Contact
(877) 208-4091
info@sofiaitc.com

News

BD Kiestra and InoquIA Systems

1. EXECUTIVE SUMMARY CVSS v3 6.3 ATTENTION: Exploitable from adjacent network Vendor: Becton, Dickinson and Company (BD) Equipment: BD Kiestra and InoqulA systems Vulnerabilities: Product UI does not Warn User of Unsafe Actions 2. RISK EVALUATION Successful exploitation of these vulnerabilities may lead to loss or corruption of data. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS BD reports these vulnerabilities affect applications used by the following BD Kiestra systems: BD Kiestra TLA, BD ...

Martem TELEM-GW6/GWM

1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Martem Equipment: TELEM-GW6/GWM Vulnerabilities: Missing Authentication for Critical Function, Resource Exhaustion, Cross-Site Scripting 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow execution of unauthorized industrial process control commands, denial of service, or client-side code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following TELEM products with insecure configurations are affected: GW6 Version 2018.04.18-linux_4-01-601cb47 and prior, ...

U.S. Army Ranger killed in motorcycle accident

1 / 1 Show Caption +

Shining a Light on OAuth Abuse with PwnAuth

Introduction Spear phishing attacks are seen as one of the biggest cyber threats to an organization. It only takes one employee to enter their credentials or run some malware for an entire organization to become compromised. As such, companies devote significant resources to preventing credential harvesting and payload-driven social engineering attacks. Less attention, however, has ...

Medtronic N'Vision Clinician Programmer

1. EXECUTIVE SUMMARY CVSS v3 4.6 ATTENTION: Low skill level to exploit Vendor: Medtronic Equipment: N’Vision Clinician Programmer Vulnerability: Missing Encryption of Sensitive Data 2. RISK EVALUATION As part of the normal functionality of this device, the N’Vision Clinician Programmer may store Personal Health Information (PHI) or Personal Identifying Information (PII). Successful exploitation of this vulnerability may allow an attacker with physical access to an 8870 N’Vision ...

GE PACSystems CPE305/310, CPE330, CPE400, RSTi-EP CPE 100, CPU320/CRU320, RXi

1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: GE Equipment: PACSystems CPE305/310, CPE330, CPE400, RSTi-EP CPE 100, CPU320/CRU320, RXi Vulnerability: Improper Input Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could cause the device to reboot and change its state, causing the device to become unavailable. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of PACSystems, an industrial Internet controller, are affected: PACSystems ...

PHOENIX CONTACT FL SWITCH 3xxx/4xxx/48xx Series

1. EXECUTIVE SUMMARY CVSS v3 9.1 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: PHOENIX CONTACT Equipment: FL SWITCH 3xxx/4xxx/48xx Series Vulnerabilities: Command Injection, Information Exposure, Stack-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow for remote code execution and information disclosure. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS All FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32 are affected. 3.2 VULNERABILITY ...

Siemens SIMATIC S7-400 CPU

1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Siemens Equipment: SINAMIC S7-400 CPU Vulnerability: Improper Input Validation 2. RISK EVALUATION Successful exploitation of this vulnerability could cause a denial-of-service condition of the CPU. The CPU will remain in DEFECT mode until a manual restart is performed. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of SIMATIC S7-400, a CPU used for process controls, ...

Delta Electronics Delta Industrial Automation TPEditor

1. EXECUTIVE SUMMARY CVSS v3 7.3 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Delta Electronics Equipment: Delta Industrial Automation TPEditor Vulnerability: Heap-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of this vulnerability could crash the accessed device, resulting in a buffer overflow condition that may allow remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Delta Industrial Automation TPEditor, a programming software for Delta text ...

DoD Diversity Outreach Awards Program honors USASOC Soldier

LEOs, IoT and M2M Communications

Global businesses need access to critical data on a 24/7 basis no matter which environment their assets and resources are operating in. With roughly 80 percent of the Earth’s geography with no cell service how are companies able to track and monitor their remote equipment and other assets around the world? In many cases satellite based machine-to-machine (M2M) communications are ...

Advantech WebAccess

1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Remotely exploitable/low skill level to exploit Vendor: Advantech Equipment: WebAccess Vulnerabilities: SQL Injection, Improper Authorization, Path Traversal, Heap-based Buffer Overflow, Stack-based Buffer Overflow, Untrusted Pointer Dereference, Improper Privilege Management, and External Control of File Name or Path 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to disclose sensitive information from the host and/or target, execute arbitrary ...

A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan

As discussed in previous blogs, exploit kit activity has been on the decline since the latter half of 2016. However, we do still periodically observe significant developments in this space, and we have been observing interesting ongoing activity involving RIG Exploit Kit (EK). Although the volume of its traffic observed in-the-wild has been on ...

MatrikonOPC Explorer

1. EXECUTIVE SUMMARY CVSS v3 6.7 ATTENTION: Low skill level to exploit Vendor: MatrikonOPC Equipment: MatrikonOPC Explorer Vulnerability: Files or Directories Accessible to External Parties 2. RISK EVALUATION If the attacker has local access to the system, an attacker could exploit this vulnerability. This could allow an attacker to transfer unauthorized files from the host system, which could result in unauthorized information disclosure. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS According ...

Rockwell Automation Arena

1. EXECUTIVE SUMMARY CVSS v3 5.5 Vendor: Rockwell Automation Equipment: Arena Vulnerability: Use After Free 2. RISK EVALUATION Successful exploitation of this vulnerability could cause the software application to crash. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Arena, simulation software for manufacturing, are affected: Arena versions 15.10.00 and prior. 3.2 VULNERABILITY OVERVIEW 3.2.1 USE AFTER FREE CWE-416 A use after free vulnerability caused by processing specially crafted Arena Simulation ...

Rockwell Automation FactoryTalk

1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Rockwell Automation Equipment: Factory Talk Vulnerabilities: Cross-site Scripting, Improper Restriction of Operations within the Bounds of a Memory Buffer 2. REPOSTED INFORMATION This advisory was posted originally to the HSIN ICS-CERT library on April 12, 2018, and is being released to the NCCIC/ICS-CERT website. 3. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a ...

USASOAC welcomes new Command Chief Warrant Officer

1 ...

Smallsats, Interference and EPFD Limits

Congestion is becoming a reality in today’s new space world. With hundreds of HTS and thousands of LEO and MEO constellations in place or planned - the potential for increased interference continues to grow.  How will the satellite industry adapt to meet the challenge?  What role will regulation play in this new environment? What new technology and approaches will be ...

Silex Technology SX-500/SD-320AN or GE Healthcare MobileLink

1. EXECUTIVE SUMMARY CVSS v3 7.4 ATTENTION: Exploitable Remotely, Low skill level to exploit, Public exploits are available Vendors: Silex Technology, GE Healthcare Equipment: SX-500, SD-320AN, MobileLink Vulnerabilities: Improper Authentication, OS Command Injection 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow modification of system settings and remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following products from Silex Technology are affected. Some are not affected by ...

Siemens Medium Voltage SINAMICS Products

1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Siemens Equipment: Medium Voltage SINAMICS Products Vulnerabilities: Improper Input Validation 2. RISK EVALUATION Successful exploitation of these vulnerabilities could result in a denial-of-service condition, resulting in a manual restart of the affected devices. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Siemens reports that these vulnerabilities affect the following products: SINAMICS GH150 V4.7 w. PROFINET: All versions prior to ...

Siemens Siveillance VMS

1. EXECUTIVE SUMMARY CVSS v3 8.1 ATTENTION: Exploitable remotely Vendor: Siemens Equipment: Siveillance Video Management Software (VMS) Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability by the affected ports in .NET Remoting deserialization could allow elevation of privileges and/or cause a denial-of-service. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Siveillance VMS, an IP video management software, are affected: Siveillance VMS 2016 R1, all ...

Siemens Siveillance VMS Video Mobile App

1. EXECUTIVE SUMMARY CVSS v3 4.8 ATTENTION: Exploitable remotely Vendor: Siemens Equipment: Siveillance VMS Video Mobile App Vulnerability: Improper Certificate Validation 2. RISK EVALUATION Successful exploitation of this vulnerability may allow an attacker in a privileged network position to read data from and write data to the encrypted communication channel between the app and a server. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Siemens reports that the vulnerability affects the following ...

Army Specialist recognized for community service

Rooting a Logitech Harmony Hub: Improving Security in Today’s IoT World

Introduction FireEye’s Mandiant Red Team recently discovered vulnerabilities present on the Logitech Harmony Hub Internet of Things (IoT) device that could potentially be exploited, resulting in root access to the device via SSH. The Harmony Hub is a home control system designed to connect to and control a variety of devices in the user’s home. ...

Philips Brilliance Computed Tomography (CT) System

1. EXECUTIVE SUMMARY CVSS v3 8.4 ATTENTION: Low skill level to exploit. Vendor: Philips Equipment: Brilliance CT Scanners Vulnerabilities: Execution with Unnecessary Privileges, Exposure of Resource to Wrong Sphere, Use of Hard-coded Credentials 2. RISK EVALUATION Successful exploitation of these vulnerabilities may allow an attacker to attain elevated privileges and access unauthorized system resources, including access to execute software or to view/update files including patient health information ...

SofiaITC sign up form


Thank you for signing up for SofiaITC's Newsletter and Articles.

SofiaITClogin form