Siemens has published a high‑severity ProductCERT advisory (SSA‑722410) describing multiple remotely exploitable vulnerabilities in its User Management Component (UMC), including a stack‑based buffer overflow that Siemens scores as critical and three separate out‑of‑bounds read issues that can...
2.15.1.3
buffer overflow
cisa
cve-2025-40795
cve-2025-40796
cve-2025-40797
cve-2025-40798
dos
icssecurity
industrial control systems
ot security
patch management
productcert
remote code execution
siemens
siemens vulnerabilities
umc
umc v2.15.1.3
windows server
Siemens and U.S. cyber authorities have republished a focused advisory addressing two low‑severity but operationally meaningful vulnerabilities in SINEC OS that affect the RUGGEDCOM RST2428P (6GK6242‑6PA00); the immediate mitigation is straightforward (block discovery UDP ports) but the broader...
Siemens has confirmed a vulnerability in its APOGEE PXC and TALON TC building automation devices that allows an unauthenticated remote actor to retrieve sensitive files — including the device’s encrypted database — over BACnet, a widely used building automation protocol, a weakness now tracked...
A newly republished advisory from CISA and Rockwell Automation raises urgent operational and security flags for organizations using the CompactLogix® 5480 controller family: the devices running specific Windows packages are affected by a Missing Authentication for Critical Function vulnerability...
Honeywell’s OneWireless Wireless Device Manager (WDM) has been the subject of a high-severity coordinated disclosure: multiple vulnerabilities in the Control Data Access (CDA) component allow remote attackers to cause information disclosure, denial-of-service, and, in the worst cases, remote...
The SunPower PVS6 fleet has been publicly flagged as critically vulnerable after CISA published an advisory (ICSA-25-245-03) describing a Bluetooth Low Energy (BluetoothLE) servicing interface that embeds hard‑coded encryption parameters and exposed protocol details—weaknesses that let an...
Mitsubishi Electric’s MELSEC iQ‑F family of CPU modules has been formally flagged with a network‑accessible vulnerability that allows unauthenticated remote actors to read and write device values — and in some deployments to halt program execution — because the affected product’s Modbus/TCP...
GE Vernova’s CIMPLICITY HMI/SCADA platform has been flagged in a recently circulated advisory as vulnerable to an Uncontrolled Search Path Element (CWE‑427) issue that, under the right local conditions, could allow a low‑privileged user to escalate privileges on affected hosts — the advisory...
Schneider Electric has acknowledged a high-severity vulnerability in its Modicon M340 family and several M340 communication modules that can be triggered remotely by a specially crafted FTP command and may cause a denial-of-service condition; the flaw was assigned CVE‑2025‑6625 and carries a...
The Colonial Pipeline blackout of May 2021 remains a cautionary touchstone: ransomware that began in corporate IT cascaded into physical shortages and public alarm, a stark demonstration that operational technology (OT) insecurity costs more than data — it can disrupt energy, water, food and...
Siemens’ RUGGEDCOM APE1808 appliances carry high‑risk management‑plane vulnerabilities that can let an authenticated administrator—or an attacker who gains elevated credentials—execute arbitrary operating‑system commands and escalate local service privileges, creating a significant threat to...
A critical local privilege‑escalation flaw has been disclosed in Rockwell Automation’s FactoryTalk ViewPoint (versions 14.00 and prior) that allows an attacker with local access to escalate to SYSTEM by abusing Windows MSI repair behavior — the issue is tracked as CVE‑2025‑7973 and has been...
Siemens’ RUGGEDCOM ROX II series is the subject of a newly spotlighted vulnerability that raises immediate operational concerns for industrial network operators: an unrestricted file upload condition in the device web interface can allow a high‑privilege, authenticated user to write arbitrary...
Siemens' widely deployed use of Wibu-Systems CodeMeter Runtime has again drawn scrutiny after a local privilege-escalation flaw (CVE-2025-47809) was published that can let an unprivileged user gain elevated access immediately after an unprivileged installation when the CodeMeter Control Center...
build server security
change control
codemeter
codemeter 8.30a
cve-2025-47809
icssecurity
industrial control systems
local exploit
ot security
patch management
privilege
privilege escalation
siemens
siemens productcert
simatic
threat hunting
uac
vendor advisories
wincc oa
windows security
A recently republished CISA advisory warns that Rockwell Automation’s FactoryTalk Linx contains a serious improper access control flaw that—when triggered by setting Node.js’ process.env.NODE_ENV to "development"—can disable FTSP token validation and allow an attacker to create, update, or...
A newly republished CISA advisory warns that Rockwell Automation’s Studio 5000 Logix Designer contains an improper input validation flaw that can be triggered via environment variables, allowing an attacker with local network access to crash the engineering software—and in some cases plausibly...
Rockwell Automation has issued—and CISA has republished—an advisory warning that specific 1756-series communication modules can enter a Major Non‑Recoverable fault or crash when presented with malformed or concurrent Forward Close messages, creating a practical denial‑of‑service risk for...
A high-severity privilege-escalation flaw has been disclosed in Rockwell Automation’s FactoryTalk ViewPoint that allows a local attacker to escalate to SYSTEM privileges by abusing Windows MSI repair behavior; the issue (CVE-2025-7973) carries a CVSS v4 base score of 8.5 and affects FactoryTalk...
Siemens has republished an advisory confirming that several POWER METER models in the SICAM Q100 and Q200 families store SMTP credentials in cleartext — a design flaw that allows an authenticated local user to extract email account passwords from device storage or exported configuration files...
A local information-disclosure flaw in Rockwell Automation’s FactoryTalk Action Manager allows unauthenticated local clients to receive a reusable API token broadcast over a WebSocket, creating a pathway for attackers with local access to intercept credentials and manipulate the product’s...