vulnerabilities

Multiple vulnerabilities in ABB HMI solutions

28 June 2019

The vulnerabilities affect CP635 and CP651 control panels and PB610 Panel Builder 600
Multiple vulnerabilities in Advantech WebAccess/SCADA

28 June 2019

The vulnerabilities could lead to the disclosure of important information, deletion of files and remote code execution
Vulnerabilities in Phoenix Contact’s Automation Worx Software Suite

24 June 2019

Successful exploitations of the vulnerabilities could lead to remote execution of arbitrary code
Critical vulnerabilities in WAGO industrial switches

17 June 2019

Exploitation of the vulnerabilities could allow a remote compromise of the managed switch, resulting in disruption of communication and root access to the operating system
Dangerous vulnerabilities identified in Phoenix Contact industrial switches and controllers

11 June 2019

The vulnerabilities allow attackers to gain unauthorized access to device configuration, decrypt passwords, cause denial of service, or bypass authentication
Multiple vulnerabilities in Optergy Proton/Enterprise building management system

10 June 2019

If successfully exploited, the vulnerabilities could allow an attacker to execute code remotely and gain full system access
Critical vulnerabilities identified by Kaspersky Lab have been corrected in Siemens SIMATIC WinCC and SIMATIC PCS 7

20 May 2019

Multiple vulnerabilities could lead to arbitrary code and command execution on a target system and a denial-of-service condition
Vulnerabilities in Schneider Electric industrial solutions

15 January 2019

Critical and severe vulnerabilities have been identified in GP-Pro EX programming environment, Zelio Soft software and IIoT Monitor platform
Critical vulnerabilities in Siemens SINUMERIK controllers

14 December 2018

Exploitation of vulnerabilities in Siemens SINUMERIK controllers cold allow remote code execution, privilege escalation and device denial-of-service conditions
Web vulnerabilities in Siemens SIMATIC operator panels

16 November 2018

The most serious of the vulnerabilities could allow arbitrary files to be downloaded from the device