Latest Entry:
Home » » » » » Vulnerability in Siemens Switches allows hackers to gain admin access

Vulnerability in Siemens Switches allows hackers to gain admin access

Updated by Admin on Monday, 13 January 2014 | 01:23

A Security researcher has discovered two potential vulnerabilities in Siemens Ethernet switches allows a remote attacker to perform administrative operations.

The vulnerabilities were discovered by Eireann Leverett, Senior security consultant for IOActive and have been reported to Siemens.

The first vulnerability(CVE-2013-5944) could allow hackers to perform administrative operation over the network without authentication.

Sponsored Links
The Second vulnerability (CVE-2013-5709) could allow hackers to hijack web sessions over the network without authentication. This is due to insufficient entropy in its random number generator.

Siemens produced a patch within 3 months.  Customers of Siemens are advised to apply the SCALANCE X-200 firmware update.

Eireann is scheduled to demonstrate the vulnerabilities and release proof-of-concept code for organizations to check their own devices, at next week's S4 SCADA security conference in Miami.


Dated: Monday, January 13, 2014



Share this entry :

0 comments:

Speak up your mind

Tell us what you're thinking... !

 
Quick Links: Home | About | Disclaimer | Terms and Conditions | Privacy Policy | Copyrights | Advertisement | Contact Us
PathLabStudy® does not provide medical advice, diagnosis or treatment. See additional information.
Downloading and printing of any website content for educational purposes are allowed.
For any other purpose copy of any content from this site page without permission is extremely prohibited.
This site does not store any files on its own server.
PathLabStudy® is not responsible for the content of external internet sites.
Copyright: © PathLabStudy, 2012 - . All rights reserved worldwide. Establish on April 26, 2012.
Website Development by Dayyal Anand (Lab Technologist and Website and HTML Developer).
Website Development by Dayyal Anand. Powered by PathLabStudy®