(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Atlassian JIRA CVE-2017-5983 Remote Code Execution Vulnerability
 
GraniteDS Multiple Remote Code Execution Vulnerabilities
 

Industrial control systems are sensitive systems that must make decisions in real time to ensure the operation of the industrial process they govern. The latency and reliability in packet transmission is fundamental, since the protocols are connection-oriented but because of the main speed goal, many of them do not have included error recovery schemes other than those included in the TCP / IP stack.

Where is it possible to use encryption without affecting the operation of the industrial control process? Here are some examples:

  • Power Transmission systems: The most critical communications that electrical systems have are the protections that activate the switches that handle the events of overloads in the transmission lines. Orders that are delivered to these devices can not exceed 12 ms roundtrip. Protocols such as IEEE C37.94 unfortunately still do not support encryption functionalities by default and because latency in a communications channel can easily exceed 12 ms by numerous factors that are normally seasonal and do not involve malfunctions of the platform Of communications, the use of encryption is not recommended because of the risks involved for the operation of the system. For all other communications using protocols like IEC 60870-5-104, IEC 61850 and DNP3, the crypto extensions detailed in IEC 62351 are recommended. For all other protocols that does not include a security standard like modbus, hardware crypto boxes or VPN devices works great.
  • Water and gas systems: The most critical communications for the system are in the water catchment, pipes, tanks and potabilization plants. The orders sent to the RTU are not completed immediately and might take event minutes to finalize. Protocols like DNP3, BSAP and Modbus are able to handle some milliseconds (even 50) without any impact to the industrial process. In these systems, hardware crypto or VPN devices can be used

Manuel Humberto Santander Pel margin-right:0cm">SANS Internet Storm Center Handler

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
WebORB for Java Remote Code Execution and XML External Entity Injection Vulnerabilities
 
Apache Flex BlazeDS CVE-2017-5641 Remote Code Execution Vulnerability
 
Pivotal Spring Flex CVE-2017-3203 Remote Code Execution Vulnerability
 
Multiple Asterisk Products Remote Buffer Overflow Vulnerability
 
Apache Geode CVE-2017-5649 Information Disclosure Vulnerability
 
Google Pixel/Pixel XL Qualcomm Avtimer Driver CVE-2016-5346 Information Disclosure Vulnerability
 
[security bulletin] HPESBGN03727 rev.1 - HPE Business Process Monitor, Remote Unauthorized Access to Data
 
DefenseCode ThunderScan SAST Advisory: Apache Tomcat Directory/Path Traversal
 
[SECURITY] [DSA 3826-1] tryton-server security update
 
AST-2017-001: Buffer overflow in CDR's set user
 

Enlarge / Samsung's Smart TV interface, which seems to be running on Tizen. (credit: Samsung)

Tizen, the open source operating system that Samsung uses on a range of Internet-of-Things devices and positions as a sometime competitor to Android, is chock full of egregious security flaws, according to Israeli researcher Amihai Neiderman.

Samsung has been developing the operating system for many years. The project started as an Intel and Nokia project, and Samsung merged its Bada operating system into the code in 2013. Like Android, it's built on a Linux kernel, with a large chunk of open source software running on top. App development on Tizen uses C++ and HTML5.

Presenting at Kaspersky Lab's Security Analyst Summit and speaking to Motherboard, Neiderman had little positive to say about the state of Tizen's code. "It may be the worst code I've ever seen," Neiderman said. "Everything you can do wrong there, they do it."

Read 5 remaining paragraphs | Comments

 
Multiple IBM Products CVE-2016-8987 Access Bypass Vulnerability
 
Mongoose OS CVE-2017-7185 Use After Free Denial of Service Vulnerability
 
IBM Lotus Protector for Mail Encryption Local File Include Vulnerability
 
Google Nexus Broadcom Wi-Fi Driver CVE-2017-0585 Information Disclosure Vulnerability
 
Google Nexus Qualcomm IPA Driver CVE-2016-10234 Information Disclosure Vulnerability
 
Linux Kernel CVE-2017-6214 Remote Denial of Service Vulnerability
 
Google Android NVIDIA Crypto Driver Multiple Information Disclosure Vulnerabilities
 
Google Android Qualcomm Video Driver Multiple Privilege Escalation Vulnerabilities
 
Google Android SurfaceFlinger CVE-2017-0546 Privilege Escalation Vulnerability
 
Google Android HTC Touchscreen Driver CVE-2017-0563 Privilege Escalation Vulnerability
 
OS-S-2017-01: The password for the application protection of the Schneider Modicon TM221CE16R can be retrieved without authentication. Subsequently the application may be arbitrarily downloaded, uploaded and modified. CVSS 10.
 
Google Android Mediaserver CVE-2017-0547 Information Disclosure Vulnerability
 
Google Android Mediaserver Multiple Denial of Service Vulnerabilities
 
Google Android Synaptics Touchscreen Driver Multiple Privilege Escalation Vulnerabilities
 
The password for the project protection of the Schneider Modicon TM221CE16R is hard-coded and cannot be changed.
 
Google Android Mediaserver Multiple Information Disclosure Vulnerabilities
 
Google Android NVIDIA Crypto Driver Multiple Privilege Escalation Vulnerabilities
 
Google Android Qualcomm components Multiple Unspecified Security Vulnerabilities
 
Google Android Mediaserver Multiple Memory Corruption Vulnerabilities
 
Google Android Broadcom Wi-Fi Driver Multiple Privilege Escalation Vulnerabilities
 
Google Android Qualcomm components Multiple Unspecified Security Vulnerabilities
 
Apple iOS CVE-2017-6975 Arbitray Code Execution Vulnerability
 
Moodle URL Manipulation Remote Account Information Disclosure
 
iPlatinum iOneView Multiple Parameter Reflected XSS
 
Kaseya information disclosure vulnerability
 
AcoraCMS browser redirect and Cross-site scripting vulnerabilities
 
AirWatch Self Service Portal Username Parameter LDAP Injection
 
Avaya Radvision SCOPIA Desktop dlg_loginownerid.jsp ownerid SQL Injection
 
libarchive CVE-2016-10209 Denial Of Service Vulnerability
 
Lotus Protector for Mail Security remote code execution
 
Kaseya VSA 6.5 Parameter Reflected XSS, Enumeration and Bruteforce Weakness
 
[security bulletin] HPESBGN03721 rev.1 - HPE Operations Bridge Analytics, Remote Cross-Site Scripting (XSS)
 
Internet Storm Center Infocon Status