www.infosecurity-magazine.com
Open in
urlscan Pro
13.32.99.111
Public Scan
URL:
https://www.infosecurity-magazine.com/news/cisa-critical-infrastructure-patch/
Submission: On January 15 via api from TR — Scanned from DE
Submission: On January 15 via api from TR — Scanned from DE
Form analysis
2 forms found in the DOMGET https://www.infosecurity-magazine.com/search/
<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
<input type="search" name="q" class="form-control" placeholder="Search site…" aria-label="Search keywords" required="required">
<button type="submit" class="form-button with-icon">
<svg viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg" role="img" aria-label="Search">
<path d="M15 15L21 21M10 17C6.13401 17 3 13.866 3 10C3 6.13401 6.13401 3 10 3C13.866 3 17 6.13401 17 10C17 13.866 13.866 17 10 17Z" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
</svg>
</button>
</form>
GET https://www.infosecurity-magazine.com/search/
<form method="get" action="https://www.infosecurity-magazine.com/search/" role="search">
<input type="search" name="q" class="form-control" placeholder="Search Infosecurity Magazine…" aria-label="Search keywords" required="required">
<input type="submit" value="Search" class="form-button">
</form>
Text Content
* Log In * Sign Up * * News * Magazine Features * Opinions * News Features * Interviews * Editorial * Blogs * Reviews * Slackspace * Next-Gen Infosec * Webinars * White Papers * Podcasts * Industry Events & Training * Magazine Events * Online Summits * Company Directory * Application Security * Automation * Big Data * Business Continuity * Cloud Security * Compliance * Cybercrime * Data Protection * Digital Forensics * Encryption * Human Factor * Identity Access Management * Industry Announcements * Internet Security * Malware * Managed Services * Mobile Security * Network Security * Payment Security * Physical and Information Security Convergence * Privacy * Risk Management * The Internet of Things * Log In * Sign Up * * News * Topics * Features * Webinars * White Papers * Podcasts * EventsEvents & Conferences * Directory * * Infosecurity Magazine Home » News » CISA Urges Critical Infrastructure to Patch Urgent ICS Vulnerabilities CISA URGES CRITICAL INFRASTRUCTURE TO PATCH URGENT ICS VULNERABILITIES News 12 Jan 2024 WRITTEN BY JAMES COKER Deputy Editor, Infosecurity Magazine * Follow @ReporterCoker * * * The US Cybersecurity and Infrastructure Security Agency (CISA) has urged critical infrastructure organizations to address vulnerabilities affecting nine industrial control systems (ICS) products. The report, dated January 11, 2024, highlighted a series of high and critical severity vulnerabilities in products widely used in sectors like energy, manufacturing and transportation. Users and administrators in these sectors are encouraged to review the advisories for technical details and mitigations. RAPID SOFTWARE LLC RAPID SCADA – CVSS 9.6 (CRITICAL) Impacting a Rapid Software product used in the energy and transportation sectors are seven vulnerabilities that could result in threat actors targeting organizations in a variety of ways. These include reading sensitive files from the Rapid Scada server, writing files to the Rapid Scada directory to achieve code execution and gaining access to sensitive systems via legitimate-seeming phishing attacks. CISA said that Rapid Software did not respond to its attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date. HORNER AUTOMATION CSCAPE – CVSS 7.8 (HIGH) This stack-based buffer overflow vulnerability affects the Cscape product versions 9.90 SP10 and prior, which are used by critical manufacturing firms. There is a low attack complexity, and successful exploitation can enable attackers to execute arbitrary code. Customers are urged to apply v9.90 SP11 or the latest version of the Cscape software to mitigate this vulnerability. SCHNEIDER ELECTRIC EASERGY STUDIO – CVSS 7.8 (HIGH) This deserialization of untrusted data vulnerability affects Easergy Studio versions prior to v9.3.5, a power relay protection control software used by energy companies worldwide. Successful exploitation can allow a threat actor to gain full control of a workstation. It has a low attack complexity, and users should apply v9.3.6, which contains a fix for the vulnerability. Read here: Five ICS Security Challenges and How to Overcome Them SIEMENS TEAMCENTER VISUALIZATION AND JT2GO – CVSS 7.8 (HIGH) These four vulnerabilities affect two Siemens products used in the critical manufacturing industry. They facilitate out-of-bounds read, NULL pointer deference and stack-based buffer overflow exploits. Customers are urged to update JT2Go and Teamcenter Visualization products to the latest software to mitigate these risks. Users are also recommended to avoid opening untrusted CGM files in the two products. SIEMENS SPECTRUM POWER 7 – CVSS 7.8 (HIGH) Affecting all Spectrum Power 7 versions prior to V23Q4, this incorrect permission assignment for critical resource vulnerability can allow an authenticated local attacker to inject arbitrary code and gain root access. There is a low attack complexity. Critical manufacturing firms using this product are recommended to update to V23Q4 or a later version to mitigate the risk posed. SIEMENS SICAM A8000 – CVSS 6.6 (MEDIUM) This vulnerability can allow an authenticated remote attacker to inject commands that are executed on the device with root privileges during device startup. It impacts the Siemens products CP-8031 MASTER MODULE (6MF2803-1AA00) and CP-8050 MASTER MODULE (6MF2805-0AA00) versions prior to CPCI85 V05.20. Siemens has informed critical manufacturing customers of several workarounds and mitigations that can reduce the risk. These mitigations include reviewing the users that have permission to modify the network configuration and apply strong passwords and updating products to CPCI85 V05.20 or later version. SIEMENS SIMATIC CN 4100 – CVSS 9.8 (CRITICAL) These three vulnerabilities are exploitable remotely and has a low attack complexity. Impacting versions prior to V2.7, they enable authorization bypass through user-controlled key, improper input validation and use of default credentials. Successful exploitation can allow an attacker to remotely login as root or cause denial of service condition of the device. SIMATIC CN 4100 customers in the critical manufacturing industry should update to V2.7 or later version. SIEMENS SIMATIC – CVSS 10 (CRITICAL) Successful exploitation of this vulnerability, which affect several SIMATIC products with maxView Storage Manager on Windows, can enable attackers to obtain remote unauthorized access. Critical manufacturing firms using SIMATIC IPC647E, SIMATIC IPC847E and SIMATIC IPC1047E should update maxView Storage Manager to V4.14.00.26068 or later version to mitigate the risk. SIEMENS SOLID EDGE – CVSS 7.8 (HIGH) All versions prior to V223.0 Update 10 are at risk of heap-based buffer overflow, out of bounds write, stack-based buffer overflow and access of uninitialized pointer while parsing specially crafted PAR files through 11 vulnerabilities. These vulnerabilities can enable an attacker to execute code in the context of the current process, with a low attack complexity. Siemens have urged critical manufacturing customers to update to V223.0 Update 10 or later version and avoid opening untrusted files from unknown sources in Solid Edge. ESSENTIAL CYBERSECURITY PRACTICES FOR ICS SYSTEMS CISA also provided the following advice to critical infrastructure organizations using ICS: * Keep systems up-to-date with new updates * Minimize network exposure for all control system devices * Isolate control system networks from business networks * Use secure methods, such as virtual private networks (VPNs) when remote access is required CISA added that it will no longer be updating ICS security advisories for Siemens product vulnerabilities as of January 10, 2024, beyond the initial advisory. YOU MAY ALSO LIKE 1. ORGANIZATIONS URGED TO FIX 41 VULNERABILITIES ADDED TO CISA’S CATALOG OF EXPLOITED FLAWS News25 May 2022 2. LEGACY FLAWS DOMINATE TOP 12 VULNERABILITIES LIST News4 Aug 2023 3. CISA ISSUES EMERGENCY DIRECTIVE FOR VMWARE VULNERABILITIES News19 May 2022 4. THE CASE OF DISAPPEARING VULNERABILITIES Opinion28 Dec 2017 5. NSA REVEALS "HACKERS' PLAYBOOK" FOR OT ATTACKS News23 Sep 2022 WHAT’S HOT ON INFOSECURITY MAGAZINE? * Read * Shared * Watched * Editor's Choice 23ANDME BLAMES USER “NEGLIGENCE” FOR DATA BREACH News5 Jan 2024 1 CISA URGES CRITICAL INFRASTRUCTURE TO PATCH URGENT ICS VULNERABILITIES News12 Jan 2024 2 TWO IVANTI ZERO-DAYS ACTIVELY EXPLOITED IN THE WILD News11 Jan 2024 3 WAITING FOR YOUR PAY RAISE? COFENSE WARNS AGAINST HR-RELATED SCAMS News12 Jan 2024 4 CYBER INSURANCE MARKET TO BE WORTH OVER $90BN BY 2033 News10 Jan 2024 5 LOANDEPOT CONFIRMS RANSOMWARE ATTACK IN SEC FILING News9 Jan 2024 6 CYBER INSURANCE MARKET TO BE WORTH OVER $90BN BY 2033 News10 Jan 2024 1 TOP 10 AI SECURITY STORIES OF 2023 News Feature29 Dec 2023 2 OVER 100 EUROPEAN BANKS FACE CYBER RESILIENCE TEST News3 Jan 2024 3 UNIVERSITY OF MANCHESTER’S CISO ON MANAGING MAJOR CYBER INCIDENTS Interview4 Jan 2024 4 TOP 5 CYBERSECURITY MERGERS AND ACQUISITIONS 2023 News Feature26 Dec 2023 5 NCSC PUBLISHES PRACTICAL SECURITY GUIDANCE FOR SMBS News11 Jan 2024 6 NAVIGATING THE CYBERSECURITY LANDSCAPE: REVIEWING 2023 AND STRATEGIES FOR 2024 Webinar12 Dec 2023 1 HOW TO SECURE YOUR MODERN CORPORATE PERIMETER WITH ENDPOINT SECURITY Webinar2 Nov 2023 2 CHALLENGING THE RULES OF SECURITY: A BETTER WAY TO PROTECT THE ENTERPRISE Webinar9 Nov 2023 3 7 STEPS TO BUILDING QUANTUM RESILIENCE Webinar5 Dec 2023 4 THE NEXT FRONTIER FOR DATA SECURITY: INSIGHTS FROM SAFEGUARDING FORTUNE 500 DATA TRANSFERS Webinar23 Nov 2023 5 FORWARD-THINKING PRACTICES TO MANAGE IT RISK Webinar12 Oct 2023 6 WHAT IT PROFESSIONALS NEED TO KNOW ABOUT SSL CERTIFICATES FOR WEBSITES Blog5 Oct 2023 1 CHINA POISED TO DISRUPT US CRITICAL INFRASTRUCTURE WITH CYBER-ATTACKS, MICROSOFT WARNS News5 Oct 2023 2 RED CROSS ISSUES WARTIME HACKTIVIST RULES News4 Oct 2023 3 AI-GENERATED PHISHING EMAILS ALMOST IMPOSSIBLE TO DETECT, REPORT FINDS News2 Oct 2023 4 DATA THEFT OVERTAKES RANSOMWARE AS TOP CONCERN FOR IT DECISION MAKERS News2 Oct 2023 5 SOLARWINDS CISO ON DEVELOPING A MORE SECURE SOFTWARE ECOSYSTEM AFTER INFAMOUS HACK Interview2 Oct 2023 6 THE MAGAZINE * About Infosecurity * Meet the team * Contact us ADVERTISERS * Media pack CONTRIBUTORS * Forward features * Op-ed * Next-gen submission * * * * Copyright © 2024 Reed Exhibitions Ltd. * Terms and Conditions * Privacy Policy * Intellectual property statement * Cookies Settings * Cookie Policy * Sitemap We use cookies to analyse and improve our service, to improve and personalise content, advertising and your digital experience. We also share information about your use of our site with our social media, advertising and analytics partners. Cookie Policy Accept All Cookies Cookies Settings COOKIE PREFERENCE CENTRE We process your information, to deliver content or advertisements and measure the delivery of such content or advertisements, extract insights, and generate reports to understand service usage; and/or accessing or storing information on devices for that purpose. You can choose not to allow some types of cookies. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more, to change our default settings, and/or view the list of Google Ad-Tech Vendors. Cookie Policy MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active Strictly Necessary Cookies These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Confirm My Choices Back Button Back PERFORMANCE COOKIES Vendor Search Search Icon Filter Icon Clear Filters Information storage and access Apply Consent Leg.Interest All Consent Allowed Select All Vendors Select All Vendors All Consent Allowed Confirm My Choices