Today CISA’s NCCIC-ICS published 18 control system security advisories for products from Dingtian, Outback Power, mySCADA, ORing, and Siemens (14), as well as an update for a Mitsubishi advisory. They also included a medical device security advisory for products from Qardio.
Advisories
Dingtian Advisory -
This advisory
describes an authentication bypass using alternate path or channel
vulnerability in the Dingtian DT 004 relay board.
Outback Advisory -
This advisory
describes three vulnerabilities in the Outback Power Mojave Inverter.
mySCADA Advisory -
This advisory
describes four vulnerabilities in the mySCADA myPRO Manager.
ORing Advisory - This
advisory
describes two vulnerabilities (with publicly available exploit code) in the Oring
IAP-420 WLAN access point.
Opcenter Advisory -
This advisory
discusses five vulnerabilities (one with known exploit) in the Siemens Opcenter
Intelligence product.
SIMATIC PCS Advisory -
This advisory
describes an insufficient session expiration vulnerability in the Simens SIMATIC
PCS neo and TIA Administrator products.
SIMATIC IPC Advisory -
This advisory
describes an incorrect permission assignment for critical resource
vulnerability in the Siemens SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor.
APOGEE Advisory -
This advisory
describes two vulnerabilities in the Siemens APOGEE PXC and TALON TC series
products.
cold state and a vulnerability that would allow an attacker
to decrypt the passwords of the device.
Questa Advisory -
This advisory
describes an uncontrolled search path element vulnerability in the Siemens Questa
and ModelSim products.
SCALANCE Advisory -
This advisory
discuss 72 vulnerabilities in the Siemens SCALANCE W700 access point.
OpenV2G Advisory -
This advisory
describes a classic buffer overflow vulnerability in the Siemens OpenV2G
(vehicle to grid) communications interface.
Teamcenter Advisory -
This advisory
describes an open redirect vulnerability in the Siemens Teamcenter product.
RUGGEDCOM Advisory -
This advisory
discusses ten vulnerabilities in the Siemens RUGGEDCOM APE1808 product.
SIPROTEC 5 Advisory
#1 - This advisory
describes a use of default credentials vulnerability in the Siemens SIPROTEC 5
Devices.
SIPROTEC 5 Advisory
#2 - This advisory
describes an active debug code vulnerability in the Siemens SIPROTEC 5
products. The vulnerability was reported by Steffen Robertz, Stefan Viehböck,
and Constantin Schieber-Knöbl of SEC Consult Vulnerability Lab.
SIPROTEC 5 Advisory
#3 - This advisory
describes a cleartext storage of sensitive information vulnerability in the
Siemens SIPROTEC 5 products.
SIMATIC Advisory -
This advisory
describes an observable discrepancy vulnerability in the Siemens SIMATIC
product line.
SIMATIC S7-1200
Advisory - This advisory
describes two vulnerabilities in the Siemens SIMATIC S7-1200 CPU family.
Qardio Advisory - This advisory describes three vulnerabilities in the Qardio Heart Health IOS application, Heart Health Android Application, and QardioARM A100.
Updates
Mitsubishi Update -
This update
provides additional information on the FA Engineering Software Products
advisory that was originally published on January 30th, 2024, and
most recently updated on January 16th, 2025.
For more information on these advisories, including links to
3rd party advisories and researcher reports, see my article at CFSN
Detailed Analysis - https://patrickcoyle.substack.com/p/19-advisories-and-1-update-published
- subscription required.
1 comment:
I'm baffled by the discrepancy between the ICSA-25-035-02, about vulnerabilities in Rockwell PLC's, and the original Rockwell advisory. The ICSA mentions 1756-L3zS3, while Rockwell talks about Compact GuardLogix, which has catalog 5069 not 1756 (https://www.rockwellautomation.com/en-us/products/hardware/allen-bradley/programmable-controllers/small-controllers/compactlogix-family/compactlogix-5380-controllers.html)
This error is magnified by many other websites worldwide all copy/pasting the ICSA advisory text.
Rockwell itself doesn't make life any easier while on the webpage it appears that they refer to the whole GuardLogix 5580 range, but the downloadable JSON file for CVE-2025-24478 specifically mentions "GuardLogix 5580 SIL3".
Post a Comment