Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-44564: Support | Knowledge Centre | Cyber Security | Klakitech

A security vulnerability originally reported in the SYNC2101 product, and applicable to specific sub-families of SYNC devices, allows an attacker to download the configuration file used in the device and apply a modified configuration file back to the device. The attack requires network access to the SYNC device and knowledge of its IP address. The attack exploits the unsecured communication channel used between the administration tool Easyconnect and the SYNC device (in the affected family of SYNC products).

CVE
#vulnerability
  • Home
  • Cyber Security

img

Advisory – Meltdown and Spectre

img

Advisory – Command Injection vulnerability

img

CIP-010 R4 Transient

img

Advisory – Log4j vulnerability

img

Cybersecurity Vulnerability Management Policy

img

Security Gateway Brochure

img

Security Whitepaper

img

Report A Security Issue

REPORT A SECURITY ISSUE

Kalkitech encourages you to let us know about a security issue you believe you have identified with any Kalkitech product. If you have not already done so, please review our Cybersecurity Vulnerability Management Policy to learn about reporting and internal procedures we use to evaluate and determine actions and security notifications.

To report a security vulnerability, please send e-mail to [email protected]. This email is monitored by Kalkitech’s Security Response Team (SRT), a designated team that handles detected and reported vulnerabilities. To send us sensitive information, please use the Kalkitech/ASE Security Center PGP Public Key to ensure sensitive data is encrypted when you send it to us (see below).

PLEASE PROVIDE AS MUCH INFORMATION AS POSSIBLE WHEN REPORTING A SECURITY ISSUE, INCLUDING :

  • Kalkitech product name and version software
  • Detailed description of vulnerability
  • Information on known exploits
  • Your contact information

KALKITECH/ASE SECURITY CENTER PGP PUBLIC KEY

Use the Public PGP Key below to encrypt data you send to us related to a potential security vulnerability and to verify that security communications sent by Kalkitech/ASE are genuine. A Member of the Kalkitech SRT will review your e-mail and contact you to collaborate on resolving the issue.

Active Date :

Apr 26, 2021

Expiration Date :

Apr 26, 2022

Key ID :

0xF0D01A6D

Key Type :

RSA

Key Size :

4096/4096

Finger Print :

9BC3 6837 C72C 2DA4 0F73 25DE 9D90 DA41 F0D0 1A6D

User ID :

[email protected]

  • Brochures
  • White Paper

img

Secure_Substation_Gateway_Brochure

img 1MB

img

Security-for-Energy-Whitepaper

img 2MB

SUBSCRIBE FOR SECURITY UPDATES

For Information about our privacy practices, We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing.

Learn more about mailchimp’s privacy practices here.

img

Make An Enquiry

Get in touch with us to Know More.

Contact Us

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907