You are here

Cybersecurity

ABB CP635 HMI (ICSA-19-178-03)

The NCCIC has published an advisory on use of hard-coded credentials vulnerability in ABB CP635 HMI. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could allow an attacker to prevent legitimate access to an affected system node, remotely cause an affected system node to stop, take control of an affected system node, or insert and run arbitrary code in an affected system node. ABB recommends users apply the BSP update on affected CP600 control panels at their earliest convenience.

ABB CP651 HMI (ICSA-19-178-02)

The NCCIC has published an advisory on use of hard-coded credentials vulnerability in ABB CP651 HMI. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could allow an attacker to prevent legitimate access to an affected system node, remotely cause an affected system node to stop, take control of an affected system node, or insert and run arbitrary code in an affected system node. ABB recommends users apply the BSP update on affected CP600 control panels at their earliest convenience.

ABB PB610 Panel Builder 600 (ICSA-19-178-01) – Product Used in the Water and Wastewater and Energy Sectors

The NCCIC has published an advisory on use of hard-coded credentials, improper authentication, relative path traversal, improper input validation, and stack-based buffer overflow vulnerabilities in ABB PB610 Panel Builder 600. PB610 Panel Builder 600, order code: 1SAP500900R0101, versions 1.91 to 2.8.0.367 and prior are affected.

Advantech WebAccess/SCADA (ICSA-19-178-05) – Product Used in the Water and Wastewater and Energy Sectors

The NCCIC has published an advisory on Path Traversal, Stack-based Buffer Overflow, Heap-based Buffer Overflow, Out-of-bounds Read, Out-of-bounds Write, and Untrusted Pointer Dereference vulnerabilities in Advantech WebAccess/SCADA. Versions 8.3.5 and prior are affected. Successful exploitation of these vulnerabilities may allow information disclosure, deletion of files, and remote code execution. Advantech has released Version 8.4.1 of WebAccess/SCADA to address the reported vulnerabilities. The NCCIC also advises of a series of measures for mitigating the vulnerabilities.

DHS CISA Announces Relaunch of Integrated Website

The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) has announced the relaunch of the newly integrated us-cert.gov website. The new site consolidates us-cert.gov, which focused primarily on IT issues (e.g., tips and best practices for secure computing), and ics-cert.us-cert.gov, which addressed ICS topics (e.g., OT device vulnerabilities).

NIST Releases Report on Managing IoT Risks

The National Institute of Standards and Technology (NIST) has released the Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks report. The report observes that many organizations are not necessarily aware of the large number of IoT devices they are already using and how IoT devices may affect cybersecurity and privacy risks differently than conventional information technology (IT) devices do.

DHS Advisory on Iranian Cyber Activity

As discussed in an email WaterISAC sent to members on June 24, Chris Krebs, the director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), issued an advisory indicating his agency is aware of “a recent rise in malicious cyber activity directed at United States industries and government agencies by Iranian regime actors and proxies.” Krebs highlighted “destructive ‘wiper’ attacks” as a type of activity these threat actors are usin

Cybersecurity Emerging as a Business Driver

According to a new report from cybersecurity company Radware, company executives now recognize cybersecurity as a key business driver as demonstrated by the increasing amount of attention and effort they’re dedicated to the topic. Radware reported that 98 percent of executives claim some management responsibility for cybersecurity, with 72 percent indicating that information security is an agenda item for every board meeting.

DHS Email Phishing Scam

The Cybersecurity and Infrastructure Security Agency (CISA) reports it is aware of an email phishing scam that tricks users into clicking on malicious attachments that look like legitimate Department of Homeland Security (DHS) notifications (CISA is part of DHS). The email campaign uses a spoofed email address to appear like a National Cyber Awareness System (NCAS) alert and lure targeted recipients into downloading malware through a malicious attachment.

Pages

Subscribe to Cybersecurity