CVE-2024-54015 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 8.7
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Siemens
Equipment: SIPROTEC 5 Devices
Vulnerability: Use of Default Credentials
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an unauthenticated, remote attacker to retrieve sensitive information of the device.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
Siemens SIPROTEC 5 7VE85 (CP300): Version V8.80 up to but not including V9.90
Siemens SIPROTEC 5 7SS85 (CP300): Version V8.80 up to but not including V9.90
Siemens SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 2): All versions prior to V9.90
Siemens SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.2): All versions prior to V9.90
Siemens SIPROTEC 5 7UT82 (CP150): All versions prior to V9.90
Siemens SIPROTEC 5 7UT85 (CP300): Version V8.80 up to but not including V9.90
Siemens SIPROTEC 5 6MD84 (CP300): All versions prior to V9.90
Siemens SIPROTEC 5 7SJ82 (CP150): All versions prior to V9.90
Siemens SIPROTEC 5 7SL86 (CP300): Version V8.80 up to but not including V9.90
Siemens SIPROTEC 5 7KE85 (CP300): Versions later than an...
CVSS: HIGH (7.5) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|
CVE-2024-54089 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 8.7
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Siemens
Equipment: APOGEE PXC and TALON TC Series
Vulnerabilities: Inadequate Encryption Strength, Out-of-bounds Read
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to perform a denial of service using a out-of-bounds read forcing the device to enter a cold state and a vulnerability that would allow an attacker to decrypt the passwords of the device.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
APOGEE PXC Series (P2 Ethernet): All versions
APOGEE PXC Series (BACnet): All versions
TALON TC Series (BACnet): All versions
3.2 VULNERABILITY OVERVIEW
3.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326
Affected devices contain a weak encryption mechanism with a hard-coded key allowing an attacker to guess or reverse engineer the password from the cyphertext.
CVE-2024-54089 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
A CVSS v4 score has also been calculat...
CVSS: HIGH (7.5) EPSS Score: 0.09%
February 13th, 2025 (5 months ago)
|
CVE-2025-23363 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v3 7.4
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Siemens
Equipment: Teamcenter
Vulnerability: URL Redirection to Untrusted Site ('Open Redirect')
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to redirect the legitimate user to an attacker-controlled URL to steal valid session data.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
Siemens Teamcenter: All versions prior to V14.3.0.0
3.2 VULNERABILITY OVERVIEW
3.2.1 URL REDIRECTION TO UNTRUSTED SITE ('OPEN REDIRECT') CWE-601
The SSO login service of affected applications accepts user-controlled input that could specify a link to an external site. This could allow an attacker to redirect the legitimate user to an attacker-controlled URL to steal valid session data. For a successful exploit, the legitimate user must actively click on an attacker-crafted link.
CVE-2025-23363 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N).
3.3 BACKGROUND
CRITICAL INFRAST...
CVSS: HIGH (7.4) EPSS Score: 0.06%
February 13th, 2025 (5 months ago)
|
CVE-2025-23403 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 7.3
ATTENTION: Exploitable locally
Vendor: Siemens
Equipment: SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor
Vulnerability: Incorrect Permission Assignment for Critical Resource
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an authenticated attacker to achieve privilege escalation or bypass security measures.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
SMATIC IPC DiagMonitor: All versions
SIMATIC IPC DiagBase: All versions
3.2 VULNERABILITY OVERVIEW
3.2.1 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732
The affected device do not properly restrict the user permission for the registry key. This could allow an authenticated attacker to load vulnerable drivers into the system leading to privilege escalation or bypassing endpoint protection and other security measures.
CVE-2025-23403 has been assigned to this vulnerability. A CVSS v3 base score of 7.0 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2025-23403. A base score of 7.3 ...
CVSS: HIGH (7.0) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|
CVE-2025-24811 |
Description: As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
View CSAF
1. EXECUTIVE SUMMARY
CVSS v4 8.7
ATTENTION: Exploitable remotely/low attack complexity
Vendor: Siemens
Equipment: SIMATIC S7-1200 CPU Family
Vulnerabilities: Improper Resource Shutdown or Release, Improper Validation of Syntactic Correctness of Input
2. RISK EVALUATION
The affected devices do not correctly process certain special crafted packets sent to Port 80/tcp and Port 102/tcp, which could allow an attacker to cause a denial of service in the device.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports the following products are affected:
Siemens SIPLUS S7-1200 CPU 1214 DC/DC/RLY (6AG1214-1HG40-2XB0): vers:all/
Siemens SIPLUS S7-1200 CPU 1212 DC/DC/RLY (6AG1212-1HE40-2XB0): vers:all/
Siemens SIPLUS S7-1200 CPU 1214FC DC/DC/DC (6AG1214-1AF40-5XB0): vers:all/
Siemens SIPLUS S7-1200 CPU 1214C DC/DC/DC RAIL (6AG2214-1AG40-1XB0): vers:all/
Siemens SIPLUS S7-1200 CPU 1214 AC/DC/RLY (6AG1214-1BG40-5XB0): vers:all/
Siemens SIPLUS S7-1200 CPU 1214 DC/DC/DC (6AG1214-1AG40-2XB0): vers:all/
Siemens SIMATIC S7-1200 CPU 1211C AC/DC/Rly (6ES7211-1BE40-0XB0): vers:all/
Siemens SIMATIC S7-1200 CPU 1215C AC/DC/Rly (6ES7215-1BG40-0XB0): vers:all/
Siemens SIPL...
CVSS: HIGH (7.5) EPSS Score: 0.05%
February 13th, 2025 (5 months ago)
|
CVE-2025-0110 |
CVSS: HIGH (8.6) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|
CVE-2025-0108 |
CVSS: HIGH (8.8) EPSS Score: 96.76%
February 13th, 2025 (5 months ago)
|
CVE-2025-0111 |
CVSS: HIGH (7.1) EPSS Score: 2.94%
February 13th, 2025 (5 months ago)
|
CVE-2025-26520 |
Description: Cacti through 1.2.29 allows SQL injection in the template function in host_templates.php via the graph_template parameter. NOTE: this issue exists because of an incomplete fix for CVE-2024-54146.
CVSS: HIGH (7.6) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|
CVE-2025-26378 |
Description: A CWE-862 "Missing Authorization" in maxprofile/users/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated (low-privileged) attacker to reset passwords, including the ones of administrator accounts, via crafted HTTP requests.
CVSS: HIGH (8.8) EPSS Score: 0.04%
February 13th, 2025 (5 months ago)
|