Siemens has revealed a critical heap-based buffer overflow vulnerability, which is known as CVE-2024-49775, in its User Management Component (UMC). This component is integrated into several of its industrial and enterprise products. The vulnerability is rated as critical with a CVSS v3.1 base score of 9.8 and a CVSS v4.0 score of 9.3. This makes it a serious risk. If exploited, it could allow unauthenticated remote attackers to execute arbitrary code, which could lead to severe consequences in industrial and enterprise environments. The affected Siemens products are Opcenter Execution Foundation, Opcenter Intelligence, Opcenter Quality, Opcenter RDL, SIMATIC PCS neo in various versions, and Totally Integrated Automation Portal (TIA Portal) in versions 16 through 19. Siemens has noted that for most of these products, fixes are not yet available. They have therefore provided mitigations to reduce the risk of exploitation, including filtering ports 4002 and 4004 to restrict connections to only those within the UMC network. Siemens suggests blocking port 4004 completely as an additional protective measure if no RT server machines are in use. These workarounds should provide some protection to administrators until the permanent patches can be applied. Siemens states that newer versions, such as TIA Portal V20, include a fixed version of the UMC and are not susceptible to this problem.
Microsoft has released its September 2025 Patch Tuesday security updates, addressing 81 vulnerabilities, including two publicly disclosed zero-day flaws (CVE-2025-55234 and CVE-202...
Rockwell Automation has issued a critical advisory for a vulnerability tracked as CVE-2025-7350, affecting its Stratix industrial Ethernet switches. The flaw, rated 9.6 CVSS 3.1 sc...
In June 2025, Chess.com suffered a data breach when attackers exploited a third-party file transfer tool used by the platform. The intrusion took place between June 5 and June 18, ...