Industrial

Security Information

PSIRT – Product Security Incident Response Team

The Softing PSIRT is a central team at Softing tasked with managing the investigation and disclosure of security vulnerabilities. All reports about possible vulnerabilities or other security incidents in connection with Softing products can be forwarded to the Softing PSIRT. The Softing PSIRT coordinates and maintains communication with everyone involved, both internally and externally, so that it can provide an appropriate response to any security problems that are identified.

Why should you report vulnerabilities?

Disclosing vulnerabilities enables us to fix these vulnerabilities and inform customers using the products in question about the fix. This approach can help us to keep making our products more secure and above all support Softing customers in managing security risks.

If you think you have uncovered a security vulnerability in a Softing product, please report it by email to .

Please include the following information with your report:

  • Contact information and availability
  • Affected product including model and version number
  • Classification of the vulnerability (buffer overflow, XSS, …)
  • Detailed description of the vulnerability (with verification if possible)
  • Effect of the vulnerability (if know)
  • Current level of awareness of the vulnerability (are there plans to disclose it or is there disclosure policy in place?)
  • (Company) affiliation of the reporter/finder (if reporter/finder is prepared to provide such information)
  • CVSS score (if known)

What will happen to your report?

The Softing PSIRT process is based on the FIRST framework and follows its four steps:
Discovery, Triage, Remediation, Disclosure.

Softing will ensure that the information is sent to a select group of designated Softing employees with experience in dealing with incidents of this type: the Softing Product Security Incident Response Team (PSIRT). Neither unauthorized employees nor external users will have access to the information you send.

In addition, Softing will ensure that the identity and contact details of the security expert are kept confidential and not published in any public statements (advisories and bulletins) unless explicitly requested by the security expert. The Softing PSIRT will investigate the reported vulnerability and contact you as soon as possible.

Stay up to date

The Softing PSIRT investigates all reports of security problems and publishes security advisories about validated security vulnerabilities that affect Softing products directly and require either a software update, software upgrade or another action by the customer. As part of ongoing efforts to support operators in addressing security risks and in ensuring the protected operation of systems, the Softing PSIRT publishes information that operators need to evaluate the ramifications of a security vulnerability.

Stay up to date with our security advisories

We publish information about vulnerabilities in Softing products and new or updated security advisories on our web pages.

Contact Softing PSIRT

Softing PSIRT public keys

Click here to download our PGP key

Fingerprint: 220C 4E9E 9A71 17BB C8E1 F863 0D5C 307C CACE DEDC

Languages: German or English
Transmission: preferably encrypted

Security Advisories
IDTitleCVECVSS ScoreProductsDateDownload
SYT-2022-7NULL pointer dereference vulnerability in OPC UA C++ SDK, Secure Integration Server, edgeConnector and edgeAggregatorCVE-2022-17487.5OPC UA C++ SDK
Secure Integration Server
edgeConnector
edgeAggregator
29.07.2022HTML
JSON
SYT-2022-6Default credentials authentication bypass vulnerability in Secure Integration Server, edgeConnector and edgeAggregatorCVE-2022-23369.8Secure Integration Server
edgeConnector
edgeAggregator
27.07.2022HTML
JSON
SYT-2022-5Remote code execution vulnerability in configuration restore functionality of Secure Integration ServerCVE-2022-2334
CVE-2022-1373
CVE-2022-2338
7.2Secure Integration Server27.07.2022HTML
JSON
SYT-2022-4Multiple denial of service vulnerabilities in FastCGI interface of Secure Integration ServerCVE-2022-1069
CVE-2022-2337
CVE-2022-2335
CVE-2022-2547
7.5Secure Integration Server27.07.2022HTML
JSON
SYT-2022-3Multiple vulnerabilities in the OPC UA .NET Standard SDK and the OPC UA .NET SDKCVE-2022-29862
CVE-2022-29863
CVE-2022-29864
CVE-2022-29865
7.5OPC UA .NET Standard SDK
OPC UA .NET SDK
22.07.2022HTML
JSON
SYT-2022-2Vulnerabilities in the OpenSSL used in the OPC UA C++ SDKCVE-2022-07787.5OPC UA C++ SDK15.03.2022HTML
JSON
SYT-2022-1Multiple vulnerabilities in the OPC UA C++ SDKCVE-2021-42262
CVE-2021-42577
7.5OPC UA C++ SDK
OPC Suite
Secure Integration Server
09.03.2022HTML
JSON
DescriptionCategoryCVEDateProductFixed in Version
Possible memory corruption in BT controllerMediumCVE-2021-3509306.12.2021mobiLinkN. A.
CWE 20: Improper Input ValidationHighCVE-2021-4087208.11.2021uaToolkit Embedded
smartLink HW DP
1.40
planned for 1.19
CWE 415: Double FreeHighCVE-2021-4087308.11.2021uaToolkit Embedded
OPC UA C++ SDK
TH SCOPE
dataFEED OPC Suite
Secure Integration Server
edgeConnector
uaGates
1.40
5.66
N. A.
5.18
planned for 1.30
planned for 3.10
1.73
CWE 20: Improper Input ValidationMediumCVE-2021-4087108.11.2021OPC UA C++ SDK
TH SCOPE
dataFEED OPC Suite
Secure Integration Server
5.66
N. A.
5.18
planned for 1.30
Improper Restriction of Operations within the Bounds of a Memory BufferHighCVE-2021-3299417.06.2021OPC UA C++ SDK5.65
Endless recursion in XML StructuresHighCVE: 2021-2743217.02.2021OPC UA .NET Standard SDK
OPC UA .NET SDK
2.80
1.48
Privilege Elevation vulnerabilitymediumCVE: 2020-2945715.02.2021OPC UA .NET Standard SDK2.80
DescriptionCategoryCVEDateProductFixed in Version
HEAP-BASED BUFFER OVERFLOWHighCVE-2020-1452428.07.2020OPC Classic SDK4.47.1
UNCONTROLLED RESOURCE CONSUMPTIONHighCVE-2020-1452228.07.2020OPC Classic SDK4.47.1
Servers do not create sufficiently random numbersHighCVE-2019-1913510.03.2020.NET Standard SDK2.40
Servers do not create sufficiently random numbersHighCVE-2019-1913510.03.2020dataFEED C++ SDK5.62
DescriptionCategoryCVEDateProductFixed in Version
Authenticated remote code execution possibleHighCVE-2019-1505110.10.2019uaGate SI
uaGate MB   
uaGate840D
edgeGate
1.72.00.1996
Sudo privilege escalationHighCVE-2019-1152610.10.2019uaGate SI
uaGate MB
uaGate840D
edgeGate
1.71.00.1225
Another authenticated remote code executionHighCVE-2019-1152710.10.2019uaGate SI
uaGate MB
uaGate840D
edgeGate
1.72.00.1996
Default unix user permissonsHighCVE-2019-1152810.10.2019uaGate SI
uaGate MB
uaGate840D
edgeGate
1.71.00.1225
Softing recommends always using the latest software/firmware version. These are in the Support and Downloads or the respective product page.

No representations are made as to the completeness or accuracy of the listing above. This information is provided without any guarantee or warranty of any kind, either explicit or tacit. We reserve the right to change or update the content of this website without notice at any time. The free update enables you to prevent or limit the consequences of damage resulting from security vulnerabilities. We cannot be held liable for any consequences arising from any omission in this regard. Security vulnerabilities cannot be removed in every case for products which have already reached their end-of-life cycle.

What does CVE mean?

It stands for Common Vulnerabilities and Exposures (CVE) and is an industry standard that aims to introduce a common naming convention for vulnerabilities and other security issues in computer systems. Multiple naming of the same threats by different companies and institutions is supplemented by a serial number (e.g. CVE-2006- 3086) to ensure clear identification of the vulnerability. This enables a smooth exchange of information between the various databases of individual manufacturers.

x

Softing Industrial Support

USA, Canada, Mexico
(865) 251-5244 (Knoxville, TN)
  
Callback

Germany HQ


«