Stay connected

Trending News

ICS, Market, News

Mitsubishi Electric MELSEC-Q Series PLCs (Update A) 

1. EXECUTIVE SUMMARY 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a remote attacker to send specially crafted packets to the device, causing Ethernet communication to stop. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following MELSEC-Q series PLCs are affected: 3.2 VULNERABILITY OVERVIEW…

ICS, News, Reports

Mitsubishi Electric FA Engineering Software 

2. RISK ASSESSMENTExploiting this vulnerability successfully could enable a local attacker to execute code, potentially leading to information exposure, unauthorized data alterations, or triggering a denial-of-service (DoS) scenario. 3. TECHNICAL SPECIFICATIONS 3.1 IMPACTED PRODUCTSThe subsequent versions of Mitsubishi Electric’s FA Engineering Software Solutions are affected:…

Critical vulnerabiliities, ICS, IoT Security, Market, News

Schneider Electric EcoStruxure Products, Modicon PLCs, and Programmable Automation Controllers 

Security Assessment of Schneider Electric Products Summary of Findings: During a security assessment of Schneider Electric’s EcoStruxure Products, Modicon PLCs, and Programmable Automation Controllers, several vulnerabilities were discovered. These vulnerabilities involve improper checks for unusual or exceptional conditions and could potentially lead to unauthorized access,…

Critical vulnerabiliities, IoT Security, Market, News

Hitachi Energy MSM 

1. EXECUTIVE SUMMARY 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to obtain user access credentials of the MSM web interface or cause a denial-of-service condition.  3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Hitachi Energy products are affected:  3.2 VULNERABILITY…

Market, News, Recommendations

Dataprobe iBoot-PDU (Update A) 

1. EXECUTIVE SUMMARY 2. UPDATE OR REPOSTED INFORMATION This updated advisory is a follow-up to the original advisory titled ICSA-22-263-03 Dataprobe iBoot-PDU that was published September 20, 2022, on the ICS webpage on cisa.gov/ICS.  3. RISK EVALUATION Successful exploitation of these vulnerabilities could lead to…