You are here

Cybersecurity

Honeywell Mobile Computers with Android Operating Systems (ICSA-18-256-01) – Product Used in the Energy Sector

The NCCIC has released an advisory on an improper privilege vulnerability in Honeywell Mobile Computers with Android Operating Systems. Numerous versions are affected. A vulnerability in a system service on CT60, CN80, CT40, CK75, CN75, CT50, D75e, CN51, and EDA series mobile computers running the Android Operating System (OS) could allow a malicious third-party application to gain elevated privileges. Honeywell has released software updates that resolve this vulnerability. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability.

What is Vulnerability Management Anyway?

The vulnerability management process is a continuous information security risk undertaking that requires management oversight. There are four high-level processes that encompass vulnerability management: discovery, reporting, prioritization, and response. Vulnerability management is only one piece of a security program. It’s not going to solve the entire risk management challenge. You have to start with a comprehensive understanding of what’s on your network. If you don’t know it’s there, there’s no way you can protect it.

Implementing a Risk-Based Approach to Vulnerability Management

In a recently published report, cybersecurity company Gartner advocates for a risk-based approach to vulnerability management that correlates asset value, the severity of the vulnerabilities, and threat actor activity. As discussed by an analyst from IBM who reviewed the report, one of the biggest challenges plaguing security teams worldwide is figuring out which vulnerabilities, out of the multitude that are uncovered daily, to remediate first.

Fuji Electric V-Server Lite (ICSA-18-254-02)

The NCCIC has released an advisory on a classic buffer overflow vulnerability in Fuji Electric V-Server Lite. V-Server Lite 4.0.3.0 and prior are affected. Successful exploitation of this vulnerability could allow a remote attacker to view sensitive information and disrupt the availability of the device. Fuji Electric has released Version 4.0.4.0 of the software. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

Fuji Electric V-Server (ICSA-18-254-01)

The NCCIC has released an advisory on use-after free, untrusted pointer dereference, heap-based buffer overflow, out-of-bounds write, integer underflow, out-of-bounds read, and stack-based buffer overflow vulnerabilities in Fuji Electric V-Server. V-Server VPR 4.0.3.0 and prior are affected. Successful exploitation of these vulnerabilities could allow for remote code execution on the device, causing a denial of service condition or information exposure. Fuji Electric has released Version 4.0.4.0 of the software.

Siemens SCALANCE X Switches (ICSA-18-254-05) - Product Used in the Water and Wastewater and Energy Sectors

The NCCIC has released an advisory on an improper input validation vulnerability in Siemens SCALANCE X Switches. For SCALANCE X300 and X408, all versions prior to 4.0.0 are affected. For SCALANCE X414, all versions are affected. Successful exploitation of this vulnerability could allow an attacker with network access to the device to cause a denial-of-service condition. Siemens provides updates for SCALANCE X300, and SCALANCE X408, and provides mitigations for the SCALANCE X414.

Siemens SIMATIC WinCC OA (ICSA-18-254-04) – Product Used in the Water and Wastewater and Energy Sectors

The NCCIC has released an advisory on an uncontrolled search path element vulnerability in Siemens SIMATIC WinCC OA. SIMATIC WinCC OA Version 3.14 and prior are affected. Successful exploitation of this vulnerability could allow an unauthenticated remote user to escalate their privileges in the context of the program. Siemens recommends updating to SIMATIC WinCC OA v3.14-P021 and a series of manual mitigations to reduce risks. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

Siemens TD Keypad Designer (ICSA-18-254-03) – Product Used in the Water and Wastewater and Energy Sectors

The NCCIC has released an advisory on an uncontrolled search path element vulnerability in Siemens TD Keypad Designer. All versions of this product are affected. Successful exploitation of this vulnerability could allow a local low-privileged attacker to escalate their privileges. Siemens has identified specific workarounds and mitigations that users can apply to reduce the risk. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

Pages

Subscribe to Cybersecurity