ics

  1. ControlLogix 5580 35.013 NULL Pointer Dereference: Patch to 35.014 (CVE-2025-9166)

    Rockwell Automation’s ControlLogix 5580 family has a newly republished advisory that raises the alarm for industrial operators: a remotely exploitable NULL pointer dereference in firmware version 35.013 can force a major nonrecoverable fault (MNRF) on affected controllers, producing a...
  2. CISA Sept 2025 ICS Bulletin: Actionable OT Security Across Rockwell, ABB, Schneider

    CISA’s September 9, 2025 bulletin consolidating fourteen Industrial Control Systems advisories is a blunt reminder that the OT security landscape remains both crowded and volatile — the list spans high‑impact Rockwell Automation products, ABB building‑management gear, Schneider and Mitsubishi...
  3. Patch Alert: 1783-NATR CVE-2020-28895 Memory Corruption (Wind River VxWorks)

    Rockwell Automation’s 1783‑NATR I/O adapter has been flagged by CISA as vulnerable to a third‑party component flaw that can cause memory corruption, carrying a CVSS v4 base score of 6.9 and described as remotely exploitable with low attack complexity — operators should treat it as an immediate...
  4. Critical ABB BMS Flaws: Auth Bypass and DoS in ASPECT, NEXUS & MATRIX

    A set of high-severity flaws in ABB’s ASPECT, NEXUS, and MATRIX building-management products has forced an urgent wave of patching and network lockdowns across industrial and commercial facilities worldwide, with at least three tracked CVEs that let remote attackers bypass authentication, crash...
  5. CISA ICS Advisories 2025: Harden Windows and OT in Critical Infrastructure

    CISA’s latest roundup of Industrial Control Systems advisories underscores a familiar — and accelerating — reality for Windows administrators and OT teams: vulnerabilities in industrial products are diverse, often high‑impact, and demand rapid, coordinated responses across both IT and OT...
  6. CISA ICS Advisories Aug 28 2025: 9 Critical Vulnerabilities Across OT Vendors

    CISA on August 28, 2025, published a batch of nine Industrial Control Systems (ICS) advisories covering critical vulnerabilities across Mitsubishi Electric, Schneider Electric, Delta Electronics, GE Vernova, Hitachi Energy, and ICONICS/Mitsubishi integrations — a coordinated disclosure that...
  7. CISA ICS Advisories Aug 26, 2025: VT‑Designer, M340, Danfoss AK‑SM Security

    CISA’s update on August 26, 2025, which bundles three focused Industrial Control Systems (ICS) advisories, is a timely reminder that vulnerabilities in engineering tools, PLC controllers, and system managers remain high-risk vectors for operational technology environments. The agency published...
  8. CISA: 3 Urgent ICS/Medical Advisories (MELSEC iQ-F, Mitsubishi AC, Synapse Mobility)

    CISA’s August 21, 2025 advisory bundle added three urgent entries to the growing list of industrial control system (ICS) and medical-device vulnerabilities security teams must treat as high priority this month. The agency published advisories for a denial-of-service vector in the Mitsubishi...
  9. MELSEC iQ-F Web Server DoS: Length Handling Exposure in PLCs

    Mitsubishi Electric’s MELSEC iQ‑F family of CPU modules is the subject of a fresh industrial‑control systems advisory describing a remotely exploitable denial‑of‑service condition in the product’s embedded Web server function — an issue that can be triggered by specially crafted HTTP traffic and...
  10. ICS Advisory Roundup Aug 19 2025: Siemens, Tigo, EG4 OT Vulnerabilities & Mitigations

    CISA’s August 19 advisory batch once again put industrial control systems at the center of urgent cybersecurity attention, flagging four distinct advisories that collectively underscore persistent weaknesses in building management, identity federation, solar-edge gateways, and distributed...
  11. Siemens CROSSBOW SAC SQLite Flaws: Patch to Prevent RCE/DoS

    Siemens’s RUGGEDCOM CROSSBOW Station Access Controller (SAC) has been identified as vulnerable to multiple memory‑corruption flaws in the embedded SQLite component that—if left unpatched—could allow remote attackers to crash devices or execute arbitrary code; Siemens recommends updating affected...
  12. SINEC Traffic Analyzer Vulnerabilities: Urgent OT/IT Mitigation Guide

    Siemens’ SINEC Traffic Analyzer has been the subject of a focused security disclosure cycle that culminated in a consolidated vendor advisory (SSA‑517338) and a republication through federal ICS channels, detailing a cluster of high‑to‑critical vulnerabilities that affect the product’s...
  13. Siemens BFCClient OpenSSL Flaws: Patch to V2.17 or Mitigate Now

    Siemens’ Brownfield Connectivity Client (BFCClient) is the subject of a freshly republished advisory that bundles multiple OpenSSL-related flaws into a single operational risk for industrial environments—vulnerabilities that can be remotely triggered, permit memory disclosure or application...
  14. Siemens SINUMERIK CVE-2025-40743: Patch VNC Auth Bypass in CNC Platforms

    Siemens has published fixes for an improper VNC password check in multiple SINUMERIK CNC platforms after researchers discovered that the systems’ VNC access service can be reached with insufficient password verification, allowing an attacker on an adjacent network to gain unauthorized remote...
  15. CVE-2025-7532: Local Token Leakage in FactoryTalk Action Manager

    A local information-disclosure flaw in Rockwell Automation’s FactoryTalk Action Manager allows unauthenticated local clients to receive a reusable API token broadcast over a WebSocket, creating a pathway for attackers with local access to intercept credentials and manipulate the product’s...
  16. ArmorBlock 5000 Webserver Flaws: Patch CVE-2025-7773/7774 Now

    A pair of high-severity vulnerabilities in Rockwell Automation’s ArmorBlock 5000 I/O webserver — tracked as CVE-2025-7773 and CVE-2025-7774 — create a realistic, low-complexity path for remote attackers to hijack or misuse web sessions on specific 5032-series modules, prompting immediate...
  17. Siemens SINEC OS Third-Party Vulnerabilities: Patch Guidance & ProductCERT

    Siemens’ advisory covering third‑party components in SINEC OS landed as a stark reminder that industrial network stacks are only as strong as their weakest third‑party link: dozens of kernel and userland weaknesses, CVEs spanning classic buffer overflows to TOCTOU races, and a vendor‑centric...
  18. SINEC Traffic Analyzer Vulnerabilities: OT Container and Web Risks Explored

    Siemens’ SINEC Traffic Analyzer—an on-premises PROFINET monitoring tool found in utilities, manufacturing, and energy networks—has been the subject of a sustained, multi-stage security disclosure that now spans multiple advisories and several high-severity CVEs. The vendor (Siemens ProductCERT)...
  19. Secure OT: Build Robust Asset Inventories and Taxonomies for Critical Infrastructure

    On August 13, 2025, the Cybersecurity and Infrastructure Security Agency (CISA), together with the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Environmental Protection Agency (EPA) and several international partners, published detailed guidance aimed at helping...
  20. Critical ICS Vulnerabilities: CISA's Latest Advisories for Windows Admins

    Industrial Control Systems (ICS) are the vital gears behind so many critical infrastructures, and when vulnerabilities arise in these environments, the consequences can ripple far beyond the factory floor. On March 11, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released...