ics security

  1. CVE-2025-9696: Critical SunPower PVS6 Bluetooth BLE Flaw (9.4 CVSS)

    The SunPower PVS6 fleet has been publicly flagged as critically vulnerable after CISA published an advisory (ICSA-25-245-03) describing a Bluetooth Low Energy (BluetoothLE) servicing interface that embeds hard‑coded encryption parameters and exposed protocol details—weaknesses that let an...
  2. MELSEC iQ-F Modbus/TCP CVE-2025-7405: Mitigation Guide for Windows & OT

    Mitsubishi Electric’s MELSEC iQ‑F family of CPU modules has been formally flagged with a network‑accessible vulnerability that allows unauthenticated remote actors to read and write device values — and in some deployments to halt program execution — because the affected product’s Modbus/TCP...
  3. CIMPLICITY CWE-427: Patch with 2024 SIM 4

    GE Vernova’s CIMPLICITY HMI/SCADA platform has been flagged in a recently circulated advisory as vulnerable to an Uncontrolled Search Path Element (CWE‑427) issue that, under the right local conditions, could allow a low‑privileged user to escalate privileges on affected hosts — the advisory...
  4. Schneider M340 FTP DoS Flaw CVE-2025-6625: Patch, Mitigations, and OT Hardening

    Schneider Electric has acknowledged a high-severity vulnerability in its Modicon M340 family and several M340 communication modules that can be triggered remotely by a specially crafted FTP command and may cause a denial-of-service condition; the flaw was assigned CVE‑2025‑6625 and carries a...
  5. OT Cyber Risk 2025: Reducing Critical Infrastructure Exposure to Ransomware

    The Colonial Pipeline blackout of May 2021 remains a cautionary touchstone: ransomware that began in corporate IT cascaded into physical shortages and public alarm, a stark demonstration that operational technology (OT) insecurity costs more than data — it can disrupt energy, water, food and...
  6. Siemens RUGGEDCOM APE1808: OS Command Injection & Privilege Escalation

    Siemens’ RUGGEDCOM APE1808 appliances carry high‑risk management‑plane vulnerabilities that can let an authenticated administrator—or an attacker who gains elevated credentials—execute arbitrary operating‑system commands and escalate local service privileges, creating a significant threat to...
  7. CVE-2025-7973: Privilege Escalation in FactoryTalk ViewPoint 14.x

    A critical local privilege‑escalation flaw has been disclosed in Rockwell Automation’s FactoryTalk ViewPoint (versions 14.00 and prior) that allows an attacker with local access to escalate to SYSTEM by abusing Windows MSI repair behavior — the issue is tracked as CVE‑2025‑7973 and has been...
  8. ROX II Unrestricted File Upload Vulnerability (CVE-2025-33023) and OT Hardening

    Siemens’ RUGGEDCOM ROX II series is the subject of a newly spotlighted vulnerability that raises immediate operational concerns for industrial network operators: an unrestricted file upload condition in the device web interface can allow a high‑privilege, authenticated user to write arbitrary...
  9. CodeMeter CVE-2025-47809 Privilege Escalation: Siemens/ICS Patch Guide

    Siemens' widely deployed use of Wibu-Systems CodeMeter Runtime has again drawn scrutiny after a local privilege-escalation flaw (CVE-2025-47809) was published that can let an unprivileged user gain elevated access immediately after an unprivileged installation when the CodeMeter Control Center...
  10. CVE-2025-7972: Patch FactoryTalk Linx Node_ENV Bypass with v6.50

    A recently republished CISA advisory warns that Rockwell Automation’s FactoryTalk Linx contains a serious improper access control flaw that—when triggered by setting Node.js’ process.env.NODE_ENV to "development"—can disable FTSP token validation and allow an attacker to create, update, or...
  11. CVE-2025-7971: Patch Studio 5000 to 37.00.02 (Environment Variable Flaw)

    A newly republished CISA advisory warns that Rockwell Automation’s Studio 5000 Logix Designer contains an improper input validation flaw that can be triggered via environment variables, allowing an attacker with local network access to crash the engineering software—and in some cases plausibly...
  12. Rockwell 1756 EN Modules DoS Flaw - Patch to 7.001 (CVE-2025-8007/8008)

    Rockwell Automation has issued—and CISA has republished—an advisory warning that specific 1756-series communication modules can enter a Major Non‑Recoverable fault or crash when presented with malformed or concurrent Forward Close messages, creating a practical denial‑of‑service risk for...
  13. CVE-2025-7973: Privilege Escalation in Rockwell FactoryTalk ViewPoint

    A high-severity privilege-escalation flaw has been disclosed in Rockwell Automation’s FactoryTalk ViewPoint that allows a local attacker to escalate to SYSTEM privileges by abusing Windows MSI repair behavior; the issue (CVE-2025-7973) carries a CVSS v4 base score of 8.5 and affects FactoryTalk...
  14. SICAM Q100/Q200 Exposes SMTP Passwords: Patch Now (CVE-2025-40752/53)

    Siemens has republished an advisory confirming that several POWER METER models in the SICAM Q100 and Q200 families store SMTP credentials in cleartext — a design flaw that allows an authenticated local user to extract email account passwords from device storage or exported configuration files...
  15. CVE-2025-7532: Local Token Leakage in FactoryTalk Action Manager

    A local information-disclosure flaw in Rockwell Automation’s FactoryTalk Action Manager allows unauthenticated local clients to receive a reusable API token broadcast over a WebSocket, creating a pathway for attackers with local access to intercept credentials and manipulate the product’s...
  16. Critical Siemens SINEC Vulnerabilities: Patch NMS and SINEC OS Now

    Siemens has disclosed a broad, high-severity set of vulnerabilities affecting the SINEC family—spanning SINEC NMS, SINEC INS and devices running SINEC OS—and vendors and operators must treat these as urgent operational risks: multiple advisories published by Siemens ProductCERT show...
  17. FactoryTalk Linx Node_ENV Bypass: Upgrade to v6.50 to Block Privilege Abuse

    Rockwell’s advisory republication this week exposes a subtle but serious weakness in FactoryTalk Linx that—if present in your environment—lets an attacker bypass FTSP token validation and perform privileged driver management actions, and CISA is clear: update to FactoryTalk Linx v6.50 as the...
  18. Siemens DLL Hijacking (CVE-2025-30033) - Mitigations for Web Installer

    Siemens ProductCERT has confirmed a widespread DLL-hijacking flaw in the Siemens Web Installer used by its Online Software Delivery (OSD) mechanism — tracked as CVE‑2025‑30033 — that can allow arbitrary code execution during installation, carries a CVSS v4 base score of 8.5, and affects dozens...
  19. CISA Warns AVEVA PI Integrator Flaws: Patch Now (CVE-2025-54460, CVE-2025-41415)

    AVEVA's PI Integrator for Business Analytics has been the subject of a coordinated security disclosure that identifies two authenticated, yet remotely exploitable, vulnerabilities which could permit file upload of dangerous types and the disclosure of sensitive output data — issues that demand...
  20. iSTAR Ultra Security Flaws: Patch Johnson Controls Door Controllers Now

    Johnson Controls’ iSTAR Ultra family of door controllers contains a cluster of high‑impact vulnerabilities that — if left unpatched — can give remote attackers a path to root access, firmware modification, and local console takeover, creating a direct route from network compromise to physical...