You are here

Cybersecurity

MB connect line mbCONNECT24, mymbCONNECT 24 (ICSA-20-273-01)

CISA has published an advisory on SQL injection, cross-site request forgery, and command injection vulnerabilities in MB connect line mbCONNECT24 and mymbCONNECT 24. For both products, versions 2.6.1 and prior are affected. Successful exploitation of these vulnerabilities could allow a remote attacker to gain unauthorized access to arbitrary information or allow remote code execution. MB connect line recommends users update mymbCONNECT24 and mbCONNECT24 to Version 2.6.2 or higher. CISA also recommends a series of measures to mitigate the vulnerabilities.

B&R Automation SiteManager and GateManager (ICSA-20-273-03) – Products Used in the Energy Sector

CISA has published an advisory on path traversal, uncontrolled resource consumption, information exposure, improper authentication, and information disclosure vulnerabilities in B&R Automation SiteManager and GateManager. Numerous versions of these products are affected. Successful exploitation of these vulnerabilities could allow for arbitrary information disclosure, manipulation, and a denial-of-service condition. B&R Industrial Automation reports the vulnerabilities have been fixed in other versions. CISA also recommends a series of measures to mitigate the vulnerabilities.

Yokogawa WideField3 (ICSA-20-273-02) – Product Used in the Energy Sector

CISA has published an advisory on a buffer copy without checking size of input vulnerability in Yokogawa WideField3. WideField3 R1.01 – R4.-3 are affected. Successful exploitation of this vulnerability could terminate the program abnormally. Yokogawa has prepared revision R4.04 to address this vulnerability and recommends that users switch to this revision. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

The ICS Cyber Risk Management Trifecta

They say “knowledge is power.” Therefore, knowing what assets you have, knowing where your vulnerabilities are (and fixing them), and knowing how to handle an incident and respond when your assets are compromised and vulnerabilities are exploited would seem to be a powerful advantage in cyber risk management. We know these are not the only programs for a successful ICS cyber risk management strategy, but one could argue they are foundational.

Apple Releases Security Updates - Updated September 25, 2020

September 25, 2020

Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review the Apple security pages for the following products and apply the necessary updates. Read the advisory at CISA.

September 17, 2020

What’s Good for the Grid is Good for the Groundwater

Pardon the stretch for the purpose of the title; I hope the spirit with which it was intended is somewhat appreciated. In a blog post at Tenable yesterday, Marty Edwards highlighted how current work from the Cybersecurity and Infrastructure Security Agency (CISA), along with three recently proposed bills should have positive cross-sector benefits. While the proposed bills are specific to grid security and resilience, Mr. Edwards suggests their influence should improve cross-sector collaboration and information sharing.

Proactive Response and Recovery for OT

Whether consistently performed and maintained or not, there is little argument on the importance of being proactive with the NIST Cybersecurity Framework’s first 2 core principles of identification and protection. The OT integrity company PAS Global makes an interesting observation that the importance of proactive detection, response, and recovery are not as well-discussed or practiced in OT environments. PAS explains this assertion by highlighting a recent case that illustrates some failures and opportunities associated with being reactive vs.

Pages

Subscribe to Cybersecurity