Search the Community
Showing results for tags 'siemens'.
-
Exploits Siemens LOGO! 8 Recoverable Password Format
1337day-Exploits posted a topic in Updated Exploits
Due to storing passwords in a recoverable format on Siemens LOGO! 8 PLCs, an attacker can gain access to configured passwords as cleartext. View the full article -
Due to storing passwords in a recoverable format on Siemens LOGO! 8 PLCs, an attacker can gain access to configured passwords as cleartext. View the full article
-
Exploits Siemens LOGO! 8 Hard-Coded Cryptographic Key
1337day-Exploits posted a topic in Updated Exploits
Due to the use of a hard-coded cryptographic key, an attacker can put the integrity and confidentiality of encrypted data of all Siemens LOGO! 8 PLCs using this key at risk, for instance decrypting network communication during a man-in-the-middle attack. View the full article -
The Siemens R3964 line discipline code in drivers/tty/n_r3964.c has a few races around its ioctl handler; for example, the handler for R3964_ENABLE_SIGNALS just allocates and deletes elements in a linked list with zero locking. This code is reachable by an unprivileged user if the line discipline is enabled in the kernel config; Ubuntu 18.04, for example, ships this line discipline as a module. View the full article
-
Exploits Siemens SICAM A8000 Series Denial Of Service
1337day-Exploits posted a topic in Updated Exploits
Siemens SICAM A8000 Series suffers from an XML injection denial of service vulnerability. View the full article