The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS) advisories addressing vulnerabilities in a range of critical systems.
These advisories aim to inform organizations about risks that could lead to unauthorized access, system compromise, or sensitive data exposure if left unaddressed.
Below are the details of each advisory, along with associated vulnerabilities and mitigation strategies.
CISA reported two critical vulnerabilities in mySCADA’s myPRO Manager and myPRO Runtime that allow remote attackers to execute arbitrary OS commands. Both vulnerabilities received a CVSS v4 score of 9.3, indicating their severity.
Vulnerabilities:
Affected Versions:
Organizations using vulnerable versions should update their systems immediately to the latest release provided by the vendor.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Firmware in Hitachi Energy’s RTU500 series contains a security flaw allowing authenticated users to bypass secure update checks, potentially enabling the installation of unsigned firmware.
Vulnerability:
Affected Versions:
Administrators should implement firmware updates signed by the vendor and restrict access to authorized personnel only.
Schneider Electric’s EVlink Home Smart and Schneider Charge face a vulnerability due to the cleartext storage of sensitive information, which could expose test credentials in firmware binaries.
Vulnerability:
Affected Versions:
Users are advised to apply the latest firmware updates or restrict physical and network access to these devices.
The Easergy Studio platform has an improper privilege management flaw that allows attackers with file system access to gain elevated privileges.
Vulnerability:
Affected Versions:
Organizations should apply updates from Schneider Electric and restrict user access on affected systems.
EcoStruxure Power Build Rapsody suffered from a memory buffer restriction vulnerability that could allow attackers to execute arbitrary code by opening a malicious project file.
Vulnerability:
Affected Versions:
Customers should update to the latest version or avoid opening untrusted project files.
HMS Networks’ Ewon Flexy 202 transmits user credentials in cleartext format when users are added or modified via the web page, making them susceptible to interception.
Vulnerability:
Affected Versions:
Users should restrict network access to affected devices and apply encryption protocols where feasible.
CISA’s latest ICS advisories underscore the critical need for industrial organizations to stay vigilant against evolving cybersecurity threats. To mitigate risks:
Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar
In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a colleague…
A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a grave…
A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with a…
In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA pages…
In a recent technical investigation, researchers uncovered critical insights into the infrastructure linked to a…
The New York State Department of Financial Services (NYDFS) has imposed a $2 million penalty…