Friday, February 21, 2025
HomeCVE/vulnerabilityCISA Issues Seven ICS Advisories Highlighting Critical Vulnerabilities

CISA Issues Seven ICS Advisories Highlighting Critical Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released seven Industrial Control Systems (ICS) advisories on February 20, 2025, addressing critical vulnerabilities in products from ABB, Siemens, Mitsubishi Electric, and other industrial technology providers.

These advisories underscore escalating risks to operational technology (OT) environments, where flaws in safety controllers, human-machine interfaces (HMIs), and protocol analyzers could enable remote code execution, denial-of-service (DoS) attacks, and unauthorized access to critical infrastructure.

ABB ASPECT-Enterprise and FLXEON Controllers Exposed to Remote Exploitation

The ICSA-25-051-01 and ICSA-25-051-02 advisories detail vulnerabilities in ABB’s ASPECT-Enterprise, NEXUS, MATRIX, and FLXEON controller series.

The most severe flaw, CVE-2025-3101 (CVSS v4: 9.8), allows unauthenticated attackers to execute arbitrary code on ASPECT-Enterprise servers due to improper input validation in the data parsing module.

Similarly, FLXEON safety controllers (versions < 3.08.02) are susceptible to authentication bypass via CVE-2025-3120, enabling threat actors to manipulate safety-critical processes in manufacturing and energy sectors.

Siemens SiPass Integrated Access Control Vulnerabilities

Siemens’ SiPass Integrated system, used in physical access control, is flagged in ICSA-25-051-04 for cleartext credential storage (CVE-2025-3204) and insecure default configurations.

Attackers with network access could extract administrative credentials, potentially compromising facility security.

Siemens recommends upgrading to version 3.8.2 and enforcing TLS 1.3 for communications.

Mitsubishi Electric CNC Series Memory Corruption Flaws

ICSA-24-291-03 (Update A) highlights four memory corruption vulnerabilities in Mitsubishi Electric’s CNC Series, including a heap overflow (CVE-2024-39883) allowing remote code execution via malicious G-code files.

Affected versions (M800/M80 to E80 Series) require firmware updates to mitigate risks of production line sabotage.

Rapid Response Monitoring and Elseta Vulnerabilities

The ICSA-25-051-05 advisory identifies an improper authentication flaw in Rapid Response Monitoring’s My Security Account App (CVE-2025-3301), enabling attackers to disable alarms or spoof sensor data.

Meanwhile, Elseta’s Vinci Protocol Analyzer (ICSA-25-051-06) is vulnerable to buffer overflows (CVE-2025-3350) when parsing Modbus packets, risking OT network breaches.

Medixant RadiAnt DICOM Viewer Risks Patient Data

ICSMA-25-051-01 addresses a critical vulnerability in Medixant’s RadiAnt DICOM Viewer (CVE-2025-3405), where malformed medical imaging files could execute code on healthcare systems.
With a CVSS v4 score of 8.6, this flaw poses significant risks to patient data confidentiality and medical device integrity.

Mitigation Strategies and Industry Response

CISA urges organizations to apply vendor-provided patches immediately.

For systems requiring delayed updates, mitigations include network segmentation, disabling unnecessary services, and enforcing application allowlists.

ABB and Siemens have released firmware updates, while Mitsubishi Electric advises restricting G-code file sources to trusted providers.

These advisories highlight the persistent risks posed by memory corruption, authentication bypass, and insecure protocols in industrial environments.

As cyber-physical attacks escalate, proactive vulnerability management remains critical to safeguarding global infrastructure.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...