industrial cybersecurity

  1. CVE-2025-6554: V8 Type Confusion Impacts Siemens HyperLynx and Edge Publisher

    Siemens has confirmed that a high‑severity type confusion flaw in Google’s V8 JavaScript engine — tracked as CVE‑2025‑6554 — affects multiple Siemens components that embed Chromium, including HyperLynx (all versions) and Industrial Edge App Publisher (versions prior to V1.23.5). The upstream bug...
  2. Rockwell FactoryTalk ViewPoint XXE CVE-2025-9066 Impacts PanelView Plus 7 DoS

    A recently disclosed vulnerability in Rockwell Automation’s FactoryTalk ViewPoint allows unauthenticated remote attackers to trigger an XML External Entity (XXE) injection via certain SOAP requests, producing a temporary denial-of-service condition that affects PanelView Plus 7 terminals running...
  3. CVE-2025-40755: Patch Siemens SINEC NMS SQL Injection to Prevent Privilege Escalation

    Siemens has released a security advisory and a fix for a high-severity SQL injection vulnerability in SINEC NMS, tracked as CVE-2025-40755, that affects all SINEC NMS builds prior to V4.0 SP1 and can be exploited by an authenticated, low-privileged user to insert malicious data and escalate...
  4. CVE-2025-20352: Cisco SNMP Buffer Overflow Threat in Rockwell Stratix OT Gear

    A recently disclosed stack‑based buffer overflow in Cisco’s SNMP implementation — tracked as CVE‑2025‑20352 — has pulled Rockwell Automation’s Lifecycle Services with Cisco into the security spotlight, forcing industrial operators to reconcile urgent patching requirements, operational continuity...
  5. CVE-2025-20352: Stratix SNMP Overflow Threat to Industrial Switches

    Rockwell Automation’s Stratix line of industrial switches is in the crosshairs after a stack-based buffer overflow in the SNMP subsystem of embedded Cisco IOS XE was assigned CVE‑2025‑20352, creating a remote, low-complexity attack path that can cause denial-of-service and — with elevated...
  6. Raise3D Pro2 Security: Disable Developer Mode to Mitigate CVE-2025-10653

    Raise3D’s Pro2 Series 3D printers were flagged in a federal industrial-control-systems advisory for an authentication bypass that can be triggered when the device’s developer mode is enabled — an unauthenticated debug/API path exposes the printer’s filesystem and sensitive functions, and the...
  7. CVE-2022-3079: Securing Festo CPX Controllers Against Unauthenticated Reboot

    Festo control blocks CPX-CEC‑C1 and CPX‑CMXX contain a remotely exploitable weakness (CVE‑2022‑3079) that permits unauthenticated actors to trigger critical webpage functions — effectively allowing denial‑of‑service conditions and device reboots — and operators should treat any CPX devices...
  8. Critical Vulnerabilities in AutomationDirect CLICK PLUS PLCs Patch to v3.80 Now

    The AutomationDirect CLICK PLUS family of PLCs has been placed squarely in the spotlight after a U.S. government advisory detailing multiple, high-impact vulnerabilities was released on September 23, 2025, warning operators that the devices are remotely exploitable with low attack complexity and...
  9. CVE-2025-5296: Patch SESU to v3.0.12 to fix link following

    Schneider Electric has published a coordinated security update after a high‑impact local flaw in its Software Update component (SESU) was assigned CVE‑2025‑5296 — a CWE‑59: Improper Link Resolution Before File Access (‘link following’) issue that affects SESU versions prior to 3.0.12 and...
  10. Hitachi Energy Asset Suite Security Advisory: Urgent ICS Patch & Mitigations

    Hitachi Energy’s Asset Suite — a widely deployed enterprise asset management platform in the energy sector — was the subject of a republished security advisory that consolidates multiple open‑source component vulnerabilities with serious operational impact potential, and operators must act now...
  11. WeOS 5 ESP Vulnerability CVE-2025-46419 - Patch to 5.24.0

    Westermo’s industrial networking OS, WeOS 5, contains a remote-denial vulnerability that can trigger an immediate reboot when the device is configured for IPsec and sent a carefully crafted Encapsulating Security Payload (ESP) packet — an issue tracked as CVE‑2025‑46419 and documented by both...
  12. CISA Advises on Cognex In‑Sight Risks: Mitigate Legacy Camera Vulnerabilities

    CISA’s latest advisory on Cognex In‑Sight Explorer and In‑Sight camera firmware warns of a broad set of high‑severity, remotely exploitable weaknesses — including hard‑coded credentials, cleartext credential transport, replayable authentication, weak permissions on Windows hosts, and...
  13. Siemens OT Advisory: Remote DoS from IPsec Integer Overflow (CVE-2021-41990/41991)

    Siemens ProductCERT and CISA republished an advisory detailing remote integer‑overflow vulnerabilities that affect a broad set of Siemens networking and communication modules — SIMATIC NET CP, SINEMA Remote Connect Server, and many SCALANCE and RUGGEDCOM devices — and operators must treat the...
  14. Siemens SSA-712929 and CVE-2022-0778: OpenSSL DoS in Industrial Devices

    Siemens’ sprawling product portfolio remains at the center of a major, ongoing industrial‑security effort after a broad advisory—originally published by Siemens ProductCERT and republished by U.S. cyber authorities—relisted scores of SCALANCE, RUGGEDCOM, SIMATIC, SIMOTION, SIPLUS and related...
  15. Siemens OpenSSL CVE-2021-3712: Patch and mitigate ICS risk (SSA-244969)

    Siemens and upstream OpenSSL vulnerabilities that allow out-of-bounds reads — tracked under CVE-2021-3712 — remain a live operational risk across dozens of Siemens industrial networking, communications, and automation products; Siemens has published ProductCERT guidance and fixes for many...
  16. OT Network Hygiene: Siemens RUGGEDCOM Advisory & Quick Mitigations

    Siemens and U.S. cyber authorities have republished a focused advisory addressing two low‑severity but operationally meaningful vulnerabilities in SINEC OS that affect the RUGGEDCOM RST2428P (6GK6242‑6PA00); the immediate mitigation is straightforward (block discovery UDP ports) but the broader...
  17. CVE-2025-40804: Critical Unauthenticated Share Flaw in Siemens SIVaaS

    Siemens’ cloud-hosted SIMATIC Virtualization as a Service (SIVaaS) has been found to expose a network share without authentication — a configuration defect that Siemens has cataloged as CVE-2025-40804 and scored as critical (CVSS v3.1 = 9.1; CVSS v4 = 9.3). This flaw allows unauthenticated...
  18. Siemens SINAMICS Privilege Escalation Advisory: CVE-2025-40594

    Siemens has published a security advisory (SSA-027652) describing a privilege‑escalation vulnerability in its SINAMICS drive family that allows a factory reset and configuration manipulation without the required privileges, and the U.S. Cybersecurity and Infrastructure Security Agency (CISA)...
  19. CISA Warns High-Severity Redis Misconfig in LogixAI (CVE-2025-9364)

    Rockwell Automation’s FactoryTalk Analytics LogixAI has a serious configuration weakness that demands immediate attention from OT and IT teams: CISA republished an advisory assigning CVE-2025-9364 to an overly permissive Redis instance used by LogixAI, calling out exposure of sensitive system...
  20. ControlLogix 5580 35.013 NULL Pointer Dereference: Patch to 35.014 (CVE-2025-9166)

    Rockwell Automation’s ControlLogix 5580 family has a newly republished advisory that raises the alarm for industrial operators: a remotely exploitable NULL pointer dereference in firmware version 35.013 can force a major nonrecoverable fault (MNRF) on affected controllers, producing a...