September 12, 2018 Onsite Cybersecurity Incident Assistance from DHS
On September 12, WaterISAC hosted a briefing on the U.S. Department of Homeland Security's Hunt and Incident Response Team (HIRT).
On September 12, WaterISAC hosted a briefing on the U.S. Department of Homeland Security's Hunt and Incident Response Team (HIRT).
September 11, 2018
The NCCIC has updated this advisory with additional details on mitigation measures. NCCIC/ICS-CERT.
May 17, 2018
The NCCIC has released an advisory on a classic buffer overflow vulnerability in Fuji Electric V-Server Lite. V-Server Lite 4.0.3.0 and prior are affected. Successful exploitation of this vulnerability could allow a remote attacker to view sensitive information and disrupt the availability of the device. Fuji Electric has released Version 4.0.4.0 of the software. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.
The NCCIC has released an advisory on use-after free, untrusted pointer dereference, heap-based buffer overflow, out-of-bounds write, integer underflow, out-of-bounds read, and stack-based buffer overflow vulnerabilities in Fuji Electric V-Server. V-Server VPR 4.0.3.0 and prior are affected. Successful exploitation of these vulnerabilities could allow for remote code execution on the device, causing a denial of service condition or information exposure. Fuji Electric has released Version 4.0.4.0 of the software.
The NCCIC has released an advisory on an improper input validation vulnerability in Siemens SCALANCE X Switches. For SCALANCE X300 and X408, all versions prior to 4.0.0 are affected. For SCALANCE X414, all versions are affected. Successful exploitation of this vulnerability could allow an attacker with network access to the device to cause a denial-of-service condition. Siemens provides updates for SCALANCE X300, and SCALANCE X408, and provides mitigations for the SCALANCE X414.
The NCCIC has released an advisory on an uncontrolled search path element vulnerability in Siemens SIMATIC WinCC OA. SIMATIC WinCC OA Version 3.14 and prior are affected. Successful exploitation of this vulnerability could allow an unauthenticated remote user to escalate their privileges in the context of the program. Siemens recommends updating to SIMATIC WinCC OA v3.14-P021 and a series of manual mitigations to reduce risks. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.
The NCCIC has released an advisory on an uncontrolled search path element vulnerability in Siemens TD Keypad Designer. All versions of this product are affected. Successful exploitation of this vulnerability could allow a local low-privileged attacker to escalate their privileges. Siemens has identified specific workarounds and mitigations that users can apply to reduce the risk. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.
Microsoft has released its monthly update to address vulnerabilities in its software. For this month, Microsoft has released security updates for Internet Explorer, Microsoft Edge, Microsoft Windows, Microsoft Office and Microsoft Office Services and Web Apps, ChakraCore, Adobe Flash Player, .NET Framework, Microsoft.Data.OData, and ASP.NET. Microsoft.
Social media accounts are one of cyber criminals’ favorite things to hack. Victims have included celebrities, news organizations, large corporations, and government organizations. According to research coducted by social media and digitial protection firm ZeroFOX, organizations typically lose up to 5% of their followers during an account takeover. For large brands, this can mean losing hundreds of thousands of followers. For smaller brands, each follower is hard earned and generally more valuable, making the loss sting that much more.
An unknown removable USB storage device picked up in a parking lot or restroom is almost expected to contain malware, but no so expected for devices provided from well-known and respected companies.