ot security

  1. CVE-2025-7746: XSS in Schneider Electric Altivar Drives—Fixes & Mitigations

    A newly disclosed Cross‑Site Scripting (XSS) vulnerability, tracked as CVE‑2025‑7746, affects a broad set of Schneider Electric Altivar drives and modules — including the ATVdPAC module (fixed in VW3A3530D version 25.0), multiple Altivar Process and Machine drives, and the ILC992 InterLink...
  2. Windows 10 EOL 2025: Plan Your Windows 11 Migration Now

    Microsoft’s countdown clock is now real: with just weeks to go until Microsoft stops issuing security updates and routine support for Windows 10, organisations and home users face a concrete deadline — October 14, 2025 — and must act now to avoid rising exposure and operational disruption...
  3. Patch Tuesday Surge: 1,224 Vulnerabilities and Public PoCs Accelerate Exploitation

    Cyble’s latest weekly vulnerability roundup paints a stark picture: this Patch Tuesday cycle produced a torrent of disclosures — 1,224 new vulnerabilities tracked in seven days — and a rapidly shrinking window for defenders as publicly shared proofs‑of‑concept (PoCs) proliferate. Background...
  4. CISA ICS Advisories Sept 11, 2025: Siemens, Schneider, Daikin Patch Priority

    CISA’s latest bulletin — a compact but consequential package released on September 11, 2025 — flags eleven Industrial Control Systems (ICS) advisories affecting major automation vendors and field devices, including multiple Siemens engineering and network products, several Schneider Electric...
  5. Urgent Patch for EcoStruxure CVE-2025-8449/8448 DoS and Credential Exposure

    Schneider Electric has published fixes and CISA republished an advisory after coordinated disclosure of two vulnerabilities in EcoStruxure Building Operation / Enterprise Server and associated Workstation components that could enable an authenticated, adjacent‑network attacker to cause a...
  6. Siemens UMC Vulnerabilities: Critical RCE and DoS; Patch to 2.15.1.3 Now

    Siemens has published a high‑severity ProductCERT advisory (SSA‑722410) describing multiple remotely exploitable vulnerabilities in its User Management Component (UMC), including a stack‑based buffer overflow that Siemens scores as critical and three separate out‑of‑bounds read issues that can...
  7. CVE-2025-10127: Daikin Security Gateway Pre-auth Password Reset Flaw

    Daikin’s Security Gateway is affected by a critical pre‑authentication password‑reset flaw that lets an unauthenticated attacker reset device credentials to the factory default and take control of the appliance and any connected systems — the issue is tracked as CVE‑2025‑10127 and rated highly...
  8. OT Network Hygiene: Siemens RUGGEDCOM Advisory & Quick Mitigations

    Siemens and U.S. cyber authorities have republished a focused advisory addressing two low‑severity but operationally meaningful vulnerabilities in SINEC OS that affect the RUGGEDCOM RST2428P (6GK6242‑6PA00); the immediate mitigation is straightforward (block discovery UDP ports) but the broader...
  9. Siemens APOGEE PXC and TALON TC: CVE-2025-40757 BACnet File Leak Explained

    Siemens has confirmed a vulnerability in its APOGEE PXC and TALON TC building automation devices that allows an unauthenticated remote actor to retrieve sensitive files — including the device’s encrypted database — over BACnet, a widely used building automation protocol, a weakness now tracked...
  10. SIMOTION NSIS Local Privilege Escalation: CVE-2025-43715 Advisory & Mitigations

    Nullsoft Scriptable Install System (NSIS) code used inside several SIMOTION setup components contains a local privilege‑escalation flaw that Siemens and U.S. cyber authorities have republished as a coordinated advisory, warning that installing affected SIMOTION Tools on Windows can allow an...
  11. CVE-2025-48976 DoS in Siemens IEM-OS: No Patch, Migrate to IEM-V

    Siemens’ Industrial Edge Management OS (IEM‑OS) is exposed to a remotely exploitable denial‑of‑service condition tied to the Apache Commons FileUpload library (tracked as CVE‑2025‑48976), and the vendor’s published guidance makes clear that affected IEM‑OS installs — all reported versions — have...
  12. CVE-2025-40804: Critical Unauthenticated Share Flaw in Siemens SIVaaS

    Siemens’ cloud-hosted SIMATIC Virtualization as a Service (SIVaaS) has been found to expose a network share without authentication — a configuration defect that Siemens has cataloged as CVE-2025-40804 and scored as critical (CVSS v3.1 = 9.1; CVSS v4 = 9.3). This flaw allows unauthenticated...
  13. Siemens SINAMICS Privilege Escalation Advisory: CVE-2025-40594

    Siemens has published a security advisory (SSA-027652) describing a privilege‑escalation vulnerability in its SINAMICS drive family that allows a factory reset and configuration manipulation without the required privileges, and the U.S. Cybersecurity and Infrastructure Security Agency (CISA)...
  14. ControlLogix 5580 35.013 NULL Pointer Dereference: Patch to 35.014 (CVE-2025-9166)

    Rockwell Automation’s ControlLogix 5580 family has a newly republished advisory that raises the alarm for industrial operators: a remotely exploitable NULL pointer dereference in firmware version 35.013 can force a major nonrecoverable fault (MNRF) on affected controllers, producing a...
  15. ThinManager SSRF CVE-2025-9065: Patch to v14.1 and OT security best practices

    Rockwell Automation’s ThinManager has been flagged for a high-severity Server-Side Request Forgery (SSRF) flaw that can expose an industrial control system’s ThinServer service account NTLM credentials, according to a federal advisory reissued on September 9, 2025. The vulnerability—tracked...
  16. CISA Sept 2025 ICS Bulletin: Actionable OT Security Across Rockwell, ABB, Schneider

    CISA’s September 9, 2025 bulletin consolidating fourteen Industrial Control Systems advisories is a blunt reminder that the OT security landscape remains both crowded and volatile — the list spans high‑impact Rockwell Automation products, ABB building‑management gear, Schneider and Mitsubishi...
  17. Patch CVE-2025-7970: Update FactoryTalk Activation Manager to 5.02

    A recently republished U.S. federal advisory warns that Rockwell Automation’s FactoryTalk Activation Manager contains a cryptographic implementation flaw that can be exploited remotely to decrypt or tamper with activation and management traffic — an issue assigned CVE‑2025‑7970 and rated with a...
  18. Patch Alert: 1783-NATR CVE-2020-28895 Memory Corruption (Wind River VxWorks)

    Rockwell Automation’s 1783‑NATR I/O adapter has been flagged by CISA as vulnerable to a third‑party component flaw that can cause memory corruption, carrying a CVSS v4 base score of 6.9 and described as remotely exploitable with low attack complexity — operators should treat it as an immediate...
  19. Critical Stratix IOS Injection CVE-2025-7350 — Patch Now

    Rockwell Automation has confirmed a serious injection vulnerability in Stratix IOS that affects multiple Stratix switch families and can be exploited remotely to upload and run malicious configurations without authentication; CISA has republished Rockwell’s advisory and assigned CVE‑2025‑7350...
  20. CISA ICS Advisories 2025: Harden Windows and OT in Critical Infrastructure

    CISA’s latest roundup of Industrial Control Systems advisories underscores a familiar — and accelerating — reality for Windows administrators and OT teams: vulnerabilities in industrial products are diverse, often high‑impact, and demand rapid, coordinated responses across both IT and OT...