-
Welcome to the support site
If you know our products and are looking for technical information you are at the right place here.
If you want to get an overview about our company, news and events please refer to www.saia-pcd.com.
Security Upgrade for PCD Controllers
New Firmwareversions offering improvements in IT-Security for PCD Controllers are ready to download. >> More Infos
Connection of PCD controllers directly to the Internet
Reduce the risk of potential intruders in automation systems. Take appropriate protective measures in your PCD control. >>More Infos
PG5 2.3.113 is available on the support homepage as well in the SBC PG5 update manager
Tuesday, 20. February 2018PG5 2.3.113 can be downloaded from the support homepage as well in the SBC PG5 update manager.
Information's about the new features and the modifications are available on the support homepage
New Visi.Plus Setup 1.7.104.39 available
Wednesday, 31. January 2018A new version of Visi.Plus is available on the Support homepage. Main improvements are the handling of iPads in HTML5 and Symbol Import improvements.
PG5 2.2.235 is available on the support homepage as well in the SBC PG5 update manager
Thursday, 21. December 2017PG5 2.2.235 can be downloaded from the support homepage as well in the SBC PG5 update manager.
Information's about the modification are available on the support homepage
New Version Visi.Plus 1.7.104.37 available
Friday, 18. August 2017A new version of Visi.Plus is available on the Support homepage. It has a lot of new features and improvements.
PCD Firmware 1.28.16 / 1.24.69 fix the Ethernet frame padding information leakage.
Wednesday, 09. August 2017The Firmware 1.28.16 or 1.24.69 do fix the issue CVE-2017-9628 related to Ethernet frame padding information leakage.
To avoid any problems in relation to this leakage we do recommend strongly to update to the latest Firmware
1.28.16 / 1.24.69 or newer as mentioned on the security upgrade section on this web-page.
Impact of the CVE-2017-9628
IEEE 802 specifies that packets have a minimum size of 56 bytes.
The Ethernet driver is expected to fill the data field with octets of zero for padding when packets are less than 56 bytes.
Resident memory and other data are used for padding in some implementations that could cause information leakage.
This attack is passive; the attacker can only see data that the affected devices sent out as part of a packet.
Vulnerability overview of the CVE-2017-9628
The previous implementation of firmware allowed other data from a known area of memory to be used in this field and could exfiltrate or leak data.