You are here

Cybersecurity

NetComm Wireless 4G LTE Light Industrial M2M Router (ICSA-18-221-02)

The NCCIC has released an advisory on information exposure, cross-site request forgery, cross-site scripting, and information exposure through directory listing vulnerabilities in NetComm Wireless 4G LTE Light Industrial M2M Router. Versions 2.0.29.11 and prior of this product are affected. Successful exploitation of these vulnerabilities could allow for the exposure of sensitive information. NetComm Wireless has released a new firmware version to mitigate the vulnerabilities.

Crestron TSW-X60 and MC3 (ICSA-18-221-01)

The NCCIC has released an advisory on OS command injections, improper access control, and insufficiently protected credentials vulnerabilities in Creston TSW-X60 and MC3. For TSW-X60, all versions prior to 2.001.0037.001 are affected. For MC3, all versions prior to 1.502.0047.001 are affected. Successful exploitation of these vulnerabilities may allow remote code execution with escalated system privileges. Crestron recommends users upgrade their devices to the newest firmware.

Social Engineering – It’s About People and Processes

Social engineering is commonplace, convincing, and requires continuous consideration. Dr. Larry Ponemon, founder and chairman of Ponemon Institute, discusses the ever-present social engineering threats. He covers three key elements of every organization’s cybersecurity program – people, processes, and technology – and how they fit into combatting these threats.

DHS Launches New Insider Threat Mitigation Website for the Critical Infrastructure Community

In direct response to inquiries from stakeholders, DHS/NPPD launched a new website today focused on providing the critical infrastructure community with information on the principles of insider threat mitigation. The website is dedicated to assisting organizations in establishing internal capabilities to mitigate insider threats focused on a variety of topics, including ideology, workplace violence, and cybersecurity.

Delta Electronics CNCSoft and ScreenEditor (ICSA-18-219-01)

The NCCIC has released an advisory regarding multiple stack-based buffer overflows, and out-of-bounds read vulnerabilities affecting Delta Electronics CNCSoft and ScreenEditor products. CNCSoft Version 1.00.83 and prior, and the accompanying, ScreenEditor Version 1.00.54 are affected. Exploitation of both vulnerabilities cause the software to crash due to the failure to validate user input. Currently there are no known public exploits; however, this vulnerability is remotely exploitable, and could be successfully exploited by an attacker with a low skill level.

Pages

Subscribe to Cybersecurity