The Cybersecurity and Infrastructure Security Agency (CISA) has recently issued three critical advisories concerning vulnerabilities in industrial control systems (ICS). These advisories highlight significant security flaws in products from Leviton, Panoramic Corporation, and Johnson Controls Inc., underscoring the ongoing challenges in securing ICS environments.
Advisory ICSA-25-198-01 addresses a cross-site scripting (XSS) vulnerability in Leviton's AcquiSuite and Energy Monitoring Hub devices. Specifically, the affected models are:
Source: CISA CISA Releases Three Industrial Control Systems Advisories | CISA
Leviton AcquiSuite and Energy Monitoring Hub Vulnerability
Advisory ICSA-25-198-01 addresses a cross-site scripting (XSS) vulnerability in Leviton's AcquiSuite and Energy Monitoring Hub devices. Specifically, the affected models are:- AcquiSuite: Version A8810
- Energy Monitoring Hub: Version A8812
- Theft of session tokens
- Unauthorized control over the service
Panoramic Corporation Digital Imaging Software Vulnerability
Advisory ICSMA-25-198-01 pertains to a vulnerability in Panoramic Corporation's Digital Imaging Software, specifically:- Version 9.1.2.7600
Johnson Controls Inc. Software House C●CURE 9000 Vulnerability
Advisory ICSA-24-191-05 (Update B) focuses on a vulnerability in Johnson Controls Inc.'s Software House C●CURE 9000 Site Server, affecting:- Version 2.80 and prior
Implications and Recommendations
These advisories underscore the critical importance of maintaining robust security measures within industrial control systems. The identified vulnerabilities highlight common issues such as improper input validation, uncontrolled search paths, and incorrect default permissions. To mitigate these risks, organizations should:- Apply Patches Promptly: Regularly update systems with vendor-released patches to address known vulnerabilities.
- Implement Network Segmentation: Isolate critical ICS components from general IT networks to limit potential attack vectors.
- Conduct Regular Security Audits: Perform periodic assessments to identify and remediate security weaknesses.
- Restrict User Privileges: Limit user access rights to the minimum necessary for their roles to reduce the impact of potential exploits.
- Monitor System Activity: Utilize intrusion detection systems to identify and respond to suspicious activities promptly.
Source: CISA CISA Releases Three Industrial Control Systems Advisories | CISA