Whalers Blog

  • Blog
  • About
  • Admin
  • Categories
  • Contact
    • X
    • Telegram
    • Mastodon
    • Bluesky
  • February 6, 2025

    The Nonlinear Filter Model of Stream Cipher Redivivus

    ePrint Report: The Nonlinear Filter Model of Stream Cipher Redivivus Claude Carlet, Palash Sarkar The nonlinear filter model is an old and well understood approach to the design of secure stream ciphers. Extensive research over several decades has shown how to attack stream ciphers based on this model and has identified the security properties required…

    Cryptography, Security
    #cryptography, #security
  • February 6, 2025

    A Holistic Framework for Impossible Boomerang Attacks

    ePrint Report: A Holistic Framework for Impossible Boomerang Attacks Yincen Chen, Qinggan Fu, Ning Zhao, Jiahao Zhao, Ling Song, Qianqian Yang In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques. In this…

    Cryptography, Security
    #cryptography, #security
  • February 6, 2025

    Trimble Cityworks

    View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.6 ATTENTION: Exploitable remotely/low attack complexity/known public exploitation Vendor: Trimble Equipment: Cityworks Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an authenticated user to perform a remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Trimble Cityworks,…

    CISA, Cybersecurity, Security
  • February 6, 2025

    Schneider Electric EcoStruxure Power Monitoring Expert (PME)

    View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.1 ATTENTION: Exploitable remotely Vendor: Schneider Electric Equipment: EcoStruxure Power Monitoring Expert (PME) Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to remotely execute code. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Schneider Electric reports that the following products are…

    CISA, Cybersecurity, Security
  • February 6, 2025

    Schneider Electric EcoStruxure

    View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: EcoStruxure Vulnerability: Uncontrolled Search Path Element 2. RISK EVALUATION Successful exploitation of this vulnerability allows for local privilege escalation, which could lead to the execution of a malicious Dynamic-Link Library (DLL). 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following…

    CISA, Cybersecurity, Security
  • February 6, 2025

    ABB Drive Composer

    View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: ABB Equipment: Drive Composer Vulnerability: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) 2. RISK EVALUATION Successful exploitation of this vulnerability could allow attackers unauthorized access to the file system on the host machine. An attacker can exploit…

    CISA, Cybersecurity, Security
  • February 6, 2025

    Western Telematic Inc NPS Series, DSM Series, CPM Series

    View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Western Telematic Inc Equipment: NPS Series, DSM Series, CPM Series Vulnerability: External Control of File Name or Path 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an authenticated attacker to gain privileged access to files on the device’s filesystem.…

    CISA, Cybersecurity, Security
  • February 6, 2025

    Rockwell Automation 1756-L8zS3 and 1756-L3zS3

    View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.1 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: 1756-L8zS3, 1756-L3zS3 Vulnerability: Improper Handling of Exceptional Conditions 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a remote, non-privileged user to send malicious requests resulting in a major nonrecoverable fault causing a denial-of-service condition. 3. TECHNICAL…

    CISA, Cybersecurity, Security
  • February 6, 2025

    Schneider Electric Pro-face GP-Pro EX and Remote HMI

    View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.1 ATTENTION: Exploitable remotely Vendor: Schneider Electric Equipment: Pro-face GP-Pro EX and Remote HMI Vulnerability: Improper Enforcement of Message Integrity During Transmission in a Communication Channel 2. RISK EVALUATION Successful exploitation of this vulnerability could allow man-in-the-middle attacks, resulting in information disclosure, integrity issues, and operational failures. 3.…

    CISA, Cybersecurity, Security
  • February 6, 2025

    Schneider Electric Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC

    View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC Vulnerability: Incorrect Calculation of Buffer Size 2. RISK EVALUATION Successful exploitation of this vulnerability could cause a denial-of-service of the product when an unauthenticated user sends a crafted HTTPS packet…

    CISA, Cybersecurity, Security
Previous Page
1 … 58 59 60 61 62 … 95
Next Page

Designed by Alireza Gharib