Team82 has developed a novel technique called the Evil PLC Attack in which programmable logic controllers (PLCs) are weaponized and used to compromise engineering workstations. An attacker with a foothold on an engineering workstation can have access to anything else on the OT network to which an engineer connects that machine, including other PLCs.
CWE-321 USE OF HARD-CODED CRYPTOGRAPHIC KEY:
In 2N Access Commander Versions 1.14 and prior, an attacker, who needs to have administrative access privileges, can read hardcoded AES passphrases, which may be used for decryption of certain data within backup files of 2N Access Commander Version 1.14 and older.
2N advises updating to Access Commander Version 3.3
CVSS v3: 6.0
CWE-295 IMPROPER CERTIFICATE VALIDATION:
MicroDicom DICOM Viewer fails to adequately verify the update server's certificate, which could make it possible for attackers in a privileged network position to alter network traffic and carry out a machine-in-the-middle (MITM) attack. This allows the attackers to modify the server's response and deliver a malicious update to the user.
MicroDicom recommends users upgrade to DICOM Viewer version 2025.1
CVSS v3: 5.7
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'):
AutomationDirect C-more EA9 HMI contains a function with bounds checks that can be skipped, which could result in an attacker abusing the function to cause a denial-of-service condition or achieving remote code execution on the affected device.
AutomationDirect recommends that users update C-MORE EA9 HMI software and firmware to V6.80
CVSS v3: 9.8
CWE-476 NULL POINTER DEREFERENCE:
The affected product is vulnerable to a NULL Dereference vulnerability, which could allow a remote attacker to create a denial-of-service condition. Successful exploitation of this vulnerability could could result in a remote attacker causing a denial-of-service condition on the affected devices.
Belledonne Communications recommends users implement the fix in Version 5.3.99 of the linphone-sdk.
CVSS v3: 7.5
CWE-120 BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW'):
A denial-of-service vulnerability exists in the affected product. The vulnerability results in a buffer overflow, potentially causing denial-of-service condition.
Rockwell Automation has corrected these problems in firmware revision 4.020 and recommends users upgrade to the latest version available.
CVSS v3: 9.8