Saturday, February 14, 2026

Review – Public ICS Disclosures – Week of 2-7-26 – Part 1

This is a relatively busy disclosure week for the week of Cyber Tuesday. We have 43 bulk vendor disclosures from FortiGuard (6), Hitachi (8), HP (8), HPE (14), QNAP (7). We also have 10 bulk updates from Siemens (10). There are also seven other vendor disclosures from Bosch, Meinberg, Pheonix Contact, Schneider (2), and Siemens (2).

Bulk Disclosures – FortiGuard

Firewall policy bypass in FSSO Terminal Services Agent,

Format String Vulnerability in CAPWAP fast-failover mode,

LDAP authentication bypass in Agentless VPN and FSSO,

Request smuggling attack in FortiOS GUI,

SSL-VPN Symlink Persistence Patch Bypass, and

XSS via back button.

Bulk Disclosures – Hitachi

Multiple Vulnerabilities in Cosminexus HTTP Server,

Vulnerability in Cosminexus HTTP Server,

Vulnerability in Cosminexus HTTP Server and Hitachi Web Server,

Multiple Vulnerabilities in Cosminexus HTTP Server and Hitachi Web Server,

Multiple Vulnerabilities in Cosminexus,

Multiple Vulnerabilities in JP1,

Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center, and

Multiple Vulnerabilities in Hitachi Command Suite products

Bulk Disclosures – HP

HP App – Potential Cross-Site Scripting,

AMD Graphics Driver February 2026 Security Update,

AMD Processors February 2026 Security Update,

Certain HP OfficeJet Pro Printers – Denial of Service,

Intel Chipset Firmware February 2026 Security Update,

Intel Processor Firmware February 2026 Security Update,

Certain HP OfficeJet Pro Printers - Information Disclosure, and

Intel Graphics Software February 2026 Security Update.

Bulk Disclosures – HPE

Certain HPE ProLiant Servers Using Certain Intel Processor BIOS, INTEL-SA-01406, Intel Quick Assist Technology (Intel QAT) Advisory, Multiple vulnerabilities,

Certain HPE SimpliVity Servers Using Certain Intel Processors, INTEL-SA-01313, 2025.3 IPU, Intel Xeon Processor Firmware Advisory, Multiple Vulnerabilities,

Certain HPE SimpliVity Servers Using Certain Intel Processors, INTEL-SA-01280, 2025.3 IPU, Intel Chipset Firmware Advisory, Multiple Vulnerabilities,

Certain HPE SimpliVity Servers Using Certain Intel Processors, INTEL-SA-01312, Intel TDX Module Advisory, Multiple Vulnerabilities,

Certain HPE StoreEasy Servers Using Certain Intel Processors, INTEL-SA-01396, 2026.1 IPU, Intel Processor Firmware Advisory, Local Escalation of Privilege Vulnerability,

Certain HPE ProLiant DL/ML/XD, Synergy, Edgeline and Alletra Servers Using Certain Intel Processors, INTEL-SA-01314, 2025.4 IPU, Intel TDX Module Advisory, Local Escalation of Privilege Vulnerability,

Certain HPE ProLiant DL/ML/XD, Synergy, Edgeline, and Alletra Servers Using Certain Intel Processors, INTEL-SA-01397, 2026.1 IPU, Intel Trust Domain Extensions (Intel TDX) module Advisory, Multiple Vulnerabilities,

Certain HPE ProLiant DL/ML/XD, Synergy, and Alletra Servers Using Certain Intel Processors, INTEL-SA-01401, UPLR1 - Intel Server Firmware Advisory, Local Denial of Service Vulnerability,

HPE Aruba Networking EdgeConnect SD-WAN Orchestrator, Multiple Vulnerabilities,

Certain HPE ProLiant AMD DL/XL Servers Using Certain AMD EPYC Processors, AMD-SB-3023:AMD Server Vulnerabilities, Multiple Vulnerabilities,

HPE Intel E810 Series Ethernet Controllers, INTEL-SA-01171, Intel Ethernet Adapters 800 Series Advisory, Denial of Service Vulnerability,

Certain HPE StoreEasy Servers Using Certain Intel Processors, INTEL-SA-01314, 2025.4 IPU, Intel TDX Module Advisory, Local Escalation of Privilege Vulnerability,

Certain HPE StoreEasy Servers Using Certain Intel Processors, INTEL-SA-01397, 2026.1 IPU, Intel Trust Domain Extensions (Intel TDX) module Advisory, Multiple Vulnerabilities, and

Multiple Vulnerabilities in HPE Aruba Networking Private 5G Core.

Bulk Disclosures – QNAP

Multiple Vulnerabilities in Media Streaming add-on,

Multiple Vulnerabilities in Qsync Central,

Multiple Vulnerabilities in File Station 5,

Vulnerabilities in Apache,

Multiple Vulnerabilities in QTS and QuTS hero, 

Multiple Vulnerabilities in QuTS hero, and

Vulnerabilities in Samba.

Bulk Updates – Siemens

Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1,

Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2,

Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices,

Denial-of-Service Vulnerability in ET 200 Devices,

Multiple Vulnerabilities in SiPass integrated,

Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices,

DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery,

Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1,

Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet PCs, and SIMATIC Field PGs, and

Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5.

Advisories

Bosch Advisory - Bosch published an advisory that describes four deserialization of untrusted data vulnerabilities in their Rexroth IndraWorks product.

Meinberg Advisory - Meinberg published an advisory that discusses 21 vulnerabilities in their LANTIME product.

Pheonix Contact Advisory - Pheonix Contact published an advisory that discusses an improperly controlled sequential memory allocation vulnerability in their mGuard products.

Schneider Advisory #1 - Schneider published an advisory that describes an improper check for unusual or exceptional conditions vulnerability in their SCADAPack and Remote Connect products.

Schneider Advisory #2 - Schneider published an advisory that describes two vulnerabilities in their EcoStruxureTM Building Operation Workstation and EcoStruxureTM Building Operation Webstation products.

Siemens Advisory #1 - Siemens published an advisory that describes six vulnerabilities in their Simcenter Femap and Nastran products.

Siemens Advisory #2 - Siemens published a bulletin that describes an absence of anti-tamper protections and modern exploit mitigation controls in the SIPORT Desktop Client Application.

 

For more information on these disclosures, including links to 3rd party advisories, and researcher reports, see my article at CFSN Detailed Analysis - https://patrickcoyle.substack.com/p/public-ics-disclosures-week-of-2-fdd - subscription required.

No comments:

 
/* Use this with templates/template-twocol.html */