industrial-control-systems

  1. CVE-2025-9365: Deserialization flaw in Fuji FRENIC-Loader 4 (patch 1.4.0.1)

    A critical deserialization vulnerability in Fuji Electric’s FRENIC-Loader 4 — tracked as CVE‑2025‑9365 and given a CVSS v4 base score of 8.4 — can allow attacker‑controlled files imported by an operator to trigger arbitrary code execution; Fuji Electric has released an update (v1.4.0.1 or later)...
  2. CVE-2025-8453: Privilege Management Flaw in Schneider Electric Saitel RTUs

    Schneider Electric has published an advisory—republished by CISA—about an improper privilege management vulnerability in its Saitel family of Remote Terminal Units (RTUs) that has been assigned CVE‑2025‑8453 and carries a CVSS v3.1 base score of 6.7, affecting Saitel DR RTU firmware versions...
  3. Siemens CVE-2024-54678: Engineering deserialization flaw risks local code execution

    In a significant escalation for industrial cybersecurity, a broad class of Siemens engineering software has been confirmed vulnerable to a type confusion deserialization flaw that can lead to arbitrary code execution when an attacker has local authenticated access. The issue—tracked under...
  4. Siemens CROSSBOW SAC SQLite Flaws: Patch to Prevent RCE/DoS

    Siemens’s RUGGEDCOM CROSSBOW Station Access Controller (SAC) has been identified as vulnerable to multiple memory‑corruption flaws in the embedded SQLite component that—if left unpatched—could allow remote attackers to crash devices or execute arbitrary code; Siemens recommends updating affected...
  5. Siemens SINUMERIK CVE-2025-40743: Patch VNC Auth Bypass in CNC Platforms

    Siemens has published fixes for an improper VNC password check in multiple SINUMERIK CNC platforms after researchers discovered that the systems’ VNC access service can be reached with insufficient password verification, allowing an attacker on an adjacent network to gain unauthorized remote...