You are here

Cybersecurity

Siemens SINUMERIK (ICSA-20-161-06) – Products Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on buffer underflow, heap-based buffer overflow, improper initialization, out-of-bounds read, stack-based buffer overflow, access of memory location after end of buffer, off-by-one error, improper null termination, and improper initialization vulnerabilities in Siemens SINUMERIK products. The vulnerabilities affect numerous versions of SINUMERIK products. Successful exploitation of these vulnerabilities could allow remote code execution, information disclosure, and denial-of-service attacks under certain conditions.

Siemens LOGO! (ICSA-20-161-03) – Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on a missing authentication for critical function vulnerability in Siemens LOGO! All versions of LOGO!8 BM (including SIPLUS variants) are affected. Successful exploitation of this vulnerability could allow an attacker to read and modify device configurations and obtain project files from affected devices. Siemens recommends applying defense-in-depth concepts, including the protection concept outlined in the system manual. CISA also recommends a series of measures to mitigate the vulnerability.

Advantech WebAccess Node (ICSA-20-161-01) – Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on a stack-based buffer overflow vulnerability in Advantech WebAccess Node. Versions 8.4.4 and prior are affected. Successful exploitation of this vulnerability could crash the application being accessed; a buffer overflow condition may allow remote code execution. Advantech has released a patch to address the reported vulnerability. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Microsoft Releases June 2020 Security Updates

Microsoft has released its monthly update to address vulnerabilities in its software. For this month, Microsoft has released security updates for Microsoft Windows, Microsoft Edge (EdgeHTML and Chromium-based in IE Mode), ChakraCore, Internet Explorer, Microsoft Office and Microsoft Office Services and Web Apps, Windows Defender, Microsoft Dynamics, Visual Studio, Azure DevOps, HoloLens, Adobe Flash Player, Apps for Android, Windows App Store, System Center, and Android Center.

CERT/CC Reports Vulnerability in Universal Plug and Play Protocol

The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) advised that the CERT Coordination Center (CERT/CC) has released information on a vulnerability – CVE-2020-12695 – affecting versions of the Universal Plug and Play (UPnP) protocol released before April 17, 2020. UPnP protocol allows networked devices to discover and connect with each other. A remote attacker could exploit this vulnerability to cause a distributed denial-of-service condition.

BEC Scams Represent a Disproportionately High Financial Risk

According to an article from Threatpost, BEC attacks in general represent a small portion of the total “email attack pie,” constituting just five percent of this activity overall. And yet, they disproportionately represent the greatest financial risk. Having led to $26 billion in losses for organizations and individuals over the past three years according to the FBI’s Internet Crime Complaint Center (IC3). Unfortunately, losses from water and wastewater utilities are included in those figures, with WaterISAC continuing to receive reports of these attacks affecting the sector.

Using the “Bow Tie Model” to Assess OT Security Impacts Due to COVID-19

As nearly every organization across the globe experienced significant disruptions from COVID-19, critical infrastructure security firm Applied Risk references the Bow Tie Model to assess eight major areas of impact that most likely affected OT operations. Applied Risk discusses threats, access and control monitoring, network segmentation, business continuity, third party security, training and awareness, risk analysis, and residual risk. Look familiar?

Unpatched Microsoft Systems Vulnerable to CVE-2020-0796

The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) is aware of publicly available and functional proof-of-concept (PoC) code that exploits CVE-2020-0796 in unpatched systems. Although Microsoft disclosed and provided updates for this vulnerability in March 2020, malicious cyber actors are targeting unpatched systems with the new PoC, according to recent open-source reports.

SWARCO CPU LS4000 (ICSA-20-154-06)

CISA has published an advisory on an improper access control vulnerability in SWARCO CPU LS4000. All OS versions starting with G4 are affected. Successful exploitation of this vulnerability could allow access to the device and disturb operations with connected devices. SWARCO has released a patch to fix the vulnerability and close the port. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

GE Grid Solutions Reason RT Clocks (ICSA-20-154-05) – Products Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on a missing authentication for critical function vulnerability in GE Grid Solutions Reason RT Clocks. For RT430, RT431, and RT434, all firmware versions prior to 08A05 are affected. Successful exploitation of this vulnerability could allow access to sensitive information, execution of arbitrary code, and cause the device to become unresponsive. GE strongly recommends users of time synchronization products update their units to firmware Version 08A05 or greater to resolve these issues. It also recommends a series of mitigation measures.

Pages

Subscribe to Cybersecurity