www.infosecurity-magazine.com Open in urlscan Pro
13.32.99.111  Public Scan

URL: https://www.infosecurity-magazine.com/news/cisa-critical-infrastructure-patch/
Submission: On January 15 via api from TR — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.infosecurity-magazine.com/search/

<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
  <input type="search" name="q" class="form-control" placeholder="Search site…" aria-label="Search keywords" required="required">
  <button type="submit" class="form-button with-icon">
    <svg viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" aria-label="Search">
      <path d="M15 15L21 21M10 17C6.13401 17 3 13.866 3 10C3 6.13401 6.13401 3 10 3C13.866 3 17 6.13401 17 10C17 13.866 13.866 17 10 17Z" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
    </svg>
  </button>
</form>

GET https://www.infosecurity-magazine.com/search/

<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
  <input type="search" name="q" class="form-control" placeholder="Search Infosecurity Magazine…" aria-label="Search keywords" required="required">
  <input type="submit" value="Search" class="form-button">
</form>

Text Content

 * Log In
 * Sign Up

 * 

 * News
 * Magazine Features
 * Opinions
 * News Features
 * Interviews
 * Editorial
 * Blogs
 * Reviews
 * Slackspace
 * Next-Gen Infosec
 * Webinars
 * White Papers
 * Podcasts
 * Industry Events & Training
 * Magazine Events
 * Online Summits
 * Company Directory

 * Application Security
 * Automation
 * Big Data
 * Business Continuity
 * Cloud Security
 * Compliance
 * Cybercrime
 * Data Protection
 * Digital Forensics
 * Encryption
 * Human Factor
 * Identity Access Management
 * Industry Announcements
 * Internet Security
 * Malware
 * Managed Services
 * Mobile Security
 * Network Security
 * Payment Security
 * Physical and Information Security Convergence
 * Privacy
 * Risk Management
 * The Internet of Things

 * Log In
 * Sign Up

 * 
 * News
 * Topics
 * Features
 * Webinars
 * White Papers
 * Podcasts
 * EventsEvents & Conferences
 * Directory
 * * 

Infosecurity Magazine Home » News » CISA Urges Critical Infrastructure to Patch
Urgent ICS Vulnerabilities


CISA URGES CRITICAL INFRASTRUCTURE TO PATCH URGENT ICS VULNERABILITIES

News 12 Jan 2024


WRITTEN BY


JAMES COKER

Deputy Editor, Infosecurity Magazine

 * Follow @ReporterCoker

 * 
 * 
 * 

The US Cybersecurity and Infrastructure Security Agency (CISA) has urged
critical infrastructure organizations to address vulnerabilities affecting nine
industrial control systems (ICS) products.

The report, dated January 11, 2024, highlighted a series of high and critical
severity vulnerabilities in products widely used in sectors like energy,
manufacturing and transportation.

Users and administrators in these sectors are encouraged to review the
advisories for technical details and mitigations.


RAPID SOFTWARE LLC RAPID SCADA – CVSS 9.6 (CRITICAL)

Impacting a Rapid Software product used in the energy and transportation sectors
are seven vulnerabilities that could result in threat actors targeting
organizations in a variety of ways.

These include reading sensitive files from the Rapid Scada server, writing files
to the Rapid Scada directory to achieve code execution and gaining access to
sensitive systems via legitimate-seeming phishing attacks.

CISA said that Rapid Software did not respond to its attempts at coordination.
Users of Rapid SCADA are encouraged to contact Rapid Software and keep their
systems up to date.


HORNER AUTOMATION CSCAPE – CVSS 7.8 (HIGH)

This stack-based buffer overflow vulnerability affects the Cscape product
versions 9.90 SP10 and prior, which are used by critical manufacturing firms.

There is a low attack complexity, and successful exploitation can enable
attackers to execute arbitrary code.

Customers are urged to apply v9.90 SP11 or the latest version of the Cscape
software to mitigate this vulnerability.


SCHNEIDER ELECTRIC EASERGY STUDIO – CVSS 7.8 (HIGH)

This deserialization of untrusted data vulnerability affects Easergy Studio
versions prior to v9.3.5, a power relay protection control software used by
energy companies worldwide.

Successful exploitation can allow a threat actor to gain full control of a
workstation.

It has a low attack complexity, and users should apply v9.3.6, which contains a
fix for the vulnerability.

Read here: Five ICS Security Challenges and How to Overcome Them


SIEMENS TEAMCENTER VISUALIZATION AND JT2GO – CVSS 7.8 (HIGH)

These four vulnerabilities affect two Siemens products used in the critical
manufacturing industry.

They facilitate out-of-bounds read, NULL pointer deference and stack-based
buffer overflow exploits.

Customers are urged to update JT2Go and Teamcenter Visualization products to the
latest software to mitigate these risks. Users are also recommended to avoid
opening untrusted CGM files in the two products.


SIEMENS SPECTRUM POWER 7 – CVSS 7.8 (HIGH)

Affecting all Spectrum Power 7 versions prior to V23Q4, this incorrect
permission assignment for critical resource vulnerability can allow an
authenticated local attacker to inject arbitrary code and gain root access.
There is a low attack complexity.

Critical manufacturing firms using this product are recommended to update to
V23Q4 or a later version to mitigate the risk posed.


SIEMENS SICAM A8000 – CVSS 6.6 (MEDIUM)

This vulnerability can allow an authenticated remote attacker to inject commands
that are executed on the device with root privileges during device startup.

It impacts the Siemens products CP-8031 MASTER MODULE (6MF2803-1AA00) and
CP-8050 MASTER MODULE (6MF2805-0AA00) versions prior to CPCI85 V05.20.

Siemens has informed critical manufacturing customers of several workarounds and
mitigations that can reduce the risk.

These mitigations include reviewing the users that have permission to modify the
network configuration and apply strong passwords and updating products to CPCI85
V05.20 or later version.


SIEMENS SIMATIC CN 4100 – CVSS 9.8 (CRITICAL)

These three vulnerabilities are exploitable remotely and has a low attack
complexity.

Impacting versions prior to V2.7, they enable authorization bypass through
user-controlled key, improper input validation and use of default credentials.

Successful exploitation can allow an attacker to remotely login as root or cause
denial of service condition of the device.

SIMATIC CN 4100 customers in the critical manufacturing industry should update
to V2.7 or later version. 


SIEMENS SIMATIC – CVSS 10 (CRITICAL)

Successful exploitation of this vulnerability, which affect several SIMATIC
products with maxView Storage Manager on Windows, can enable attackers to obtain
remote unauthorized access.

Critical manufacturing firms using SIMATIC IPC647E, SIMATIC IPC847E and SIMATIC
IPC1047E should update maxView Storage Manager to V4.14.00.26068 or later
version to mitigate the risk.


SIEMENS SOLID EDGE – CVSS 7.8 (HIGH)

All versions prior to V223.0 Update 10 are at risk of heap-based buffer
overflow, out of bounds write, stack-based buffer overflow and access of
uninitialized pointer while parsing specially crafted PAR files through 11
vulnerabilities.

These vulnerabilities can enable an attacker to execute code in the context of
the current process, with a low attack complexity.

Siemens have urged critical manufacturing customers to update to V223.0 Update
10 or later version and avoid opening untrusted files from unknown sources in
Solid Edge.


ESSENTIAL CYBERSECURITY PRACTICES FOR ICS SYSTEMS

CISA also provided the following advice to critical infrastructure organizations
using ICS:

 * Keep systems up-to-date with new updates
 * Minimize network exposure for all control system devices
 * Isolate control system networks from business networks
 * Use secure methods, such as virtual private networks (VPNs) when remote
   access is required

CISA added that it will no longer be updating ICS security advisories for
Siemens product vulnerabilities as of January 10, 2024, beyond the initial
advisory.




YOU MAY ALSO LIKE


 1. ORGANIZATIONS URGED TO FIX 41 VULNERABILITIES ADDED TO CISA’S CATALOG OF
    EXPLOITED FLAWS
    
    News25 May 2022


 2. LEGACY FLAWS DOMINATE TOP 12 VULNERABILITIES LIST
    
    News4 Aug 2023


 3. CISA ISSUES EMERGENCY DIRECTIVE FOR VMWARE VULNERABILITIES
    
    News19 May 2022


 4. THE CASE OF DISAPPEARING VULNERABILITIES
    
    Opinion28 Dec 2017


 5. NSA REVEALS "HACKERS' PLAYBOOK" FOR OT ATTACKS
    
    News23 Sep 2022


WHAT’S HOT ON INFOSECURITY MAGAZINE?

 * Read
 * Shared
 * Watched
 * Editor's Choice


23ANDME BLAMES USER “NEGLIGENCE” FOR DATA BREACH

News5 Jan 2024
1


CISA URGES CRITICAL INFRASTRUCTURE TO PATCH URGENT ICS VULNERABILITIES

News12 Jan 2024
2


TWO IVANTI ZERO-DAYS ACTIVELY EXPLOITED IN THE WILD

News11 Jan 2024
3


WAITING FOR YOUR PAY RAISE? COFENSE WARNS AGAINST HR-RELATED SCAMS

News12 Jan 2024
4


CYBER INSURANCE MARKET TO BE WORTH OVER $90BN BY 2033

News10 Jan 2024
5


LOANDEPOT CONFIRMS RANSOMWARE ATTACK IN SEC FILING

News9 Jan 2024
6



CYBER INSURANCE MARKET TO BE WORTH OVER $90BN BY 2033

News10 Jan 2024
1


TOP 10 AI SECURITY STORIES OF 2023

News Feature29 Dec 2023
2


OVER 100 EUROPEAN BANKS FACE CYBER RESILIENCE TEST

News3 Jan 2024
3


UNIVERSITY OF MANCHESTER’S CISO ON MANAGING MAJOR CYBER INCIDENTS

Interview4 Jan 2024
4


TOP 5 CYBERSECURITY MERGERS AND ACQUISITIONS 2023

News Feature26 Dec 2023
5


NCSC PUBLISHES PRACTICAL SECURITY GUIDANCE FOR SMBS

News11 Jan 2024
6



NAVIGATING THE CYBERSECURITY LANDSCAPE: REVIEWING 2023 AND STRATEGIES FOR 2024

Webinar12 Dec 2023
1


HOW TO SECURE YOUR MODERN CORPORATE PERIMETER WITH ENDPOINT SECURITY

Webinar2 Nov 2023
2


CHALLENGING THE RULES OF SECURITY: A BETTER WAY TO PROTECT THE ENTERPRISE

Webinar9 Nov 2023
3


7 STEPS TO BUILDING QUANTUM RESILIENCE

Webinar5 Dec 2023
4


THE NEXT FRONTIER FOR DATA SECURITY: INSIGHTS FROM SAFEGUARDING FORTUNE 500 DATA
TRANSFERS

Webinar23 Nov 2023
5


FORWARD-THINKING PRACTICES TO MANAGE IT RISK

Webinar12 Oct 2023
6



WHAT IT PROFESSIONALS NEED TO KNOW ABOUT SSL CERTIFICATES FOR WEBSITES

Blog5 Oct 2023
1


CHINA POISED TO DISRUPT US CRITICAL INFRASTRUCTURE WITH CYBER-ATTACKS, MICROSOFT
WARNS

News5 Oct 2023
2


RED CROSS ISSUES WARTIME HACKTIVIST RULES

News4 Oct 2023
3


AI-GENERATED PHISHING EMAILS ALMOST IMPOSSIBLE TO DETECT, REPORT FINDS

News2 Oct 2023
4


DATA THEFT OVERTAKES RANSOMWARE AS TOP CONCERN FOR IT DECISION MAKERS

News2 Oct 2023
5


SOLARWINDS CISO ON DEVELOPING A MORE SECURE SOFTWARE ECOSYSTEM AFTER INFAMOUS
HACK

Interview2 Oct 2023
6



THE MAGAZINE

 * About Infosecurity
 * Meet the team
 * Contact us


ADVERTISERS

 * Media pack


CONTRIBUTORS

 * Forward features
 * Op-ed
 * Next-gen submission

 * 
 * 
 * 

 * Copyright © 2024 Reed Exhibitions Ltd.
 * Terms and Conditions
 * Privacy Policy
 * Intellectual property statement
 * Cookies Settings
 * Cookie Policy
 * Sitemap




We use cookies to analyse and improve our service, to improve and personalise
content, advertising and your digital experience. We also share information
about your use of our site with our social media, advertising and analytics
partners. Cookie Policy
Accept All Cookies
Cookies Settings



COOKIE PREFERENCE CENTRE

We process your information, to deliver content or advertisements and measure
the delivery of such content or advertisements, extract insights, and generate
reports to understand service usage; and/or accessing or storing information on
devices for that purpose.

You can choose not to allow some types of cookies. However, blocking some types
of cookies may impact your experience of the site and the services we are able
to offer. Click on the different category headings to find out more, to change
our default settings, and/or view the list of Google Ad-Tech Vendors.


Cookie Policy



MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active
Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.



Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. If you do not allow these cookies, you will
experience less targeted advertising.

Cookies Details‎
Confirm My Choices

Back Button

Back


PERFORMANCE COOKIES



Vendor Search Search Icon Filter Icon


Clear Filters

Information storage and access
Apply
Consent Leg.Interest

All Consent Allowed

Select All Vendors
Select All Vendors
All Consent Allowed

Confirm My Choices