Stay connected

Trending News

Critical vulnerabiliities, Cyber Security, Recommendations

ISC Releases Security Advisories for Multiple Versions of BIND 9 

The Internet Systems Consortium (ISC) has released security advisories that address vulnerabilities affecting multiple versions of the ISC’s Berkeley Internet Name Domain (BIND) 9. A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions. CISA encourages users and administrators to review the following…

Market, News, Recommendations

Dataprobe iBoot-PDU (Update A) 

1. EXECUTIVE SUMMARY 2. UPDATE OR REPOSTED INFORMATION This updated advisory is a follow-up to the original advisory titled ICSA-22-263-03 Dataprobe iBoot-PDU that was published September 20, 2022, on the ICS webpage on cisa.gov/ICS.  3. RISK EVALUATION Successful exploitation of these vulnerabilities could lead to…

Critical vulnerabiliities, ICS, Industrial IoT (IIoT), Market, News, Recommendations

Siemens SIMATIC Industrial Products 

1. EXECUTIVE SUMMARY CVSS v3 7.9 ATTENTION: Low attack complexity  Vendor: Siemens  Equipment: SIMATIC industrial products  Vulnerability: Time-of-check Time-of-use (TOCTOU) Race Condition  2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a privileged user to potentially enable escalation of privilege via local access.  3. TECHNICAL DETAILS 3.1 AFFECTED…

ICS, Market, News, Recommendations

Hitachi Energy MicroSCADA Pro/X SYS600 Products 

1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Low attack complexity   Vendor: Hitachi Energy  Equipment: MicroSCADA X SYS600, MicroSCADA Pro  Vulnerability: Improper Input Validation  2. RISK EVALUATION Successful exploitation of this vulnerability could allow an unauthorized user to execute administrator level scripts.  3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The…

Market, News, Recommendations

Horner Automation Remote Compact Controller 

1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity  Vendor: Horner Automation Equipment: Remote Compact Controller (RCC) 972  Vulnerabilities: Inadequate Encryption Strength, Use of Hard-coded Cryptographic Key, Excessive Reliance on Global Variables  2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to obtain credentials…