<p>Multiple Industrial products are affected by a vulnerability in the
Interniche IP-Stack. The affected products do not properly enforce TCP
sequence number validation in specific scenarios but accept values
within a broad range. This could allow an unauthenticated remote
attacker e.g. to interfere with connection setup, potentially leading to
a denial of service. The attack succeeds only if an attacker can inject
IP packets with spoofed addresses at precisely timed moments, and it
affects only TCP-based services.</p>
<p>Siemens has released new versions for several affected products and
recommends to update to the latest versions. Siemens is preparing
further fix versions and recommends specific countermeasures for
products where fixes are not, or not yet available.</p>
Source link
Subscribe to Updates
Get the latest creative news from FooBar about art, design and business.
Previous ArticleSecuring the Internet of Things: Addressing Device-Level Vulnerabilities and Safeguarding Network Data
Next Article The Evolving Threat of Vendor Email Compromise
Related Posts
Add A Comment