Team82 aligns with defenders of industrial, healthcare, and commercial networks, and provides indispensable threat and vulnerability research in order to ensure the safety, reliability, and integrity of systems within critical industries.
Track all XIoT vulnerabilities disclosed by Team82, the industry’s best cybersecurity vulnerability and threat research team. Team82 finds software and firmware vulnerabilities before threat actors can exploit them.
|Publication Date||CVE ID||Vendor||Product|
||Siemens||SIMATIC S7-1200/1500, TIA Portal|
|10-11-2022||CVE-2022-41666||Schneider Electric||EcoStruxure Operator Terminal Expert|
|10-11-2022||CVE-2022-41667||Schneider Electric||Eco-Struxure Operator Terminal Expert|
|10-11-2022||CVE-2022-41669||Schneider Electric||EcoStruxure Operator Terminal Expert|
|10-11-2022||CVE-2022-41670||Schneider Electric||EcoStruxure Operator Terminal Expert|
|10-11-2022||CVE-2022-41671||Schneider Electric||EcoStruxure Operator Terminal Expert|
Team82 has made a number of its research tools freely available for defenders and those in the cybersecurity research community. Find them all on the Team82 GitHub repository.
Arya produces pseudo-malicious files that trigger YARA rules.
Copy for tool: IDA plugin that automatically names functions based on their internal strings.
BusyBox AFL fuzzing guide and multiple harnesses.
EtherNet/IP & CIP Stack Detector that can help both cyber-security researchers, OT engineers, and asset owners to identify devices that are running a specific EtherNet/IP protocol stack.
A Python based parser for Microsoft Access database files.
Team82 is committed to privately reporting vulnerabilities to affected vendors in a coordinated, timely manner in order to ensure the safety of the cybersecurity ecosystem worldwide. To engage with the vendor and research community, Team82 invites you to download and share our Coordinated Disclosure Policy. Team82 will adhere to this reporting and disclosure process when we discover vulnerabilities in products and services.
Team82 has also made its public PGP Key available for the vendor and research community to securely and safely exchange vulnerability and research information with us.