VulnHub

AI-Powered Cybersecurity Intelligence

Last Update Check:

Latest Intelligence

All CISA Advisories
Siemens INTRALOG WMS

The article discusses multiple vulnerabilities in Siemens INTRALOG WMS, all versions prior to v5, which could allow attackers to bypass security features, cause denial-of-service conditions, or execute arbitrary code. Siemens has released a new version to address these vulnerabilities, emphasizing the importance of updating and securing network access.


Impact: ["Siemens INTRALOG WMS"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Update to version V5 of INTRALOG WMS or later and implement recommended security measures.

Phishing CVE Microsoft Vulnerability Update

Published:

All CISA Advisories
Siemens RUGGEDCOM APE1808 Devices

Siemens RUGGEDCOM APE1808 devices are vulnerable to two significant issues: insufficiently protected credentials and an out-of-bounds write, which could allow attackers to retrieve LDAP credentials or trigger a denial-of-service condition. Successful exploitation could have serious implications for critical manufacturing sectors worldwide.


Impact: ["Siemens RUGGEDCOM APE1808 Devices"]

In the Wild: No

Age: Recently disclosed

Remediation: Contact customer support for patches, configure VPN settings appropriately, and follow Siemens' operational guidelines for industrial security.

Phishing CVE Fortinet Vulnerability Patch Update

Published:

All CISA Advisories
Siemens Teamcenter Visualization

Siemens Teamcenter Visualization has a critical vulnerability, categorized as an out-of-bounds read, which could allow attackers to execute code in the context of the current process. The vulnerability affects multiple versions of the software, and while there is no known public exploitation reported, users are advised to take defensive measures.


Impact: ["Siemens Teamcenter Visualization V14.3 (All versions prior to V14.3.0.14)", "Siemens Teamcenter Visualization V2312 (All versions prior to V2312.0010)", "Siemens Teamcenter Visualization V2406 (All versions prior to V2406.0008)", "Siemens Teamcenter Visualization V2412 (All versions prior to V2412.0004)"]

In the Wild: No

Age: Recently disclosed

Remediation: Update to the specified versions or later, do not open untrusted WRL files.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
Siemens SIPROTEC and SICAM

A critical vulnerability has been identified in Siemens' SIPROTEC and SICAM products, allowing attackers to gain unauthorized network access without valid credentials. This issue, linked to improper message integrity enforcement in RADIUS communications, poses significant risks to critical infrastructure sectors worldwide.


Impact: ["SIPROTEC 5 Compact 7SX800", "SIPROTEC 5 7SA82", "SIPROTEC 5 7SD82", "SIPROTEC 5 7SJ81", "SIPROTEC 5 7SJ82", "SIPROTEC 5 7SK82", "SIPROTEC 5 7SL82", "SIPROTEC 5 7UT82", "POWER METER SICAM Q100 family", "POWER METER SICAM Q200 family", "SICAM GridPass", "SICORE Base system"]

In the Wild: No

Age: Recently disclosed

Remediation: Update to the latest software versions and apply specific countermeasures as recommended by Siemens.

CVE Vulnerability Update

Published:

All CISA Advisories
Siemens BACnet ATEC Devices

Siemens BACnet ATEC devices are vulnerable to an improper input validation issue that could allow an attacker on the same network to trigger a denial of service condition. This vulnerability, identified as CVE-2025-40556, poses a significant risk as it requires a power cycle to restore normal operation and has been assigned a CVSS v4 score of 7.1.


Impact: ["Siemens BACnet ATEC 550-440", "Siemens BACnet ATEC 550-441", "Siemens BACnet ATEC 550-445", "Siemens BACnet ATEC 550-446"]

In the Wild: No

Age: Recently disclosed

Remediation: None available

CVE Vulnerability Update

Published:

All CISA Advisories
Siemens VersiCharge AC Series EV Chargers

Siemens VersiCharge AC Series EV Chargers have been identified with critical vulnerabilities that could allow attackers to gain control over the chargers or execute arbitrary code. The vulnerabilities stem from a missing immutable root of trust in hardware and insecure default initialization, posing significant security risks.


Impact: ["Siemens IEC 1Ph 7.4kW Child socket (8EM1310-2EH04-0GA0)", "Siemens IEC 1Ph 7.4kW Parent socket (8EM1310-2EH04-3GA1)", "Siemens IEC 1Ph 7.4kW Parent socket incl. SIM (8EM1310-2EH04-3GA2)", "Siemens IEC 3Ph 22kW Child cable 7m (8EM1310-3EJ04-0GA0)", "Siemens IEC 3Ph 22kW Parent socket (8EM1310-3EH04-3GA1)"]

In the Wild: Unknown

Age: Recently disclosed

Remediation: Update to versions V2.135 or later as recommended by Siemens.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
Siemens Desigo

A critical vulnerability in Siemens Desigo CC allows unauthenticated remote attackers to execute arbitrary SQL queries on the server database. This issue poses significant risks, particularly in commercial and critical manufacturing sectors, and requires immediate attention to mitigate potential exploitation.


Impact: ["Siemens Desigo CC"]

In the Wild: No

Age: Recently disclosed

Remediation: Restrict access to the server's event port, disable support for Installed Clients, and follow Siemens' operational guidelines for industrial security.

Phishing CVE Vulnerability Update

Published:

All CISA Advisories
Siemens IPC RS-828A

The Siemens IPC RS-828A has a critical vulnerability allowing authentication bypass via spoofing, which could lead to unauthorized access and compromise system integrity. This issue, assigned CVE-2024-54085, poses significant risks to various critical infrastructure sectors worldwide.


Impact: ["Siemens IPC RS-828A"]

In the Wild: No

Age: Recently disclosed

Remediation: Limit access to the BMC network interface to trusted networks, follow Siemens' operational guidelines for industrial security, and monitor for malicious activity.

CVE Vulnerability Update

Published:

All CISA Advisories
Siemens OZW Web Servers

Siemens OZW Web Servers have critical vulnerabilities related to OS command injection and SQL injection, which could allow unauthorized remote access and execution of arbitrary code with root privileges. These vulnerabilities pose significant risks to critical manufacturing sectors worldwide, necessitating immediate attention and remediation.


Impact: ["OZW672: Versions prior to V8.0", "OZW672: Versions prior to V6.0", "OZW772: Versions prior to V8.0", "OZW772: Versions prior to V6.0"]

In the Wild: No

Age: Recently disclosed

Remediation: Update to V8.0 or later for OZW672 and OZW772; Update to V6.0 or later for OZW672 and OZW772.

Phishing CVE Vulnerability Update

Published:

The Hacker News
Pen Testing for Compliance Only? It's Time to Change Your Approach

The article emphasizes the risks of relying solely on annual penetration testing for compliance, highlighting that vulnerabilities can be introduced during routine updates and exploited before the next test cycle. This underscores the need for continuous security practices rather than a one-time compliance check.


Impact: Not specified

In the Wild: Yes

Age: Unknown

Remediation: Implement continuous security practices and regular vulnerability assessments.

Vulnerability Update

Published:

SecurityWeek
Chinese Hackers Hit Drone Sector in Supply Chain Attacks

The China-linked hacking group Earth Ammit has conducted multi-wave supply chain attacks targeting the drone sector in Taiwan and South Korea. This disruption highlights the growing threat to critical technology sectors from state-sponsored cyber activities.


Impact: ["Drone sector"]

In the Wild: Yes

Age: Recently disclosed

Remediation: None available

Published:

SecurityWeek
Ransomware Groups, Chinese APTs Exploit Recent SAP NetWeaver Flaws

Two ransomware groups and several Chinese APTs are actively exploiting recent vulnerabilities in SAP NetWeaver, highlighting a significant security threat to organizations using this software. The exploitation of these flaws underscores the urgent need for companies to address such vulnerabilities to protect their systems.


Impact: ["SAP NetWeaver"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Apply patches

Ransomware Exploit

Published:

The Hacker News
5 BCDR Essentials for Effective Ransomware Defense

Ransomware has become a sophisticated threat that can severely damage organizations by exploiting legitimate IT tools for attacks. Microsoft has highlighted the misuse of its Quick Assist tool by cybercriminals to facilitate these destructive operations.


Impact: ["Quick Assist"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Implement security measures and monitor for unusual activity

Ransomware Microsoft Exploit

Published:

The Hacker News
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

A Russia-linked cyber espionage group has exploited a zero-day vulnerability in MDaemon and other webmail servers through cross-site scripting (XSS) attacks, as reported by ESET. This operation, named Operation RoundPress, began in 2023 and highlights the ongoing threat posed by advanced persistent threats (APTs) in targeting critical infrastructure.


Impact: ["MDaemon", "Roundcube", "Horde", "Zimbra"]

In the Wild: Yes

Age: Discovered in 2023

Remediation: Apply patches

Zero-day Threat Actor

Published:

The Hacker News
Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

Researchers have identified a malicious npm package called 'os-info-checker-es6' that uses Unicode steganography to conceal its harmful code. This package employs a Google Calendar event short link to deliver a subsequent payload to compromised systems, highlighting the evolving tactics used in cyberattacks.


Impact: ["npm package", "Google Calendar"]

In the Wild: Yes

Age: Recently disclosed

Remediation: Remove the malicious package and monitor systems for any unauthorized activity.

Google Malware

Published: