Monitor, analyze, and respond to cybersecurity vulnerabilities across SCADA, ICS, PLC, DCS, and other Operational Technology systems.
A critical vulnerability in the Erlang/OTP SSH server allows an unauthenticated attacker to execute arbitrary code on affected systems. The flaw exists in the SSH protocol message handling prior to authentication, enabling an attacker to send crafted SSH messages that are processed before any authentication occurs. Successful exploitation results in full system compromise with the privileges of the SSH daemon process.
MB Connect Line mbNET industrial VPN routers contain a Lua sandbox escape vulnerability in the device's scripting interface. An authenticated user with script execution privileges can escape the Lua sandbox and execute arbitrary operating system commands as root on the underlying Linux OS, resulting in full device compromise.
ICONICS GENESIS64, Hyper Historian, and AnalytiX are vulnerable to a command injection through the suite's web-based management interface. An authenticated administrator can inject OS commands via specially crafted configuration parameters that are passed to the underlying OS without sanitization, achieving code execution on the ICONICS server.
ICONICS GENESIS64 and Hyper Historian contain a privileged file write vulnerability that allows an authenticated user to write arbitrary files to the system with SYSTEM-level privileges. An attacker can leverage this to overwrite critical system files, deploy web shells, or achieve code execution through DLL hijacking.
Fuji Electric Tellus Lite V-Simulator Smart Editor is vulnerable to a stack-based buffer overflow when parsing specially crafted project files. An attacker can create a malicious project file that, when opened by an engineer, triggers a buffer overflow leading to arbitrary code execution in the context of the engineering workstation.
Siemens TeleControl Server Basic is vulnerable to a SQL injection attack through its web-based management interface. An authenticated user can inject malicious SQL queries through improperly sanitized input fields, enabling data exfiltration, database manipulation, and potential code execution via SQL Server xp_cmdshell.