Remediation: Update to V3.3 or later version; protect network access with appropriate mechanisms.

PhishingCVEVulnerabilityUpdate

Added:

All CISA Advisories
Rockwell FactoryTalk Linx

The article discusses a vulnerability in Rockwell Automation's FactoryTalk Linx, specifically an improper access control issue that allows attackers to manipulate FTLinx drivers by disabling token validation. The vulnerability has a CVSS v4 score of 8.4 and affects versions prior to 6.50. Read Original »


Impact: Rockwell Automation's FactoryTalk Linx: Versions prior to 6.50

Remediation: Update to v6.50; apply security best practices if unable to upgrade.

PhishingCVEVulnerabilityUpdate

Added:

All CISA Advisories
Siemens Web Installer

The Siemens Web Installer has a vulnerability that allows for uncontrolled search path elements, potentially enabling attackers to execute arbitrary code during application installation. As of January 10, 2023, CISA will not update advisories for these vulnerabilities, directing users to Siemens' ProductCERT for the latest information. Read Original »


Impact: Siemens products including Automation License Manager, SIMATIC WinCC, and various TIA Portal components.

Remediation: Not specified

WindowsPhishingCVEVulnerabilityUpdate

Added:

All CISA Advisories
Siemens SIMOTION SCOUT, SIMOTION SCOUT TIA, and SINAMICS STARTER

Siemens products SIMOTION SCOUT, SIMOTION SCOUT TIA, and SINAMICS STARTER are affected by a vulnerability that allows attackers to access arbitrary application files through improper XML external entity reference. CISA will no longer update advisories for these vulnerabilities, and users are advised to implement specific mitigations to reduce risk. Read Original »


Impact: SIMOTION SCOUT, SIMOTION SCOUT TIA, SINAMICS STARTER

Remediation: Do not open untrusted XML files in affected applications; update to specified versions; protect network access.

PhishingCVEVulnerabilityUpdate

Added:

All CISA Advisories
Siemens SINEC Traffic Analyzer

The Siemens SINEC Traffic Analyzer has multiple vulnerabilities that could allow attackers to cause denial-of-service conditions or gain elevated access to sensitive resources. As of January 10, 2023, CISA will no longer update advisories for these vulnerabilities, and users are advised to update to version 3.0 or later to mitigate risks. Read Original »


Impact: Siemens SINEC Traffic Analyzer (6GK8822-1BG01-0BA0)

Remediation: Update to V3.0 or later version; currently no fix available for CVE-2025-40770.

CVEVulnerabilityUpdate

Added:

All CISA Advisories
Rockwell Automation Micro800

The Rockwell Automation Micro800 series has multiple critical vulnerabilities that could lead to remote code execution and privilege escalation due to dependencies on vulnerable third-party components and improper input validation. Users are advised to update their systems to mitigate these risks. Read Original »


Impact: Rockwell Automation Micro800 series (Micro820, Micro850, Micro870)

Remediation: Migrate to updated versions (Micro820 L20E V23.011 and later, Micro850 L50E V23.011 and later, Micro870 L70E V23.011 and later) and follow published Security Best Practices.

CVEVulnerabilityUpdate

Added:

All CISA Advisories
Siemens COMOS

Siemens COMOS has a critical vulnerability classified as an out-of-bounds write, which could allow attackers to cause crashes or execute code. Users are advised to update to version 10.6 or later and ensure files are from trusted sources to mitigate risks. Read Original »


Impact: Siemens COMOS: all versions prior to V10.6

Remediation: Update to V10.6 or later version; ensure all files imported are from trusted sources.

PhishingCVEVulnerabilityUpdate

Added:

The Hacker News
Have You Turned Off Your Virtual Oven?

The article discusses the importance of performing safety checks in daily life, particularly focusing on ensuring that appliances like ovens and stoves are turned off before leaving home. This behavior is rooted in the desire to prevent potentially dangerous situations such as fires or break-ins. Read Original »


Impact: Not specified

Remediation: Not specified

Windows

Added:

SecurityWeek
‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks

The article discusses a new DDoS attack vector known as 'MadeYouReset', which exploits flaws in HTTP/2 implementations. This vulnerability has been likened to the previously known Rapid Reset attack. Read Original »


Impact: Not specified

Remediation: Not specified

Vulnerability

Added:

The Hacker News
New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits

Researchers have identified a new Android trojan named PhantomCard that exploits NFC technology to carry out relay attacks, enabling fraudulent banking transactions. This malware specifically targets banking customers in Brazil by relaying data from victims' banking cards to the fraudster's device. Read Original »


Impact: Banking customers in Brazil

Remediation: Not specified

Android

Added: