VulnHub

AI-Powered Cybersecurity Intelligence

Last Update Check:

Latest Intelligence

All CISA Advisories
Siemens SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems

Siemens SIRIUS 3SK2 Safety Relays and 3RK3 Modular Safety Systems have multiple vulnerabilities that could allow attackers to exploit weak cryptographic algorithms and access sensitive information. The vulnerabilities pose significant risks, including the potential retrieval of safety passwords and eavesdropping on connections.


Impact: ["SIRIUS 3RK3 Modular Safety System (MSS)", "SIRIUS Safety Relays 3SK2"]

In the Wild: No

Age: Recently disclosed

Remediation: Currently no fix is available; users are advised to limit physical access and ensure network isolation.

CVE Vulnerability Update

Published:

All CISA Advisories
Siemens SCALANCE LPE9403

The Siemens SCALANCE LPE9403 has multiple vulnerabilities that could compromise the confidentiality, integrity, and availability of affected devices. These vulnerabilities, including incorrect permission assignments and various forms of injection attacks, pose significant security risks, especially since they can be exploited by local attackers with low complexity.


Impact: ["SCALANCE LPE9403 (6GK5998-3GS00-2AC2)"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: See source

Phishing CVE Exploit Vulnerability Update

Published:

All CISA Advisories
Siemens SIMATIC PCS neo

The Siemens SIMATIC PCS neo has a significant vulnerability related to insufficient session expiration, allowing remote attackers to reuse legitimate user sessions after logout. This issue affects multiple versions of the software and poses a risk to critical manufacturing sectors globally.


Impact: ["SIMATIC PCS neo V4.1: All versions prior to V4.1 Update 3", "SIMATIC PCS neo V5.0: All versions prior to V5.0 Update 1"]

In the Wild: No

Age: Recently disclosed

Remediation: Update to the latest versions: V4.1 Update 3 or later for V4.1 and V5.0 Update 1 or later for V5.0.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
Siemens User Management Component (UMC)

The Siemens User Management Component (UMC) has several vulnerabilities that could allow unauthenticated remote attackers to cause denial-of-service conditions. These vulnerabilities affect multiple Siemens products, and users are advised to implement specific mitigations and updates to reduce risks.


Impact: ["Siemens SIMATIC PCS neo V4.1", "Siemens SIMATIC PCS neo V5.0", "Siemens SINEC NMS", "Siemens SINEMA Remote Connect", "Siemens Totally Integrated Automation Portal (TIA Portal) V17", "Siemens Totally Integrated Automation Portal (TIA Portal) V18", "Siemens Totally Integrated Automation Portal (TIA Portal) V19", "Siemens Totally Integrated Automation Portal (TIA Portal) V20", "Siemens User Management Component (UMC)"]

In the Wild: No

Age: Recently disclosed

Remediation: Update to UMC version 2.15.1.1 or later; block TCP ports 4002 and 4004 in non-networked scenarios.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
Siemens INTRALOG WMS

The article discusses multiple vulnerabilities in Siemens INTRALOG WMS, all versions prior to v5, which could allow attackers to bypass security features, cause denial-of-service conditions, or execute arbitrary code. Siemens has released a new version to address these vulnerabilities, emphasizing the importance of updating and securing network access.


Impact: ["Siemens INTRALOG WMS"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Update to version V5 of INTRALOG WMS or later and implement recommended security measures.

Phishing CVE Microsoft Vulnerability Update

Published:

All CISA Advisories
Siemens RUGGEDCOM APE1808 Devices

Siemens RUGGEDCOM APE1808 devices are vulnerable to two significant issues: insufficiently protected credentials and an out-of-bounds write, which could allow attackers to retrieve LDAP credentials or trigger a denial-of-service condition. Successful exploitation could have serious implications for critical manufacturing sectors worldwide.


Impact: ["Siemens RUGGEDCOM APE1808 Devices"]

In the Wild: No

Age: Recently disclosed

Remediation: Contact customer support for patches, configure VPN settings appropriately, and follow Siemens' operational guidelines for industrial security.

Phishing CVE Fortinet Vulnerability Patch Update

Published:

All CISA Advisories
Siemens Teamcenter Visualization

Siemens Teamcenter Visualization has a critical vulnerability, categorized as an out-of-bounds read, which could allow attackers to execute code in the context of the current process. The vulnerability affects multiple versions of the software, and while there is no known public exploitation reported, users are advised to take defensive measures.


Impact: ["Siemens Teamcenter Visualization V14.3 (All versions prior to V14.3.0.14)", "Siemens Teamcenter Visualization V2312 (All versions prior to V2312.0010)", "Siemens Teamcenter Visualization V2406 (All versions prior to V2406.0008)", "Siemens Teamcenter Visualization V2412 (All versions prior to V2412.0004)"]

In the Wild: No

Age: Recently disclosed

Remediation: Update to the specified versions or later, do not open untrusted WRL files.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
Siemens SIPROTEC and SICAM

A critical vulnerability has been identified in Siemens' SIPROTEC and SICAM products, allowing attackers to gain unauthorized network access without valid credentials. This issue, linked to improper message integrity enforcement in RADIUS communications, poses significant risks to critical infrastructure sectors worldwide.


Impact: ["SIPROTEC 5 Compact 7SX800", "SIPROTEC 5 7SA82", "SIPROTEC 5 7SD82", "SIPROTEC 5 7SJ81", "SIPROTEC 5 7SJ82", "SIPROTEC 5 7SK82", "SIPROTEC 5 7SL82", "SIPROTEC 5 7UT82", "POWER METER SICAM Q100 family", "POWER METER SICAM Q200 family", "SICAM GridPass", "SICORE Base system"]

In the Wild: No

Age: Recently disclosed

Remediation: Update to the latest software versions and apply specific countermeasures as recommended by Siemens.

CVE Vulnerability Update

Published:

All CISA Advisories
Siemens BACnet ATEC Devices

Siemens BACnet ATEC devices are vulnerable to an improper input validation issue that could allow an attacker on the same network to trigger a denial of service condition. This vulnerability, identified as CVE-2025-40556, poses a significant risk as it requires a power cycle to restore normal operation and has been assigned a CVSS v4 score of 7.1.


Impact: ["Siemens BACnet ATEC 550-440", "Siemens BACnet ATEC 550-441", "Siemens BACnet ATEC 550-445", "Siemens BACnet ATEC 550-446"]

In the Wild: No

Age: Recently disclosed

Remediation: None available

CVE Vulnerability Update

Published:

All CISA Advisories
Siemens VersiCharge AC Series EV Chargers

Siemens VersiCharge AC Series EV Chargers have been identified with critical vulnerabilities that could allow attackers to gain control over the chargers or execute arbitrary code. The vulnerabilities stem from a missing immutable root of trust in hardware and insecure default initialization, posing significant security risks.


Impact: ["Siemens IEC 1Ph 7.4kW Child socket (8EM1310-2EH04-0GA0)", "Siemens IEC 1Ph 7.4kW Parent socket (8EM1310-2EH04-3GA1)", "Siemens IEC 1Ph 7.4kW Parent socket incl. SIM (8EM1310-2EH04-3GA2)", "Siemens IEC 3Ph 22kW Child cable 7m (8EM1310-3EJ04-0GA0)", "Siemens IEC 3Ph 22kW Parent socket (8EM1310-3EH04-3GA1)"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Update to versions V2.135 or later as recommended by Siemens.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
Siemens Desigo

A critical vulnerability in Siemens Desigo CC allows unauthenticated remote attackers to execute arbitrary SQL queries on the server database. This issue poses significant risks, particularly in commercial and critical manufacturing sectors, and requires immediate attention to mitigate potential exploitation.


Impact: ["Siemens Desigo CC"]

In the Wild: No

Age: Recently disclosed

Remediation: Restrict access to the server's event port, disable support for Installed Clients, and follow Siemens' operational guidelines for industrial security.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
Siemens IPC RS-828A

The Siemens IPC RS-828A has a critical vulnerability allowing authentication bypass via spoofing, which could lead to unauthorized access and compromise system integrity. This issue, assigned CVE-2024-54085, poses significant risks to various critical infrastructure sectors worldwide.


Impact: ["Siemens IPC RS-828A"]

In the Wild: No

Age: Recently disclosed

Remediation: Limit access to the BMC network interface to trusted networks, follow Siemens' operational guidelines for industrial security, and monitor for malicious activity.

CVE Vulnerability Update

Published:

All CISA Advisories
Siemens OZW Web Servers

Siemens OZW Web Servers have critical vulnerabilities related to OS command injection and SQL injection, which could allow unauthorized remote access and execution of arbitrary code with root privileges. These vulnerabilities pose significant risks to critical manufacturing sectors worldwide, necessitating immediate attention and remediation.


Impact: ["OZW672: Versions prior to V8.0", "OZW672: Versions prior to V6.0", "OZW772: Versions prior to V8.0", "OZW772: Versions prior to V6.0"]

In the Wild: No

Age: Recently disclosed

Remediation: Update to V8.0 or later for OZW672 and OZW772; Update to V6.0 or later for OZW672 and OZW772.

Phishing CVE Vulnerability Update

Published:

The Hacker News
Pen Testing for Compliance Only? It's Time to Change Your Approach

The article emphasizes the risks of relying solely on annual penetration testing for compliance, highlighting that vulnerabilities can be introduced during routine updates and exploited before the next test cycle. This underscores the need for continuous security practices rather than a one-time compliance check.


Impact: Not specified

In the Wild: Yes

Age: Unknown

Remediation: Implement continuous security practices and regular vulnerability assessments.

Vulnerability Update

Published:

SecurityWeek
Chinese Hackers Hit Drone Sector in Supply Chain Attacks

The China-linked hacking group Earth Ammit has conducted multi-wave supply chain attacks targeting the drone sector in Taiwan and South Korea. This disruption highlights the growing threat to critical technology sectors from state-sponsored cyber activities.


Impact: ["Drone sector"]

In the Wild: Yes

Age: Recently disclosed

Remediation: None available

Published: