You are here

Cybersecurity

Red Lion Controls Crimson (ICSA-19-248-01)

The NCCIC has published an advisory on use after free, improper restriction of operations within the bounds of a memory buffer, pointer issues, and use of hard-coded cryptographic key vulnerabilities in Red Lion Controls Crimson. Versions 3.0 and prior and versions 3.1 and prior, to release 3112.00, are affected. Red Lion Controls recommends users migrate to Crimson 3.1 release 3112.00 or later where the model choice allows. The NCCIC also recommends a series of measures to mitigate the vulnerabilities.

FBI FLASH: Increased Number of Emotet Command and Control IP Addresses Identified

The FBI has released a FLASH message on Emotet, providing new internet protocol (IP) addresses that have been associated with modular banking Trojan since it recently resumed operations after a hiatus that began in early June (for more on Emotet’s revival, read an article WaterISAC discussed in the August 27, 2019 Security and Resilience Update).

UK Cyber Incident Trends Report

The UK’s National Cyber Security Centre (NCSC) has published a report detailing cyber incident trends in the country from October 2018 to April 2019, which the U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) encourages administrators to review. It reveals that five main threats and threat vectors affected UK organizations: cloud services, and Office 365 in particular; ransomware; phishing; vulnerability scanning; and supply chain attacks.

Potential Hurricane Dorian Cyber Scams

The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain vigilant for malicious cyber activity targeting Hurricane Dorian disaster victims and potential donors. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should exercise caution in handling any email with a hurricane-related subject line, attachment, or hyperlink. In addition, users should be wary of social media pleas, texts, or door-to-door solicitations relating to severe weather events.

EZAutomation EZ PLC Editor (ICSA-19-246-02)

The NCCIC has published an advisory on an improper restriction of operations within the bounds of a memory buffer vulnerability in EZAutomation EZ PLC Editor. Versions 1.8.41 and prior are affected. Successful exploitation of this vulnerability could allow an attacker to execute code under the privileges of the application. EZAutomation recommends users update to Version 1.9.0 or later and, to further reduce the risk, to use project files from known sources. The NCCIC also recommends a series of measures to mitigate the vulnerability.

EZAutomation EZ Touch Editor (ICSA-19-246-01)

The NCCIC has published an advisory on a stack-based buffer overflow vulnerability in EZAutomation EZ Touch Editor. Versions 2.1.0 and prior are affected. Successful exploitation of this vulnerability could allow an attacker to execute code under the privileges of the application. EZAutomation recommends users update to Version 2.2.0 or later and, to further reduce the risk, to use project files from known sources. The NCCIC also recommends a series of measures to mitigate the vulnerability.

Pages

Subscribe to Cybersecurity