{"id":69327,"date":"2021-09-25T17:54:35","date_gmt":"2021-09-26T00:54:35","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/support-hub\/end-of-life-copy\/"},"modified":"2024-03-08T10:04:07","modified_gmt":"2024-03-08T18:04:07","slug":"vendor-security-advisories","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/","title":{"rendered":"Vendor Security Advisories"},"content":{"rendered":"<table aria-live=\"polite\" class=\"alm-listing alm-ajax c-responsive-table\" data-filters=\"true\" data-filters-target=\"search_filters\" data-filters-url=\"false\" data-filters-paging=\"false\" data-filters-scroll=\"false\" data-filters-scrolltop=\"30\" data-filters-debug=\"\" data-container-type=\"table\" data-loading-style=\"default\" data-theme-repeater=\"vendor-security-advisory.php\" data-post-type=\"vendor-sec-advisory\" data-order=\"ASC\" data-orderby=\"title\" data-offset=\"0\" data-posts-per-page=\"1000\" data-button-label=\"Load More\"><\/table>\n<table class=\"alm-listing alm-noscript c-responsive-table\">\n<tr class=\"vendor-security-advisory-table-head\">\n<th class=\"vendor-security-advisory-placeholder\" style=\"background-color: transparent\"><\/th>\n<th class=\"vendor-security-advisory-id\" style=\"background-color: #33598D;font-weight:bold\">ID<\/th>\n<th class=\"alm-filter-fs-vendor-security-advisory\" data-filter=\"vendor\" style=\"background-color: #415464;font-weight:bold\">Vendor<\/th>\n<th class=\"vendor-security-advisory-cve-id\" style=\"background-color: #009DEA;font-weight:bold\">CVE IDs<\/th>\n<th class=\"alm-filter-fs-vendor-security-advisory\" data-filter=\"study\" style=\"background-color: #415464;font-weight:bold\">Study<\/th>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">1<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/search.abb.com\/library\/Download.aspx?DocumentID=9AKK107992A1892&amp;LanguageCode=en&amp;DocumentPartId=&amp;Action=Launch\" target=\"_blank\" rel=\"noopener\">ABB<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-20009\" target=\"_blank\" rel=\"noopener\">CVE-2016-20009<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">2<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/networks.unify.com\/security\/advisories\/OBSO-2101-01.pdf\" target=\"_blank\" rel=\"noopener\">ATOS<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_blank\" rel=\"noopener\">CVE-2020-13987<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">3<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.br-automation.com\/downloads_br_productcatalogue\/assets\/1620567478764-en-original-1.0.pdf\" target=\"_blank\" rel=\"noopener\">B&amp;R automation<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-20009\" target=\"_blank\" rel=\"noopener\">CVE-2016-20009<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">4<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.br-automation.com\/downloads_br_productcatalogue\/assets\/1636745459972-en-original-1.0.pdf\" target=\"_blank\" rel=\"noopener\">B&amp;R automation<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-27634\" target=\"_blank\" rel=\"noopener\">CVE-2020-27634<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/resources\/numberjack-weak-isn-generation-in-embedded-tcpip-stacks\/\" target=\"\" rel=\"noopener\">NUMBER:JACK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">5<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.br-automation.com\/downloads_br_productcatalogue\/assets\/1621259206587-en-original-1.0.pdf\" target=\"_blank\" rel=\"noopener\">B&amp;R automation<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_blank\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17438\" target=\"_self\" rel=\"noopener\">CVE-2020-17438<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">6<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cybersecurity.bd.com\/bulletins-and-patches\/third-party-vulnerability-wreck\" target=\"_blank\" rel=\"noopener\">BD<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-20009\" target=\"_blank\" rel=\"noopener\">CVE-2016-20009<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">7<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-188-02\" target=\"_blank\" rel=\"noopener\">Bently Nevada<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-29952\" target=\"_blank\" rel=\"noopener\">CVE-2022-2995<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-29953\" target=\"_blank\" rel=\"noopener\">CVE-2022-29953<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-29952\" target=\"_blank\" rel=\"noopener\">CVE-2022-29952<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">8<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-188-02\" target=\"_blank\" rel=\"noopener\">Bently Nevada<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-29952\" target=\"_blank\" rel=\"noopener\">CVE-2022-29952<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-29953\" target=\"_blank\" rel=\"noopener\">CVE-2022-29953<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">9<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/quickview.cloudapps.cisco.com\/quickview\/bug\/CSCvy11444\" target=\"_blank\" rel=\"noopener\">Cisco<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-7461\" target=\"_blank\" rel=\"noopener\">CVE-2020-7461<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">10<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/quickview.cloudapps.cisco.com\/quickview\/bug\/CSCvy11445\" target=\"_blank\" rel=\"noopener\">Cisco<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-7461\" target=\"_blank\" rel=\"noopener\">CVE-2020-7461<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">11<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/quickview.cloudapps.cisco.com\/quickview\/bug\/CSCvz69775\" target=\"_blank\" rel=\"noopener\">Cisco<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">12<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/customers.codesys.com\/index.php?eID=dumpFile&amp;t=f&amp;f=17350&amp;token=2cee62285d3ec76d6a78dfa9b9e81e66f6136a2a&amp;download=\" target=\"_blank\" rel=\"noopener\">CODESYS V3<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-4048<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"_blank\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">13<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/kb.cert.org\/vuls\/id\/815128\" target=\"_blank\" rel=\"noopener\">Cyanconnode AB<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13985\" target=\"_blank\" rel=\"noopener\">CVE-2020-13985<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13986\" target=\"_self\" rel=\"noopener\">CVE-2020-13986<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_self\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_self\" rel=\"noopener\">CVE-2020-13988<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17437\" target=\"_self\" rel=\"noopener\">CVE-2020-17437<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17438\" target=\"_self\" rel=\"noopener\">CVE-2020-17438<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17439\" target=\"_self\" rel=\"noopener\">CVE-2020-17439<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17440\" target=\"_self\" rel=\"noopener\">CVE-2020-17440<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">14<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/supportannouncement.us.dlink.com\/announcement\/publication.aspx?name=SAP10198\" target=\"_blank\" rel=\"noopener\">D-LINK<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">15<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.dell.com\/support\/kbdoc\/en-us\/000183560\/dsa-2021-046-dell-client-security-update-for-amnesia-33-vulnerabilities\" target=\"_blank\" rel=\"noopener\">Dell<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_blank\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_blank\" rel=\"noopener\">CVE-2020-13988<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17437\" target=\"_blank\" rel=\"noopener\">CVE-2020-17437<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17438\" target=\"_blank\" rel=\"noopener\">CVE-2020-17438<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17439\" target=\"_blank\" rel=\"noopener\">CVE-2020-17439<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17440\" target=\"_blank\" rel=\"noopener\">CVE-2020-17440<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24334\" target=\"_blank\" rel=\"noopener\">CVE-2020-24334<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24335\" target=\"_blank\" rel=\"noopener\">CVE-2020-24335<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">16<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.dell.com\/support\/kbdoc\/en-al\/000194836\/dsa-2021-271-dell-emc-unity-dell-emc-unity-vsa-and-dell-emc-unity-xt-security-update-for-multiple-vulnerabilities\" target=\"_blank\" rel=\"noopener\">Dell<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-17437<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-17438<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-13988<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">17<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.devolo.de\/fileadmin\/Web-Content\/DE\/support\/security\/dSA201101-uIP_Stack-Security_Advisory.pdf\" target=\"_blank\" rel=\"noopener\">Devolo<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_blank\" rel=\"noopener\">CVE-2020-13987<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">18<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/help.dten.com\/hc\/en-us\/articles\/900000046746-Security-Update-DTEN-D7-1-3-5-AND-DTEN-D5-1-2-3-FIRMWARE-SECURITY-UPDATES-NOW-AVAILABLE\" target=\"_blank\" rel=\"noopener\">DTEN<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-16270\" target=\"_blank\" rel=\"noopener\">CVE-2019-16270<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-16271\" target=\"_self\" rel=\"noopener\">CVE-2019-16271<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-16272\" target=\"_self\" rel=\"noopener\">CVE-2019-16272<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-16273\" target=\"_self\" rel=\"noopener\">CVE-2019-16273<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-16274\" target=\"_self\" rel=\"noopener\">CVE-2019-16274<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/company\/blog\/dten-vulnerability\/\" target=\"\" rel=\"noopener\">DTEN<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">19<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"http:\/\/EasyIO\" target=\"_blank\" rel=\"noopener\">EasyIO<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-15819\" target=\"_blank\" rel=\"noopener\">CVE-2018-15819<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-15820\" target=\"_self\" rel=\"noopener\">CVE-2018-15820<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/blog\/vulnerabilities-in-building-automation-systems\/\" target=\"\" rel=\"noopener\">Building Automation<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">20<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.emerson.com\/documents\/automation\/security-notification-cyber-security-notification-hcc-embedded-interniche-tcp-ip-stack-vulnerability-en-7831500.pdf\" target=\"_blank\" rel=\"noopener\">Emerson<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31400\" target=\"_blank\" rel=\"noopener\">CVE-2021-31400<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31401\" target=\"_self\" rel=\"noopener\">CVE-2021-31401<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35684\" target=\"_self\" rel=\"noopener\">CVE-2020-35684<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35685\" target=\"_self\" rel=\"noopener\">CVE-2020-35685<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35683\" target=\"_self\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CE-2021-36762\" target=\"_self\" rel=\"noopener\">CE-2021-36762<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">21<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-181-03\" target=\"_blank\" rel=\"noopener\">Emerson<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"_blank\" rel=\"noopener\">CVE-2022-29957<\/a><br \/>\n, <a href=\"#\" target=\"_blank\" rel=\"noopener\">CVE-2022-30260<\/a><br \/>\n, <a href=\"#\" target=\"_blank\" rel=\"noopener\">CVE-2022-29962<\/a><br \/>\n, <a href=\"#\" target=\"_blank\" rel=\"noopener\">CVE-2022-29963<\/a><br \/>\n, <a href=\"#\" target=\"_blank\" rel=\"noopener\">CVE-2022-29964<\/a><br \/>\n, <a href=\"#\" target=\"_blank\" rel=\"noopener\">CVE-2022-29965<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">22<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-221-02\" target=\"_blank\" rel=\"noopener\">Emerson ControlWave<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30262\" target=\"_blank\" rel=\"noopener\">CVE-2022-30262<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">23<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-221-03\" target=\"_blank\" rel=\"noopener\">Emerson OpenBSI<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-29959\" target=\"_blank\" rel=\"noopener\">CVE-2022-29959<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-29960\" target=\"_blank\" rel=\"noopener\">CVE-2022-29960<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">24<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-223-04\" target=\"_blank\" rel=\"noopener\">Emerson ROC800, ROC800L and DL800<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30264\" target=\"_blank\" rel=\"noopener\">CVE-2022-30264<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">25<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/emh-metering.com\/wp-content\/uploads\/2021\/02\/EMH_Advisory_VAXCET_210203.pdf\" target=\"_blank\" rel=\"noopener\">EMH metering<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_blank\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_self\" rel=\"noopener\">CVE-2020-13988<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17437\" target=\"_self\" rel=\"noopener\">CVE-2020-17437<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17438\" target=\"_self\" rel=\"noopener\">CVE-2020-17438<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17439\" target=\"_self\" rel=\"noopener\">CVE-2020-17439<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17440\" target=\"_self\" rel=\"noopener\">CVE-2020-17440<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24334\" target=\"_self\" rel=\"noopener\">CVE-2020-24334<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">26<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.emuag.ch\/support\/vulnerability\/emu-sec20201201\/\" target=\"_blank\" rel=\"noopener\">EMU<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_blank\" rel=\"noopener\">CVE-2020-13988<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_self\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17440\" target=\"_self\" rel=\"noopener\">CVE-2020-17440<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17439\" target=\"_self\" rel=\"noopener\">CVE-2020-17439<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17439\" target=\"_self\" rel=\"noopener\">CVE-2020-17439<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17437\" target=\"_self\" rel=\"noopener\">CVE-2020-17437<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">27<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/extremeportal.force.com\/ExtrArticleDetail?an=000096235\" target=\"_blank\" rel=\"noopener\">Extreme Networks<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-20009\" target=\"_blank\" rel=\"noopener\">CVE-2016-20009<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">28<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.feig.de\/fileadmin\/user_upload\/Downloads\/Cybersecurity\/2020-12-08-01_SecurityAdvisory.pdf\" target=\"_blank\" rel=\"noopener\">Feig<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_blank\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_self\" rel=\"noopener\">CVE-2020-13988<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">29<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert.vde.com\/en\/advisories\/VDE-2022-041\/\" target=\"_blank\" rel=\"noopener\">Festo<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-3270<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"_blank\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">30<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert.vde.com\/en\/advisories\/VDE-2022-036\/\" target=\"_blank\" rel=\"noopener\">Festo CPX-CEC-C1 and CPX-CMXX<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-3079<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"_blank\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">31<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.festo.com\/net\/nl_nl\/SupportPortal\/Files\/759177\/fsa-202208.pdf\" target=\"_blank\" rel=\"noopener\">Festo multiple products<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-22515<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-31806<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"_blank\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">32<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"\/blog\/three-new-bgp-message-parsing-vulnerabilities-disclosed-in-frrouting-software\/\" target=\"\" rel=\"noopener\">FRRouting<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-40302<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-40318<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-43681<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/blog\/three-new-bgp-message-parsing-vulnerabilities-disclosed-in-frrouting-software\/\" target=\"_blank\" rel=\"noopener\">BGP<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">33<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.gehealthcare.com\/security\" target=\"_blank\" rel=\"noopener\">GE Healthcare<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-20009\" target=\"_blank\" rel=\"noopener\">CVE-2016-20009<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">34<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/resources.genetec.com\/security-advisories\/vulnerabilities-affecting-the-sharpx-sharpz3\" target=\"_blank\" rel=\"noopener\">Genetec<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">35<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/daitem.it\/wp-content\/uploads\/2021\/10\/Security-Advisory-HG-2021-001.pdf\" target=\"_blank\" rel=\"noopener\">Hager <\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-25767<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-25926<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-25927<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-25928<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-27565<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-35684<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-35685<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31226<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31227<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31228<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31400<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31401<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">36<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/harting.sharefile.eu\/share\/view\/45b5ca131e574842\/fod2c891-c568-4690-becd-988867bf4dfb\" target=\"_blank\" rel=\"noopener\">Harting<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_blank\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_self\" rel=\"noopener\">CVE-2020-13988<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">37<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/hensoldt-cyber.com\/notifications\/amnesia-33\/\" target=\"_blank\" rel=\"noopener\">Hensoldt<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24337\" target=\"_blank\" rel=\"noopener\">CVE-2020-24337<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24341\" target=\"_self\" rel=\"noopener\">CVE-2020-24341<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">38<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.hms-networks.com\/docs\/librariesprovider6\/cybersecurity\/hms-security-advisory-2022-04-14-001---anybus-interniche-vulnerabilities.pdf\" target=\"_blank\" rel=\"noopener\">HMS Networks<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25767\" target=\"_blank\" rel=\"noopener\">CVE-2020-25767<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25926\" target=\"_blank\" rel=\"noopener\">CVE-2020-25926<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25927\" target=\"_blank\" rel=\"noopener\">CVE-2020-25927<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25928\" target=\"_blank\" rel=\"noopener\">CVE-2020-25928<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27565\" target=\"_blank\" rel=\"noopener\">CVE-2021-27565<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35683\" target=\"_blank\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35684\" target=\"_blank\" rel=\"noopener\">CVE-2020-35684<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35685\" target=\"_blank\" rel=\"noopener\">CVE-2020-35685 <\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31226\" target=\"_blank\" rel=\"noopener\">CVE-2021-31226<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31227\" target=\"_blank\" rel=\"noopener\">CVE-2021-31227<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31228\" target=\"_blank\" rel=\"noopener\">CVE-2021-31228<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31400\" target=\"_blank\" rel=\"noopener\">CVE-2021-31400<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31401\" target=\"_blank\" rel=\"noopener\">CVE-2021-31401<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">39<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.hms-networks.com\/docs\/librariesprovider6\/cybersecurity\/hms-security-advisory-2022-04-14-001---anybus-interniche-vulnerabilities.pdf\" target=\"_blank\" rel=\"noopener\">HMS Networks<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-25767<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-25926<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-25927<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-25928<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-27565<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-35684<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-35685<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31226<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31228<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31400<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31401<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31227<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">40<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-242-06\" target=\"_blank\" rel=\"noopener\">Honeywell ControlEdge<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30318\" target=\"_blank\" rel=\"noopener\">CVE-2022-30318 <\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">41<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-242-07\" target=\"_blank\" rel=\"noopener\">Honeywell Experion LX<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30317\" target=\"_blank\" rel=\"noopener\">CVE-2022-30317<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">42<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-22-207-02\" target=\"_blank\" rel=\"noopener\">Honeywell Safety Manager<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"_blank\" rel=\"noopener\">CVE-2022-30313<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-30314<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-30315<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-30316<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">43<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-207-02\" target=\"_blank\" rel=\"noopener\">Honeywell Saia Burgess PG5 PCD<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30319\" target=\"_blank\" rel=\"noopener\">CVE-2022-30319<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30320\" target=\"_blank\" rel=\"noopener\">CVE-2022-30320<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">44<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-242-08\" target=\"_blank\" rel=\"noopener\">Honeywell Trend Controls Inter-Controller Protocol<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30312\" target=\"_blank\" rel=\"noopener\">CVE-2022-30312<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">45<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/developer.huaweicloud.com\/ict\/en\/site-euleros\/euleros\/security-advisories\/EulerOS-SA-2021-1031\" target=\"_blank\" rel=\"noopener\">Huawei<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-13988<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-17437<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">46<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-172-02\" target=\"_blank\" rel=\"noopener\">JTEKT TOYOPUC<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-29951\" target=\"_blank\" rel=\"noopener\">CVE-2022-29951<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-29958\" target=\"_blank\" rel=\"noopener\">CVE-2022-29958<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">47<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/supportportal.juniper.net\/s\/article\/2022-04-Security-Bulletin-Junos-OS-vSRX-3-0-model-FreeBSD-SA-20-26-dhclient-heap-overflow-CVE-2020-7461?language=en_US\" target=\"_blank\" rel=\"noopener\">Juniper<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2020-7461<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">48<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"http:\/\/Loytec\" target=\"_blank\" rel=\"noopener\">Loytec<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-14916\" target=\"_blank\" rel=\"noopener\">CVE-2018-14916<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-14918\" target=\"_self\" rel=\"noopener\">CVE-2018-14918<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-14919\" target=\"_self\" rel=\"noopener\">CVE-2018-14919<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/blog\/vulnerabilities-in-building-automation-systems\/\" target=\"\" rel=\"noopener\">Building Automation<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">49<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.microchip.com\/en-us\/products\/wireless-connectivity\/software-vulnerability-response\/amnesia-network-stack-tcp-ip-vulnerability\" target=\"_blank\" rel=\"noopener\">Microchip Tech<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_blank\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17439\" target=\"_self\" rel=\"noopener\">CVE-2020-17439<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17440\" target=\"_self\" rel=\"noopener\">CVE-2020-17440<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17441\" target=\"_self\" rel=\"noopener\">CVE-2020-17441<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17470\" target=\"_self\" rel=\"noopener\">CVE-2020-17470<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24334\" target=\"_self\" rel=\"noopener\">CVE-2020-24334<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24336\" target=\"_self\" rel=\"noopener\">CVE-2020-24336<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">50<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/m9m2s9g3.rocketcdn.me\/wp-content\/uploads\/2021\/12\/Nucleus13_9623A.pdf\" target=\"_blank\" rel=\"noopener\">Mindray<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31344<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31345<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31346<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31881<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31882<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31883<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31884<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31885<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31886<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31887<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31888<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31889<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31890<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/nucleus-13\/\" target=\"\" rel=\"noopener\">NUCLEUS:13<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">51<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-179-06\" target=\"_blank\" rel=\"noopener\">Motorola Solutions ACE1000<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30269\" target=\"_blank\" rel=\"noopener\">CVE-2022-30269<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30270\" target=\"_blank\" rel=\"noopener\">CVE-2022-30270<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30270\" target=\"_blank\" rel=\"noopener\">CVE-2022-30271<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30272\" target=\"_blank\" rel=\"noopener\">CVE-2022-30272<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30274\" target=\"_blank\" rel=\"noopener\">CVE-2022-30274<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">52<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-179-05\" target=\"_blank\" rel=\"noopener\">Motorola Solutions MDLC<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30273\" target=\"_blank\" rel=\"noopener\">CVE-2022-30273<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30275\" target=\"_blank\" rel=\"noopener\">CVE-2022-30275<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">53<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-179-04\" target=\"_blank\" rel=\"noopener\">Motorola Solutions MOSCAD IP and ACE IP Gateways<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30276\" target=\"_blank\" rel=\"noopener\">CVE-2022-30276<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">54<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/en.nanotec.com\/products\/manual\/N5_ECAT_EN?cHash=1b11e7dd4167bdbb93ee8d41de847565%20and%20https:\/\/en.nanotec.com\/products\/manual\/N5_CAN_EN?cHash=57c3a0ea453f7c3bc9f2f33e93929599\" target=\"_blank\" rel=\"noopener\">Nanotec<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">55<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/security.netapp.com\/advisory\/ntap-20201016-0002\/\" target=\"_blank\" rel=\"noopener\">NETAPP<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-7461\" target=\"_blank\" rel=\"noopener\">CVE-2020-7461<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">56<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/kb.cert.org\/vuls\/id\/815128\" target=\"_blank\" rel=\"noopener\">Netgear<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_blank\" rel=\"noopener\">CVE-2020-13987<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">57<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-179-02\" target=\"_blank\" rel=\"noopener\">Omron SYSMAC CS\/CJ\/CP Series and NJ\/NX Series<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-31204\" target=\"_blank\" rel=\"noopener\">CVE-2022-31204<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-31205\" target=\"_blank\" rel=\"noopener\">CVE-2022-31205<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-31206\" target=\"_blank\" rel=\"noopener\">CVE-2022-31206<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-31207\" target=\"_blank\" rel=\"noopener\">CVE-2022-31207<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">58<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/github.com\/open-iscsi\/open-iscsi\/security\/advisories\/GHSA-r278-fm99-8rgp\" target=\"_blank\" rel=\"noopener\">open-iSCSI<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17437\" target=\"_blank\" rel=\"noopener\">CVE-2020-17437<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_self\" rel=\"noopener\">CVE-2020-13988<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_self\" rel=\"noopener\">CVE-2020-13987<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">59<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.philips.com\/a-w\/security\/security-advisories.html\" target=\"_blank\" rel=\"noopener\">Philips<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">60<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.dynalite.org\/security-advisory\/\" target=\"_blank\" rel=\"noopener\">Philips Dynalite<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31226\" target=\"_blank\" rel=\"noopener\">CVE-2021-31226<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27565\" target=\"_blank\" rel=\"noopener\">CVE-2021-27565<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31227\" target=\"_blank\" rel=\"noopener\">CVE-2021-31227<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35685\" target=\"_blank\" rel=\"noopener\">CVE-2020-35685<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31400\" target=\"_blank\" rel=\"noopener\">CVE-2021-31400<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31401\" target=\"_blank\" rel=\"noopener\">CVE-2021-31401<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35683\" target=\"_blank\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35684\" target=\"_blank\" rel=\"noopener\">CVE-2020-35684<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">61<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/dam-mdc.phoenixcontact.com\/asset\/156443151564\/fd2c482c84c16546afd992cf1786995e\/Security_Advisory_Niche-Stack_20210804.pdf\" target=\"_blank\" rel=\"noopener\">Phoenix Contact<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35683\" target=\"_blank\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35684\" target=\"_self\" rel=\"noopener\">CVE-2020-35684<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35685\" target=\"_self\" rel=\"noopener\">CVE-2020-35685<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31400\" target=\"_self\" rel=\"noopener\">CVE-2021-31400<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31401\" target=\"_self\" rel=\"noopener\">CVE-2021-31401<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE%202021-31227\" target=\"_self\" rel=\"noopener\">CVE 2021-31227<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">62<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert.vde.com\/en\/advisories\/VDE-2021-059\/\" target=\"_blank\" rel=\"noopener\">Phoenix Contact<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31344\" target=\"_blank\" rel=\"noopener\">CVE-2021-31344<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31346\" target=\"_blank\" rel=\"noopener\">CVE-2021-31346<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31881\" target=\"_blank\" rel=\"noopener\">CVE-2021-31881<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31882\" target=\"_blank\" rel=\"noopener\">CVE-2021-31882<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31883\" target=\"_blank\" rel=\"noopener\">CVE-2021-31883<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31884\" target=\"_blank\" rel=\"noopener\">CVE-2021-31884<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31889\" target=\"_blank\" rel=\"noopener\">CVE-2021-31889<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31890\" target=\"_blank\" rel=\"noopener\">CVE-2021-31890<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/nucleus-13\/\" target=\"\" rel=\"noopener\">NUCLEUS:13<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">63<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-172-03\" target=\"_blank\" rel=\"noopener\">Phoenix Contact Classic Line Controllers<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-31800\" target=\"_blank\" rel=\"noopener\">CVE-2022-31800<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">64<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-172-05\" target=\"_blank\" rel=\"noopener\">Phoenix Contact Classic Line Industrial Controllers<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2019-9201\" target=\"_blank\" rel=\"noopener\">CVE-2019-9201<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">65<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-172-04\" target=\"_blank\" rel=\"noopener\">Phoenix Contact ProConOS and MULTIPROG<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-31801\" target=\"_blank\" rel=\"noopener\">CVE-2022-31801<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">66<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.pilz.com\/download\/restricted\/Pilz_Security_Advis__2021-001_1005808-EN-02.pdf\" target=\"_blank\" rel=\"noopener\">Pilz<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35683\" target=\"_blank\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35684\" target=\"_self\" rel=\"noopener\">CVE-2020-35684<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35685\" target=\"_self\" rel=\"noopener\">CVE-2020-35685<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">67<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.renesas.com\/us\/en\/document\/oth\/renesas-response-uip-open-source-tcp-ip-stacks-vulnerability-issue\" target=\"_blank\" rel=\"noopener\">RENESAS<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">68<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.ricoh.com\/info\/2021\/0504_1\/\" target=\"_blank\" rel=\"noopener\">Ricoh<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-20009\" target=\"_blank\" rel=\"noopener\">CVE-2016-20009<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">69<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/rockwellautomation.custhelp.com\/app\/answers\/answer_view\/a_id\/1132370\" target=\"_blank\" rel=\"noopener\">Rockwell<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25767\" target=\"_blank\" rel=\"noopener\">CVE-2020-25767<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25926\" target=\"_self\" rel=\"noopener\">CVE-2020-25926<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25927\" target=\"_self\" rel=\"noopener\">CVE-2020-25927<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25928\" target=\"_self\" rel=\"noopener\">CVE-2020-25928<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27565\" target=\"_self\" rel=\"noopener\">CVE-2021-27565<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35683\" target=\"_self\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35684\" target=\"_self\" rel=\"noopener\">CVE-2020-35684<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35685\" target=\"_self\" rel=\"noopener\">CVE-2020-35685<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31226\" target=\"_self\" rel=\"noopener\">CVE-2021-31226<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31227\" target=\"_self\" rel=\"noopener\">CVE-2021-31227<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31228\" target=\"_self\" rel=\"noopener\">CVE-2021-31228<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31400\" target=\"_self\" rel=\"noopener\">CVE-2021-31400<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31401\" target=\"_self\" rel=\"noopener\">CVE-2021-31401<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">70<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/rockwellautomation.custhelp.com\/app\/answers\/answer_view\/a_id\/1131196\" target=\"_blank\" rel=\"noopener\">Rockwell<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-20009\" target=\"_blank\" rel=\"noopener\">CVE-2016-20009<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">71<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/download.schneider-electric.com\/files?p_Doc_Ref=SEVD-2021-217-01\" target=\"_blank\" rel=\"noopener\">Schneider Electric<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31400\" target=\"_blank\" rel=\"noopener\">CVE-2021-31400<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31401\" target=\"_self\" rel=\"noopener\">CVE-2021-31401<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35683\" target=\"_self\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35684\" target=\"_self\" rel=\"noopener\">CVE-2020-35684<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35685\" target=\"_self\" rel=\"noopener\">CVE-2020-35685<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">72<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/download.schneider-electric.com\/files?p_Doc_Ref=SEVD-2021-285-06\" target=\"_blank\" rel=\"noopener\">Schneider Electric<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_blank\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17438\" target=\"_self\" rel=\"noopener\">CVE-2020-17438<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">73<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"#\" target=\"\" rel=\"noopener\">Schneider Electric Modicon Controllers<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/www.se.com\/ww\/en\/download\/document\/SEVD-2023-010-05\/\" target=\"_blank\" rel=\"noopener\">CVE-2022-45788<\/a><br \/>\n, <a href=\"https:\/\/www.se.com\/ww\/en\/download\/document\/SEVD-2023-010-06\/\" target=\"_blank\" rel=\"noopener\">CVE-2022-45789<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">74<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/download.schneider-electric.com\/files?p_Doc_Ref=SEVD-2023-129-03&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2023-129-03.pdf\" target=\"_blank\" rel=\"noopener\">Schneider Electric PowerLogic and ION<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2022-46680<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"_blank\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">75<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/jp.sharp\/business\/lcd-display\/support\/vulnerability.html\" target=\"_blank\" rel=\"noopener\">Sharp<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">76<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-789208.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35683\" target=\"_blank\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35684\" target=\"_self\" rel=\"noopener\">CVE-2020-35684<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35685\" target=\"_self\" rel=\"noopener\">CVE-2020-35685<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31401\" target=\"_self\" rel=\"noopener\">CVE-2021-31401<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">77<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-362164.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-28388\" target=\"_blank\" rel=\"noopener\">CVE-2020-28388<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/blog\/numberjack-forescout-research-labs-finds-nine-isn-generation-vulnerabilities-affecting-tcpip-stacks\/\" target=\"\" rel=\"noopener\">NUMBER:JACK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">78<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-541017.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_blank\" rel=\"noopener\">CVE-2020-13988<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">79<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-044112.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31344\" target=\"_blank\" rel=\"noopener\">CVE-2021-31344<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31345\" target=\"_blank\" rel=\"noopener\">CVE-2021-31345<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31346\" target=\"_blank\" rel=\"noopener\">CVE-2021-31346<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31881\" target=\"_blank\" rel=\"noopener\">CVE-2021-31881<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31882\" target=\"_blank\" rel=\"noopener\">CVE-2021-31882<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31883\" target=\"_blank\" rel=\"noopener\">CVE-2021-31883<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31884\" target=\"_blank\" rel=\"noopener\">CVE-2021-31884<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31885\" target=\"_blank\" rel=\"noopener\">CVE-2021-31885<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31886\" target=\"_blank\" rel=\"noopener\">CVE-2021-31886<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31887\" target=\"_blank\" rel=\"noopener\">CVE-2021-31887<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31888\" target=\"_blank\" rel=\"noopener\">CVE-2021-31888<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31889\" target=\"_blank\" rel=\"noopener\">CVE-2021-31889<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31890\" target=\"_blank\" rel=\"noopener\">CVE-2021-31890<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/nucleus-13\/\" target=\"\" rel=\"noopener\">NUCLEUS:13<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">80<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-316383.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-37186\" target=\"_blank\" rel=\"noopener\">CVE-2021-37186<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/blog\/numberjack-forescout-research-labs-finds-nine-isn-generation-vulnerabilities-affecting-tcpip-stacks\/\" target=\"\" rel=\"noopener\">NUMBER:JACK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">81<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-789208.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35683\" target=\"_blank\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35684\" target=\"_self\" rel=\"noopener\">CVE-2020-35684<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35685\" target=\"_self\" rel=\"noopener\">CVE-2020-35685<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31401\" target=\"_self\" rel=\"noopener\">CVE-2021-31401<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">82<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-599268.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-25241\" target=\"_blank\" rel=\"noopener\">CVE-2020-25241<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-27632\" target=\"_self\" rel=\"noopener\">CVE-2020-27632<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/blog\/numberjack-forescout-research-labs-finds-nine-isn-generation-vulnerabilities-affecting-tcpip-stacks\/\" target=\"\" rel=\"noopener\">NUMBER:JACK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">83<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-185699.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-15795\" target=\"_blank\" rel=\"noopener\">CVE-2020-15795<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-27009\" target=\"_self\" rel=\"noopener\">CVE-2020-27009<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">84<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.siemens-healthineers.com\/en-us\/support-documentation\/security-advisory\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-7590\" target=\"_blank\" rel=\"noopener\">CVE-2020-7590<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-15797\" target=\"_self\" rel=\"noopener\">CVE-2020-15797<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/company\/blog\/connected-medical-device-security-report-shows-health-networks-still-exposed\/\" target=\"\" rel=\"noopener\">Healthcare<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">85<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-553445.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-20009\" target=\"_blank\" rel=\"noopener\">CVE-2016-20009<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">86<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-344238.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-28388\" target=\"_blank\" rel=\"noopener\">CVE-2020-28388<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/blog\/numberjack-forescout-research-labs-finds-nine-isn-generation-vulnerabilities-affecting-tcpip-stacks\/\" target=\"\" rel=\"noopener\">NUMBER:JACK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">87<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-705111.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-27736\" target=\"_blank\" rel=\"noopener\">CVE-2020-27736<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-27737\" target=\"_self\" rel=\"noopener\">CVE-2020-27737<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-27738\" target=\"_self\" rel=\"noopener\">CVE-2020-27738<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-25677\" target=\"_self\" rel=\"noopener\">CVE-2021-25677<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">88<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-288459.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-7461\" target=\"_blank\" rel=\"noopener\">CVE-2020-7461<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/namewreck\/\" target=\"\" rel=\"noopener\">NAME:WRECK<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">89<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-541018.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_blank\" rel=\"noopener\">CVE-2020-13988<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_self\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17437\" target=\"_self\" rel=\"noopener\">CVE-2020-17437<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17438\" target=\"_self\" rel=\"noopener\">CVE-2020-17438<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17439\" target=\"_self\" rel=\"noopener\">CVE-2020-17439<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17440\" target=\"_self\" rel=\"noopener\">CVE-2020-17440<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24334\" target=\"_self\" rel=\"noopener\">CVE-2020-24334<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24335\" target=\"_self\" rel=\"noopener\">CVE-2020-24335<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">90<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-114589.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31344\" target=\"_blank\" rel=\"noopener\">CVE-2021-31344<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31345\" target=\"_blank\" rel=\"noopener\">CVE-2021-31345<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31346\" target=\"_blank\" rel=\"noopener\">CVE-2021-31346<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31881\" target=\"_blank\" rel=\"noopener\">CVE-2021-31881<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31882\" target=\"_blank\" rel=\"noopener\">CVE-2021-31882<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31883\" target=\"_blank\" rel=\"noopener\">CVE-2021-31883<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31884\" target=\"_blank\" rel=\"noopener\">CVE-2021-31884<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31885\" target=\"_blank\" rel=\"noopener\">CVE-2021-31885<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31886\" target=\"_blank\" rel=\"noopener\">CVE-2021-31886<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31887\" target=\"_blank\" rel=\"noopener\">CVE-2021-31887<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31888\" target=\"_blank\" rel=\"noopener\">CVE-2021-31888<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31889\" target=\"_blank\" rel=\"noopener\">CVE-2021-31889<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31890\" target=\"_blank\" rel=\"noopener\">CVE-2021-31890<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/nucleus-13\/\" target=\"\" rel=\"noopener\">NUCLEUS:13<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">91<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-620288.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31344\" target=\"_blank\" rel=\"noopener\">CVE-2021-31344<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31345\" target=\"_blank\" rel=\"noopener\">CVE-2021-31345<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31346\" target=\"_blank\" rel=\"noopener\">CVE-2021-31346<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31881\" target=\"_blank\" rel=\"noopener\">CVE-2021-31881<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31882\" target=\"_blank\" rel=\"noopener\">CVE-2021-31882<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31883\" target=\"_blank\" rel=\"noopener\">CVE-2021-31883<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31884\" target=\"_blank\" rel=\"noopener\">CVE-2021-31884<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31885\" target=\"_blank\" rel=\"noopener\">CVE-2021-31885<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31886\" target=\"_blank\" rel=\"noopener\">CVE-2021-31886<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31887\" target=\"_blank\" rel=\"noopener\">CVE-2021-31887<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31888\" target=\"_blank\" rel=\"noopener\">CVE-2021-31888<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31889\" target=\"_blank\" rel=\"noopener\">CVE-2021-31889<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31890\" target=\"_blank\" rel=\"noopener\">CVE-2021-31890<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/nucleus-13\/\" target=\"\" rel=\"noopener\">NUCLEUS:13<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">92<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-223353.pdf\" target=\"_blank\" rel=\"noopener\">Siemens<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31344<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31346<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31889<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2021-31890<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/nucleus-13\/\" target=\"\" rel=\"noopener\">NUCLEUS:13<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">93<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-172-06\" target=\"_blank\" rel=\"noopener\">Siemens WinCC OA<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-33139\" target=\"_blank\" rel=\"noopener\">CVE-2022-33139<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">94<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/source.sierrawireless.com\/resources\/security-bulletins\/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4\/\" target=\"_blank\" rel=\"noopener\">Sierra Wireless<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-40458<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-40459<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-40460<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-40461<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-40462<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-40463<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-40464<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-40465<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38313<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38314<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38315<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38316<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38317<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38318<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38319<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38320<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38321<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38322<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38323<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-38324<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-41101<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-41102<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/sierra21\/\" target=\"_blank\" rel=\"noopener\">Sierra:21<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">95<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/lists.suse.com\/pipermail\/sle-security-updates\/2021-March\/008407.html\" target=\"_blank\" rel=\"noopener\">Suse<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17437\" target=\"_blank\" rel=\"noopener\">CVE-2020-17437<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17438\" target=\"_self\" rel=\"noopener\">CVE-2020-17438<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_self\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_self\" rel=\"noopener\">CVE-2020-13988<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">96<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/tagmaster.com\/wp-content\/uploads\/2020\/12\/1120-213-Security-Advisory-NuttX-TCP-IP-vulnerabilities.pdf\" target=\"_blank\" rel=\"noopener\">TagMaster<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17437\" target=\"_blank\" rel=\"noopener\">CVE-2020-17437<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">97<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.ti.com\/lit\/an\/swra697a\/swra697a.pdf?ts=1627028462625\" target=\"_blank\" rel=\"noopener\">TI<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">98<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/us-cert.cisa.gov\/ics\/advisories\/ICSA-18-333-02\" target=\"_blank\" rel=\"noopener\">Tridium<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-18985\" target=\"_blank\" rel=\"noopener\">CVE-2018-18985<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/blog\/vulnerabilities-in-building-automation-systems\/\" target=\"\" rel=\"noopener\">Building Automation<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">99<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.uniflow.global\/en\/security\/security-and-maintenance\/#security_advisory_8\" target=\"_blank\" rel=\"noopener\">uniFLOW<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_blank\" rel=\"noopener\">CVE-2020-13988<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_self\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17438\" target=\"_self\" rel=\"noopener\">CVE-2020-17438<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17437\" target=\"_self\" rel=\"noopener\">CVE-2020-17437<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">100<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert.vde.com\/en\/advisories\/VDE-2021-050\/\" target=\"_blank\" rel=\"noopener\">WAGO<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31344\" target=\"_blank\" rel=\"noopener\">CVE-2021-31344<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31345\" target=\"_blank\" rel=\"noopener\">CVE-2021-31345<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31346\" target=\"_blank\" rel=\"noopener\">CVE-2021-31346<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31881\" target=\"_blank\" rel=\"noopener\">CVE-2021-31881<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31882\" target=\"_blank\" rel=\"noopener\">CVE-2021-31882<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31883\" target=\"_blank\" rel=\"noopener\">CVE-2021-31883<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31884\" target=\"_blank\" rel=\"noopener\">CVE-2021-31884<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31886\" target=\"_blank\" rel=\"noopener\">CVE-2021-31886<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31887\" target=\"_blank\" rel=\"noopener\">CVE-2021-31887<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31888\" target=\"_blank\" rel=\"noopener\">CVE-2021-31888<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31889\" target=\"_blank\" rel=\"noopener\">CVE-2021-31889<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31890\" target=\"_blank\" rel=\"noopener\">CVE-2021-31890<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/nucleus-13\/\" target=\"\" rel=\"noopener\">NUCLEUS:13<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">101<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert.vde.com\/en\/advisories\/VDE-2023-006\/\" target=\"_blank\" rel=\"noopener\">WAGO Controllers with CODESYS 2.3 Runtime<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-1619<\/a><br \/>\n, <a href=\"#\" target=\"\" rel=\"noopener\">CVE-2023-1620<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"_blank\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">102<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/cert.vde.com\/en\/advisories\/VDE-2021-042\" target=\"_blank\" rel=\"noopener\">Weidmuller<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-31401\" target=\"_blank\" rel=\"noopener\">CVE-2020-31401<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35683\" target=\"_self\" rel=\"noopener\">CVE-2020-35683<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-35684\" target=\"_self\" rel=\"noopener\">CVE-2020-35684<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/infra-halt\/\" target=\"\" rel=\"noopener\">INFRA:HALT<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">103<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/kb.cert.org\/vuls\/id\/815128\" target=\"_blank\" rel=\"noopener\">Weinert Automation<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13984\" target=\"_blank\" rel=\"noopener\">CVE-2020-13984<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13985\" target=\"_self\" rel=\"noopener\">CVE-2020-13985<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13986\" target=\"_self\" rel=\"noopener\">CVE-2020-13986<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13987\" target=\"_self\" rel=\"noopener\">CVE-2020-13987<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13988\" target=\"_self\" rel=\"noopener\">CVE-2020-13988<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24334\" target=\"_self\" rel=\"noopener\">CVE-2020-24334<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-24336\" target=\"_self\" rel=\"noopener\">CVE-2020-24336<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17437\" target=\"_self\" rel=\"noopener\">CVE-2020-17437<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17438\" target=\"_self\" rel=\"noopener\">CVE-2020-17438<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17439\" target=\"_self\" rel=\"noopener\">CVE-2020-17439<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-17440\" target=\"_self\" rel=\"noopener\">CVE-2020-17440<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">104<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/yanzi.dev\/#\/security\/advisories\/2020-12-08\" target=\"_blank\" rel=\"noopener\">Yanzi Networks<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13984\" target=\"_blank\" rel=\"noopener\">CVE-2020-13984<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13985\" target=\"_self\" rel=\"noopener\">CVE-2020-13985<\/a><br \/>\n, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-13986\" target=\"_self\" rel=\"noopener\">CVE-2020-13986<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"https:\/\/www.forescout.com\/research-labs\/amnesia33\/\" target=\"\" rel=\"noopener\">AMNESIA:33<\/a><\/td>\n<\/tr>\n<tr>\n<th class=\"vendor-security-advisory-placeholder\"><\/th>\n<td class=\"vendor-security-advisory-id\" style=\"background-color: #f6f6f7\">105<\/td>\n<td style=\"background-color: #D7E1F5\"><a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-174-01\" target=\"_blank\" rel=\"noopener\">Yokogawa STARDOM<\/a><\/td>\n<td class=\"vendor-security-advisory-cve-id\" style=\"background-color: #CCEBFB\">\n<a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-29519\" target=\"_blank\" rel=\"noopener\">CVE-2022-29519<\/a><br \/>\n, <a href=\"http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2022-30997\" target=\"_blank\" rel=\"noopener\">CVE-2022-30997<\/a>\n<\/td>\n<td style=\"background-color: #f6f6f7\"><a href=\"\/research-labs\/ot-icefall\/\" target=\"\" rel=\"noopener\">OT:ICEFALL<\/a><\/td>\n<\/tr>\n<\/table>\n<p><button class=\"alm-load-more-btn more \" type=\"button\">Load More<\/button><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ID Vendor CVE IDs Study 1 ABB CVE-2016-20009 NAME:WRECK 2 ATOS CVE-2020-13987 AMNESIA:33 3 B&amp;R automation CVE-2016-20009 NAME:WRECK 4 B&amp;R automation CVE-2020-27634 NUMBER:JACK 5 B&amp;R automation CVE-2020-13987 , CVE-2020-17438 AMNESIA:33 6 BD CVE-2016-20009 NAME:WRECK 7 Bently Nevada CVE-2022-2995 , CVE-2022-29953 , CVE-2022-29952 OT:ICEFALL 8 Bently Nevada CVE-2022-29952 , CVE-2022-29953 OT:ICEFALL 9 Cisco CVE-2020-7461 NAME:WRECK 10 [&hellip;]<\/p>\n","protected":false},"author":112,"featured_media":0,"parent":70336,"menu_order":114,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[522],"class_list":["post-69327","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vendor Security Advisories - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vendor Security Advisories - Forescout\" \/>\n<meta property=\"og:description\" content=\"ID Vendor CVE IDs Study 1 ABB CVE-2016-20009 NAME:WRECK 2 ATOS CVE-2020-13987 AMNESIA:33 3 B&amp;R automation CVE-2016-20009 NAME:WRECK 4 B&amp;R automation CVE-2020-27634 NUMBER:JACK 5 B&amp;R automation CVE-2020-13987 , CVE-2020-17438 AMNESIA:33 6 BD CVE-2016-20009 NAME:WRECK 7 Bently Nevada CVE-2022-2995 , CVE-2022-29953 , CVE-2022-29952 OT:ICEFALL 8 Bently Nevada CVE-2022-29952 , CVE-2022-29953 OT:ICEFALL 9 Cisco CVE-2020-7461 NAME:WRECK 10 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T18:04:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/\",\"name\":\"Vendor Security Advisories - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"datePublished\":\"2021-09-26T00:54:35+00:00\",\"dateModified\":\"2024-03-08T18:04:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Vendor Security Advisories\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vendor Security Advisories - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/","og_locale":"en_US","og_type":"article","og_title":"Vendor Security Advisories - Forescout","og_description":"ID Vendor CVE IDs Study 1 ABB CVE-2016-20009 NAME:WRECK 2 ATOS CVE-2020-13987 AMNESIA:33 3 B&amp;R automation CVE-2016-20009 NAME:WRECK 4 B&amp;R automation CVE-2020-27634 NUMBER:JACK 5 B&amp;R automation CVE-2020-13987 , CVE-2020-17438 AMNESIA:33 6 BD CVE-2016-20009 NAME:WRECK 7 Bently Nevada CVE-2022-2995 , CVE-2022-29953 , CVE-2022-29952 OT:ICEFALL 8 Bently Nevada CVE-2022-29952 , CVE-2022-29953 OT:ICEFALL 9 Cisco CVE-2020-7461 NAME:WRECK 10 [&hellip;]","og_url":"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-03-08T18:04:07+00:00","twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/","url":"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/","name":"Vendor Security Advisories - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"datePublished":"2021-09-26T00:54:35+00:00","dateModified":"2024-03-08T18:04:07+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/vendor-security-advisories\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"Vendor Security Advisories"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/69327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=69327"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/69327\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=69327"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=69327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}