WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Omron CX-Supervisor (Update A) (ICSA-19-017-01) – Product Used in the Energy Sector
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Omron CX-Supervisor (Update A) (ICSA-19-017-01) – Product Used in the Energy Sector

Author: Charles Egli

Created: Tuesday, February 12, 2019 - 15:53

Categories: Cybersecurity

February 7, 2019

The NCCIC has updated this advisory with additional information on the vulnerabilities and technical details of the affected products. Read the advisory at NCCIC/ICS-CERT.

January 17, 2019

The NCCIC has released an advisory on code injection, command injection, use after free, and type confusion vulnerabilities in Omron CX-Supervisor. Versions 3.42 and prior are affected. Successful exploitation of these vulnerabilities could result in a denial-of-service condition and/or allow an attacker to achieve code execution with privileges within the context of the application. Omron has released Version 3.5.0.11 of CX-Supervisor to address the reported vulnerabilities. To be protected, development projects must be upgraded and saved in the new format, then rebuilt in the latest 3.5.0.11 format. The NCCIC also advises on a series of mitigating measures for these vulnerabilities. Read the full advisory at NCCIC/ICS-CERT.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar