Stay connected

Trending News

ICS, News, Reports

Mitsubishi Electric FA Engineering Software 

2. RISK ASSESSMENTExploiting this vulnerability successfully could enable a local attacker to execute code, potentially leading to information exposure, unauthorized data alterations, or triggering a denial-of-service (DoS) scenario. 3. TECHNICAL SPECIFICATIONS 3.1 IMPACTED PRODUCTSThe subsequent versions of Mitsubishi Electric’s FA Engineering Software Solutions are affected:…

Exploit, ICS, IoT Security

APSystems Altenergy Power Control 

1. EXECUTIVE SUMMARY 2. RISK EVALUATION ​Successful exploitation of this vulnerability may allow remote code execution. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS ​The following versions of Altenergy Power Control software are affected:  3.2 VULNERABILITY OVERVIEW 3.2.1 ​IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS…

Critical vulnerabiliities, ICS, IoT Security, Market, News

Schneider Electric EcoStruxure Products, Modicon PLCs, and Programmable Automation Controllers 

Security Assessment of Schneider Electric Products Summary of Findings: During a security assessment of Schneider Electric’s EcoStruxure Products, Modicon PLCs, and Programmable Automation Controllers, several vulnerabilities were discovered. These vulnerabilities involve improper checks for unusual or exceptional conditions and could potentially lead to unauthorized access,…

Critical vulnerabiliities, Exploit, ICS, IoT Security, Market, News

Industrial Control Links ScadaFlex II SCADA Controllers 

1. EXECUTIVE SUMMARY 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an authenticated attacker to overwrite, delete, or create files.  3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of Industrial Control Links ScadaFlex II SCADA Controllers are affected:  3.2 VULNERABILITY OVERVIEW 3.2.1 EXTERNAL…