ABB |
https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A1892&LanguageCode=en&DocumentPartId=&Action=Launch |
CVE-2016-20009 |
NAME:WRECK |
ATOS |
https://networks.unify.com/security/advisories/OBSO-2101-01.pdf |
CVE-2020-13987 |
AMNESIA:33 |
BD |
https://cybersecurity.bd.com/bulletins-and-patches/third-party-vulnerability-wreck |
CVE-2016-20009 |
NAME:WRECK |
B&R automation |
https://www.br-automation.com/downloads_br_productcatalogue/assets/1621259206587-en-original-1.0.pdf |
CVE-2020-13987, CVE-2020-17438 |
AMNESIA:33 |
B&R automation |
https://www.br-automation.com/downloads_br_productcatalogue/assets/1636745459972-en-original-1.0.pdf |
CVE-2020-27634 |
NUMBER:JACK |
B&R automation |
https://www.br-automation.com/downloads_br_productcatalogue/assets/1620567478764-en-original-1.0.pdf |
CVE-2016-20009 |
NAME:WRECK |
Cisco |
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvy11445 |
CVE-2020-7461 |
NAME:WRECK |
Cisco |
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvy11444 |
CVE-2020-7461 |
NAME:WRECK |
Cisco |
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvz69775 |
|
INFRA:HALT |
Cyanconnode AB |
https://kb.cert.org/vuls/id/815128 |
CVE-2020-13985, CVE-2020-13986, CVE-2020-13987, CVE-2020-13988, CVE-2020-17437, CVE-2020-17438, CVE-2020-17439, CVE-2020-17440 |
AMNESIA:33 |
Dell |
https://www.dell.com/support/kbdoc/en-us/000183560/dsa-2021-046-dell-client-security-update-for-amnesia-33-vulnerabilities |
|
AMNESIA:33 |
Dell |
https://www.dell.com/support/kbdoc/en-al/000194836/dsa-2021-271-dell-emc-unity-dell-emc-unity-vsa-and-dell-emc-unity-xt-security-update-for-multiple-vulnerabilities |
CVE-2020-17437, CVE-2020-17438, CVE-2020-13987, CVE-2020-13988 |
AMNESIA:33 |
Devolo |
https://www.devolo.de/fileadmin/Web-Content/DE/support/security/dSA201101-uIP_Stack-Security_Advisory.pdf |
CVE-2020-13987 |
AMNESIA:33 |
D-LINK |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10198 |
|
AMNESIA:33 |
EMH metering |
https://emh-metering.com/wp-content/uploads/2021/02/EMH_Advisory_VAXCET_210203.pdf |
CVE-2020-13987, CVE-2020-13988, CVE-2020-17437, CVE-2020-17438, CVE-2020-17439, CVE-2020-17440, CVE-2020-24334 |
AMNESIA:33 |
Emerson |
https://www.emerson.com/documents/automation/security-notification-cyber-security-notification-hcc-embedded-interniche-tcp-ip-stack-vulnerability-en-7831500.pdf |
CVE-2021-31400, CVE-2021-31401, CVE-2020-35684, CVE-2020-35685, CVE-2020-35683, CE-2021-36762 |
INFRA:HALT |
EMU |
https://www.emuag.ch/support/vulnerability/emu-sec20201201/ |
CVE-2020-13988, CVE-2020-13987, CVE-2020-17440, CVE-2020-17439, CVE-2020-17439, CVE-2020-17437 |
AMNESIA:33 |
Extreme Networks |
https://extremeportal.force.com/ExtrArticleDetail?an=000096235 |
CVE-2016-20009 |
NAME:WRECK |
Feig |
https://www.feig.de/fileadmin/user_upload/Downloads/Cybersecurity/2020-12-08-01_SecurityAdvisory.pdf |
CVE-2020-13987, CVE-2020-13988 |
AMNESIA:33 |
Genetec |
https://resources.genetec.com/security-advisories/vulnerabilities-affecting-the-sharpx-sharpz3 |
|
AMNESIA:33 |
GE Healthcare |
https://www.gehealthcare.com/security |
CVE-2016-20009 |
NAME:WRECK |
Hager |
https://daitem.it/wp-content/uploads/2021/10/Security-Advisory-HG-2021-001.pdf |
CVE-2020-25767, CVE-2020-25926, CVE-2020-25927, CVE-2020-25928, CVE-2021-27565, CVE-2020-35683, CVE-2020-35684, CVE-2020-35685, CVE-2021-31226, CVE-2021-31227, CVE-2021-31228, CVE-2021-31400, CVE-2021-31401 |
INFRA:HALT |
Harting |
https://harting.sharefile.eu/share/view/45b5ca131e574842/fod2c891-c568-4690-becd-988867bf4dfb |
CVE-2020-13987, CVE-2020-13988 |
AMNESIA:33 |
Hensoldt |
https://hensoldt-cyber.com/notifications/amnesia-33/ |
CVE-2020-24337, CVE-2020-24341 |
AMNESIA:33 |
HMS Networks |
https://www.hms-networks.com/docs/librariesprovider6/cybersecurity/hms-security-advisory-2022-04-14-001---anybus-interniche-vulnerabilities.pdf |
CVE-2020-25767, CVE-2020-25926, CVE-2020-25927, CVE-2020-25928, CVE-2021-27565, CVE-2020-35683, CVE-2020-35684, CVE-2020-35685, CVE-2021-31226, CVE-2021-31227, CVE-2021-31228, CVE-2021-31400, CVE-2021-31401 |
INFRA:HALT |
Huawei |
https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2021-1031 |
CVE-2020-13987, CVE-2020-13988, CVE-2020-17437 |
AMNESIA:33 |
Juniper |
https://supportportal.juniper.net/s/article/2022-04-Security-Bulletin-Junos-OS-vSRX-3-0-model-FreeBSD-SA-20-26-dhclient-heap-overflow-CVE-2020-7461?language=en_US |
CVE-2020-7461 |
NAME:WRECK |
Mindray |
https://m9m2s9g3.rocketcdn.me/wp-content/uploads/2021/12/Nucleus13_9623A.pdf |
CVE-2021-31344, CVE-2021-31345, CVE-2021-31346, CVE-2021-31881, CVE-2021-31882, CVE-2021-31883, CVE-2021-31884, CVE-2021-31885, CVE-2021-31886, CVE-2021-31887, CVE-2021-31888, CVE-2021-31889, CVE-2021-31890 |
NUCLEUS:13 |
Microchip Tech |
https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/amnesia-network-stack-tcp-ip-vulnerability |
CVE-2020-13987, CVE-2020-17439, CVE-2020-17440, CVE-2020-17441, CVE-2020-17470, CVE-2020-24334, CVE-2020-24336 |
AMNESIA:33 |
Nanotec |
https://en.nanotec.com/products/manual/N5_ECAT_EN?cHash=1b11e7dd4167bdbb93ee8d41de847565%20and%20https://en.nanotec.com/products/manual/N5_CAN_EN?cHash=57c3a0ea453f7c3bc9f2f33e93929599 |
|
AMNESIA:33 |
NETAPP |
https://security.netapp.com/advisory/ntap-20201016-0002/ |
CVE-2020-7461 |
NAME:WRECK |
Netgear |
https://kb.cert.org/vuls/id/815128 |
CVE-2020-13987 |
AMNESIA:33 |
Nihon Kohden |
https://www.nihonkohden.com/pdf/NKcorporateResponse-Nucleus-First-Rev02_En.pdf.pdf |
|
NUCLEUS:13 |
open-iSCSI |
https://github.com/open-iscsi/open-iscsi/security/advisories/GHSA-r278-fm99-8rgp |
CVE-2020-17437, CVE-2020-13988, CVE-2020-13987 |
AMNESIA:33 |
Philips |
https://www.philips.com/a-w/security/security-advisories.html |
|
NAME:WRECK |
Philips Dynalite |
https://www.dynalite.org/security-advisory/ |
|
INFRA:HALT |
Pilz |
https://www.pilz.com/download/restricted/Pilz_Security_Advis__2021-001_1005808-EN-02.pdf |
CVE-2020-35683, CVE-2020-35684, CVE-2020-35685 |
INFRA:HALT |
Phoenix Contact |
https://dam-mdc.phoenixcontact.com/asset/156443151564/fd2c482c84c16546afd992cf1786995e/Security_Advisory_Niche-Stack_20210804.pdf |
CVE-2020-35683, CVE-2020-35684, CVE-2020-35685, CVE-2021-31400, CVE-2021-31401, CVE 2021-31227 |
INFRA:HALT |
Phoenix Contact |
https://cert.vde.com/en/advisories/VDE-2021-059/ |
|
NUCLEUS:13 |
RENESAS |
https://www.renesas.com/us/en/document/oth/renesas-response-uip-open-source-tcp-ip-stacks-vulnerability-issue |
|
AMNESIA:33 |
Ricoh |
https://www.ricoh.com/info/2021/0504_1/ |
CVE-2016-20009 |
NAME:WRECK |
Rockwell |
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131196 |
CVE-2016-20009 |
NAME:WRECK |
Rockwell |
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1132370 |
CVE-2020-25767, CVE-2020-25926, CVE-2020-25927, CVE-2020-25928, CVE-2021-27565, CVE-2020-35683, CVE-2020-35684, CVE-2020-35685, CVE-2021-31226, CVE-2021-31227, CVE-2021-31228, CVE-2021-31400, CVE-2021-31401 |
INFRA:HALT |
Schneider Electric |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-217-01 |
CVE-2021-31400, CVE-2021-31401, CVE-2020-35683, CVE-2020-35684, CVE-2020-35685 |
INFRA:HALT |
Schneider Electric |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-06 |
CVE-2020-13987, CVE-2020-17438 |
AMNESIA:33 |
Sharp |
https://jp.sharp/business/lcd-display/support/vulnerability.html |
|
AMNESIA:33 |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-288459.pdf |
CVE-2020-7461 |
NAME:WRECK |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf |
CVE-2021-37186 |
NUMBER:JACK |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-541017.pdf |
CVE-2020-13988 |
AMNESIA:33 |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-362164.pdf |
CVE-2020-28388 |
NUMBER:JACK |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-288459.pdf |
CVE-2020-7461 |
NAME:WRECK |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-185699.pdf |
CVE-2020-15795, CVE-2020-27009 |
NAME:WRECK |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf |
CVE-2020-27736, CVE-2020-27737, CVE-2020-27738, CVE-2021-25677 |
NAME:WRECK |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-553445.pdf |
CVE-2016-20009 |
NAME:WRECK |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-344238.pdf |
CVE-2020-28388 |
NUMBER:JACK |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-599268.pdf |
CVE-2020-25241, CVE-2020-27632 |
NUMBER:JACK |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-541018.pdf |
CVE-2020-13988, CVE-2020-13987, CVE-2020-17437, CVE-2020-17438, CVE-2020-17439, CVE-2020-17440, CVE-2020-24334, CVE-2020-24335 |
AMNESIA:33 |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-789208.pdf |
CVE-2020-35683, CVE-2020-35684, CVE-2020-35685, CVE-2021-31401 |
INFRA:HALT |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-044112.pdf |
|
NUCLEUS:13 |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-114589.pdf |
|
NUCLEUS:13 |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-620288.pdf |
|
NUCLEUS:13 |
Siemens |
https://cert-portal.siemens.com/productcert/pdf/ssa-223353.pdf |
|
NUCLEUS:13 |
Suse |
https://lists.suse.com/pipermail/sle-security-updates/2021-March/008407.html |
CVE-2020-17437, CVE-2020-17438, CVE-2020-13987, CVE-2020-13988 |
AMNESIA:33 |
TagMaster |
https://tagmaster.com/wp-content/uploads/2020/12/1120-213-Security-Advisory-NuttX-TCP-IP-vulnerabilities.pdf |
CVE-2020-17437 |
AMNESIA:33 |
TI |
https://www.ti.com/lit/an/swra697a/swra697a.pdf?ts=1627028462625 |
|
AMNESIA:33 |
uniFLOW |
https://www.uniflow.global/en/security/security-and-maintenance/#security_advisory_8 |
CVE-2020-13988, CVE-2020-13987, CVE-2020-17438, CVE-2020-17437 |
AMNESIA:33 |
Weidmuller |
https://cert.vde.com/en/advisories/VDE-2021-042 |
CVE-2020-31401, CVE-2020-35683, CVE-2020-35684 |
INFRA:HALT |
WAGO |
https://cert.vde.com/en/advisories/VDE-2021-050/ |
|
NUCLEUS:13 |
Weinert Automation |
https://kb.cert.org/vuls/id/815128 |
CVE-2020-13984, CVE-2020-13985, CVE-2020-13986, CVE-2020-13987, CVE-2020-13988, CVE-2020-24334, CVE-2020-24336, CVE-2020-17437, CVE-2020-17438, CVE-2020-17439, CVE-2020-17440 |
AMNESIA:33 |
Yanzi Networks |
https://yanzi.dev/#/security/advisories/2020-12-08 |
CVE-2020-13984, CVE-2020-13985, CVE-2020-13986 |
AMNESIA:33 |