Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations.
An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations.
An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over Port 102/TCP. A restart of the affected device is needed to restore normal operations.
The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.
The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system.
Legitimate file operations of the affected systems do not properly neutralize special elements within the pathname. An attacker could cause the pathname to resolve to a location outside of the restricted directory on the server and read, write, or delete critical files.
When downloading files, the affected systems do not properly neutralize special elements within the pathname. An attacker could cause the pathname to resolve to a location outside of the restricted directory on the server and read critical files.
The affected systems store sensitive information in log files. An attacker with access to the log files could publicly expose the information or reuse it to develop further attacks.
Siemens
Refer to CISA Advisory for the patch, upgrade, or suggested workaround information.
Siemens SIMATIC Industrial Products
https://www.cisa.gov/uscert/ics/advisories/icsa-22-041-01
Siemens SIMATIC WinCC
https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-03
Siemens SIMATIC WinCC and PCS
https://www.cisa.gov/uscert/ics/advisories/icsa-22-041-02