You are here

Cybersecurity

GE S2020/S2020G Fast Switch 61850 (ICSA-19-351-01) – Product Used in the Energy Sector

CISA has published an advisory on a cross-site scripting vulnerability in GES2020/S2020G Fast Switch 61850. Versions 07A03 and prior are affected. Successful exploitation of this vulnerability may allow an attacker to inject arbitrary code and allow disclosure of sensitive data. GE produced and released Version 07A04, which fixes the vulnerability. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

“Ransomware Attacks Are Now Data Breaches:” Criminals Threaten to Identify Victims and Release Data

In the last few days, the cyber criminals behind the Maze ransomware created a public website where they identify their victims who have chosen to rebuild their operations rather than yield to the ransom demands. The move is part of the criminals’ signaling that they will publish the data stolen from their victims if they don’t pay. “For years, ransomware developers and affiliates have been telling victims that they must pay the ransom or stolen data would be publicly released,” said cybersecurity researcher and BleepingComputer founder Lawrence Adams.

Omron PLC CJ, CS and NJ Series (ICSA-19-346-03)

CISA has published an advisory on an improper restriction of excessive authentication attempts vulnerability in Omron PLC CJ, CS and NJ. All versions of all three products are affected. Successful exploitation of this vulnerability could allow an attacker to brute force login credentials, obtain unauthorized access of the system, and may allow an attacker unauthorized access to the FTP interface. Omron offers some measures to mitigate the mitigate the vulnerabilities. CISA also recommends a series of measures to mitigate the vulnerability.

Omron PLC CJ and CS Series (ICSA-19-346-02)

CISA has published an advisory on authentication bypass by spoofing, authentication bypass by capture-replay, and unrestricted externally accessible lock vulnerabilities in Omron PLC CJ and CS Series. All versions of both products are affected. Successful exploitation of this vulnerability may allow remote code execution. Omron offers some measures to mitigate the mitigate the vulnerabilities. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Advantech DiagAnywhere Server (ICSA-19-346-01) – Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on a stack-based buffer overflow vulnerability in Advantech DiagAnywhere Server. Versions 3.07.11 and prior are affected. Successful exploitation of this vulnerability may allow remote code execution. Advantech has phased out DiagAnywhere Server Version 3.07.11 and removed it from its website. It has released Version 3.07.14 of DiagAnywhere Server to address the reported vulnerability. CISA also recommends a series of measures to mitigate the vulnerability.

Ten Tips to Securely Configure Your New Devices

Whether by taking advantage of retailers’ discounts or through gifting from family members or friends, many people will be the recipients of new cyber gadgets by the end of the present holiday season. Many of these people, in turn, will take these devices (particularly the mobiles ones) into their workplaces, potentially transferring any vulnerabilities they may have to their organizations. With this consideration in mind, WaterISAC encourages its members to review list of ten tips for securely configuring new devices from its partner, MS-ISAC.

Siemens SIMATIC S7-1200 and S7-1500 CPU Families (ICSA-19-344-06) – Products Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on use of a broken or risky cryptographic algorithm and missing support for integrity check vulnerabilities in Siemens S7-1200 and S7-1500 CPU Families. Multiple versions of multiple products are affected. Successful exploitation of these vulnerabilities may allow an attacker to modify network traffic or impact the perceived integrity of the user program stored on the CPU. Siemens has released updates for some of the products and recommends users update to the new versions.

Siemens XHQ Operations Intelligence (ICSA-19-344-05) – Product Used in the Energy Sector

CISA has published an advisory on cross-site request forgery, improper neutralization of script-related HTML tags in a web page, and improper input validation vulnerabilities in Siemens XHQ Operations Intelligence products. All versions of the product are affected. Successful exploitation of these vulnerabilities could allow an attacker to read or modify contents of the web application. Siemens recommends users update XHQ Operations Intelligence product line to v6.0.0.2 or later. CISA also recommends a series of measures to mitigate the vulnerability.

Pages

Subscribe to Cybersecurity