what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 28 RSS Feed

Files

Siemens SIMATIC S7-300 CPU Denial Of Service
Posted May 30, 2018
Authored by t4rkd3vilz

Siemens SIMATIC S7-300 CPU suffers from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2015-2177
SHA-256 | afae74f6c927aaed832e67208dcc0484a377f93c907966f4d2b1a577e4eb09d5

Related Files

Siemens SIMATIC S7-1200 Cross Site Request Forgery
Posted May 15, 2023
Authored by RoseSecurity

Siemens SIMATIC S7-1200 CPU start/stop command cross site request forgery exploit. This older issue elaborates on t4rkd3vilz's CVE-2015-5698 by issuing a POST command to a specified web server path.

tags | exploit, web, csrf
advisories | CVE-2015-5698
SHA-256 | bec31b24b62a934362f2aebf30a3c1bbbc8f1ca87a9670d278c3773413280b4c
Siemens SIMATIC S7-1200 CPU Cross Site Scripting
Posted May 22, 2018
Authored by Jameel Nabbo, t4rkd3vilz

Siemens SIMATIC S7-1200 CPU suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2014-2908
SHA-256 | 1702461e2f3509bc3cc061c3ff42fe5455c97f574a8755c76dd490aab176cbbf
Siemens SIMATIC S7-1200 CPU Cross Site Request Forgery
Posted May 22, 2018
Authored by Jameel Nabbo, t4rkd3vilz

Siemens SIMATIC S7-1200 suffers from a CPU functionality related cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2015-5698
SHA-256 | 8c2e5fb98b7508c36b55a7b3e06dc592c881362ae41570c7b65c00ae8e74bb36
Siemens SIMATIC Panels Cross Site Request Forgery / Cross Site Scripting
Posted May 18, 2018
Authored by t4rkd3vilz

Multiple Siemens SIMATIC panels suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | da0552546acfe55d2b43aca2a3821b58dfac3d6a8a188c97da184d13ae5d5031
Siemens SIMATIC CP 343-1 Advanced IKEv1 Cipher Suite Configuration
Posted Jan 12, 2017
Authored by Andrea Barisani

The SIMATIC CP 343-1 Advanced product allows configuration of the IKEv1 cipher suite configuration, which specifies the IKE and Encapsulating Security Payload (ESP) supported algorithms, with one cipher for each setting. It is evaluated that the configuration is not consistent with the supported ciphers that are eventually applied on the IPSec responder of the SIMATIC CP 343-1 Advanced. In fact, regardless of the selected choice for the ESP cipher, it is always possible for the IPSec client to propose, and successfully use, DES, 3DES, AES128 and AES256. This invalidates the potential desire to enforce a stronger cipher, as the client can always decide to use weaker. Siemens SIMATIC CP 343-1 Advanced tested with fw V3.0.44 is affected.

tags | advisory
SHA-256 | 9250759f60c9b83870733f1e01826fa5ac1417d8f1d85e6505d03aeac9bf419c
Siemens SIMATIC Cookie Settings / Cross Site Request Forgery
Posted Nov 22, 2016
Authored by Andrea Barisani

Multiple versions of Siemens SIMATIC suffer from a cross site request forgery vulnerability and poor cookie security settings.

tags | advisory, csrf
advisories | CVE-2016-8672
SHA-256 | 26301c53dda7cca8354b059c0a9195478bf2208f7195cb4e264aa05d0d411026
Siemens SIMATIC WinCC Privilege Escalation
Posted Jul 29, 2014
Authored by Siemens ProductCERT | Site siemens.com

Siemens SIMATIC WinCC versions prior to 7.3 suffer from unauthenticated access, privilege escalation, and hard-coded encryption key vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2014-4682, CVE-2014-4683, CVE-2014-4684, CVE-2014-4685, CVE-2014-4686
SHA-256 | 7b2386094198c589bb175e6f6352b3527830abc474c16d1dbe09639309362020
ICS-CERT Advisory - Siemens WinCC 7.0 SP3
Posted Mar 21, 2013
Authored by ICS-CERT | Site ics-cert.org

ICS-CERT Advisory 13-079-02 - This advisory provides mitigation details for vulnerabilities that impact the Siemens SIMATIC WinCC. Independent researcher Sergey Gordeychik of Positive Technologies and Siemens ProductCERT have identified multiple vulnerabilities in the Siemens SIMATIC WinCC, which is used to configure SIMATIC operator devices. Siemens has produced a software update that fully resolves these vulnerabilities. Exploitation of these vulnerabilities could allow a denial of service (DoS) condition, unauthorized read access to files, or remote code execution. This could affect multiple industries, including food and beverage, water and wastewater, oil and gas, and chemical sectors worldwide. These vulnerabilities could be exploited remotely.

tags | advisory, remote, denial of service, vulnerability, code execution
advisories | CVE-2013-0678, CVE-2013-0676, CVE-2013-0679, CVE-2013-0674, CVE-2013-0677, CVE-2013-0675
SHA-256 | e86d7625da69e96f25c03a09637a085e26ecba22b2bf0dd2a1cd0873bb1460d9
Siemens Simatic WinCC 7.x Hardening Guide
Posted Jan 21, 2013
Site ptsecurity.com

This is a SCADA security hardening guide for Siemens Simatic WinCC version 7.x.

tags | paper
SHA-256 | 1f64be3d914e4a288a0197041552ae70d5dca310f320329c7321f28520e5cbf3
Siemens Simatic WinCC Flexible 2008 Security Hardening Guide
Posted Jan 21, 2013
Site ptsecurity.com

Siemens Simatic WinCC Flexible 2008 security hardening guide.

tags | paper
SHA-256 | cd89bd1a113448a177132b9cbddb4efcf520c705c18777b21fc760d3018bb5a4
Secunia Security Advisory 51845
Posted Jan 14, 2013
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Siemens SIMATIC RF Manager, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | faacb39d6a3cac8c7d70e42393bf2e09cf9409b060a0b1b339d78007c78d2add
Siemens SIMATIC S7-1200 PLCs Denial Of Service
Posted Dec 24, 2012
Authored by Arne Vidstrom, Prof. Dr. Hartmut Pohl

Siemens SIMATIC S7-1200 PLCs, version 2 and higher, allow device management over TCP port 102 (ISO-TSAP) and retrieving status information over UDP port 161 (SNMP). It is possible to cause the device to go into defect mode by sending specially crafted packets to these ports.

tags | advisory, udp, tcp
SHA-256 | 679ddc6a6dfabb319c2d94eaa550f322d746da693bd83835da6ccdc4172e3a1f
Secunia Security Advisory 50816
Posted Oct 9, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Siemens SIMATIC S7-1200, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 53b953a5e2e223e910e4e4057dbc63440dc65640989745a53c6b6aa8104f3581
Secunia Security Advisory 50630
Posted Sep 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Siemens SIMATIC S7-1200, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | 2763624813a56ed46860856311b9ebb3439d2d6f011205811b386a35a013d083
Secunia Security Advisory 50568
Posted Sep 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Siemens SIMATIC WinCC, which can be exploited by malicious people to conduct cross-site scripting attacks, conduct SQL injection attacks, and disclose certain sensitive information.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | cb1763504e1b13afe46b5eb8fdaaab47993d82b00e7965ea3d58953a960c5f02
Secunia Security Advisory 50581
Posted Sep 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Siemens SIMATIC WinCC, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 045abbc490356d4d390ffe1508ed7175b2a36216abfecb48f6e801eff26000a9
Secunia Security Advisory 50115
Posted Jul 31, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in some Siemens SIMATIC S7-400 products, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 7e6de2ddf3fb5ed462927c692e3498ebfefceb678564ff4a79eebd1f01044e88
Secunia Security Advisory 50039
Posted Jul 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Siemens SIMATIC STEP 7 and PCS 7, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 55b6f4b5015cc7685bd570063e2404af7e53be2c9b25de5f8c07a8e37d48d05a
Siemens Simatic S7-1200 CPU START/STOP Module
Posted Jul 16, 2012
Authored by Dillon Beresford | Site metasploit.com

The Siemens Simatic S7-1200 S7 CPU start and stop functions over ISO-TSAP this modules allows an attacker to perform administrative commands without authentication. This Metasploit module allows a remote user to change the state of the PLC between STOP and START, allowing an attacker to end process control by the PLC.

tags | exploit, remote
SHA-256 | 209515171372e815da32934ab41fdd5f1c336d22022bec1c97308a5b5097d4c3
Siemens Simatic S7-300/400 CPU START/STOP Module
Posted Jul 16, 2012
Authored by Dillon Beresford | Site metasploit.com

The Siemens Simatic S7-300/400 S7 CPU start and stop functions over ISO-TSAP this modules allows an attacker to perform administrative commands without authentication. This Metasploit module allows a remote user to change the state of the PLC between STOP and START, allowing an attacker to end process control by the PLC.

tags | exploit, remote
SHA-256 | e012c156c46c53f51452c321377eed31d2bcff3d14db2c6ffe938003af648fc7
Secunia Security Advisory 49359
Posted Jun 8, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Siemens SIMATIC WinCC, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 6d8835af6ac9f5281147ff750dbfd970bf39e06ec87b496601b705390e24dd9e
Secunia Security Advisory 49341
Posted Jun 8, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and some vulnerabilities have been reported in Siemens SIMATIC WinCC, which can be exploited by malicious users to disclose potentially sensitive information and system information and manipulate certain data and by malicious people to conduct spoofing and cross-site scripting attacks.

tags | advisory, spoof, vulnerability, xss
SHA-256 | b61756e3e7d99978d09677771aea54c7ffae75f572ab7adb1572fc2ce0119f01
Secunia Security Advisory 46997
Posted Nov 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered two vulnerabilities in Siemens SIMATIC WinCC Flexible, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | ef0bd80742863d9390beef99101a5572bc1fc990288fb26bc0ed7904418615b0
Siemens SIMATIC WinCC Flexible Overflow / Traversal / Denial Of Service
Posted Nov 28, 2011
Authored by Luigi Auriemma | Site aluigi.org

Siemens SIMATIC WinCC Flexible suffers from stack overflow, directory traversal, denial of service and arbitrary memory read access vulnerabilities.

tags | exploit, denial of service, overflow, arbitrary, vulnerability
systems | linux
SHA-256 | ac12fa0c1d674d87df9e9af74d9ed93fa0067b7b9acdb1061dde4681e09149b1
Secunia Security Advisory 46011
Posted Sep 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Siemens SIMATIC WinCC, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
SHA-256 | 4e89ffc0941db9521dcecbde0ab3c997e39f621d86ca283d29065ef4c6b20323
Page 1 of 2
Back12Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close