You are here

Cybersecurity

Schneider Electric StruxureOn Gateway (ICSA-18-046-04) – Product Used in the Energy Sector

ICS-CERT has released an advisory on a Schneider Electric StruxureOn Gateway vulnerability. All versions prior to 1.2 are affected. Successful exploitation of this vulnerability could allow a remote attacker to upload a malicious file to any directory on the device, which could lead to remote code execution. Schneider Electric has released a new version of the software. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.

Tags: 
ics-cert

Schneider Electric IGSS Mobile (ICSA-18-046-03) – Product Used in the Energy Sector

ICS-CERT has released an advisory on a Schneider Electric IGSS Mobile vulnerability. All versions including and prior to 3.01 of IGSS Mobile for Android and IGSS Mobile for iOS are affected. Successful exploitation of these vulnerabilities could allow an attacker to execute a man-in-the-middle attack. In addition, passwords can be accessed by unauthorized users. An update for Android with the fix for these vulnerabilities is available for download on Google Play.

GE D60 Line Distance Relay (ICSA-18-046-02) – Product Used in the Energy Sector

ICS-CERT has released an advisory on a GE D60 Line Distance Relay vulnerability. D60 devices running firmware Version 7.11 and prior are affected. Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code on the device. GE has released firmware that addresses the vulnerabilities. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.

Tags: 
ics-cert ge

Nortek Linear eMerge E3 Series (ICSA-18-046-01)

ICS-CERT had released an advisory on a Nortek Linear eMerge E3 Series vulnerability. Linear eMerge E3 series Versions V0.32-07e and prior are affected. Successful exploitation of this vulnerability could allow a remote attacker to execute malicious code on the system with elevated privileges, allowing for full control of the server. Nortek recommends that affected users upgrade by following the process outlined on Page 47 of the E3 User Programming Guide. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability.

Tags: 
ics-cert nortek

Schneider Electric IGSS SCADA Software (ICSA-18-044-02) – Product Used in the Energy Sector

ICS-CERT has released an advisory on a Schneider Electric IGSS SCADA Software vulnerability. IGSS SCADA Software V12 and all previous versions are affected. Successful exploitation of this vulnerability could cause the device the attacker is accessing to crash or execute arbitrary code. Schneider Electric has provided IGSS SCADA Software V13 to address this vulnerability.  ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability.

WAGO PFC200 Series (ICSA-18-044-01) – Product Used in the Energy Sector

ICS-CERT has released an advisory on a WAGO PFC200 Series vulnerability. Numerous versions of this product are affected. Successful exploitation of this vulnerability could allow a remote attacker unauthorized access to the PLC to perform operations on the file system without authentication. WAGO released a security patch with FW11. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.

Tags: 
ics-cert wago

3S-Smart Software Solutions GmbH CODESYS Web Server (ICSA-18-032-02) – Product Used in the Energy Sector

ICS-CERT has released an advisory on a 3S-Smart Software Solutions GmbH CODESYS Web Server vulnerability. All Microsoft Windows (also WinCE) based CODESYS web servers running stand-alone Version 2.3, or as part of the CODESYS runtime system running prior to Version V1.1.9.19, are affected. Successful exploitation of this vulnerability could cause the device the attacker is accessing to crash, resulting in a buffer overflow condition that may allow remote code execution.

Fuji Electric V-Server VPR (ICSA-18-032-01)

ICS-CERT has released an advisory on a Fuji Electric V-Server VPR vulnerability. Versions 4.0.1.0 and prior are affected. Successful exploitation of this vulnerability could allow a remote attacker to view sensitive information and disrupt the availability of the device. Fuji Electric has produced firmware 4.0.3.0. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.

Pages

Subscribe to Cybersecurity