You are here

Cybersecurity

WaterISAC and Perch Security – Bringing Utilities Together to Fight Cybercrime

More and more water and wastewater utilities rely on advanced technology for plant automation and IT/OT convergence, a reality cyber criminals are not ignorant to. As such, commodity threats like ransomware and business email compromise (BEC), and sophisticated threats like Dragonfly are not uncommon occurrences in the water and wastewater sector. Sifting through the volumes of information on these and other potential threats to understand those that actually represent risks would entail a significant investment of time and resources for any organization.

Tags: 
perch

Geovap Reliance SCADA (ICSA-17-334-02) – Product Used in Water and Wastewater and Energy Sectors

ICS-CERT has released an advisory on a Geovap Reliance vulnerability. Reliance SCADA Version 4.7.3 Update 2 and prior versions are affected. Successful exploitation of this vulnerability could allow an unauthenticated attacker to inject arbitrary JavaScript in a specially crafted URL request that may allow for read/write access. To address this vulnerability, Geovap has released Version 4.7.3 Update 3 of the software. Additionally, ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of the vulnerability.

Siemens SWT3000 (ICSA-17-334-01) – Product Used in Energy Sector

ICS-CERT has released an advisory on a Siemens SWT3000 vulnerability. Multiple versions of this product are affected. Successful exploitation of these vulnerabilities under certain conditions may allow attackers to perform a denial-of-service attack. Siemens has provided updated firmware that fixes the vulnerabilities and recommends users update to the newest version. Additionally, ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of the vulnerability.

Tags: 
ics-cert siemens

Siemens SCALANCE W1750D, M800, and S615 (ICSA-17-332-01) – Product Used in Water and Wastewater and Energy Sectors

ICS-CERT has released an advisory on a Siemens SCALANCE W1750D, M800, and S615 vulnerability. All versions of these products are affected. Successful exploitation of these vulnerabilities could allow a remote attacker to crash the DNS service or execute arbitrary code by crafting malicious DNS responses. Siemens reports it is preparing updates for the affected products and recommends a series of mitigations. Additionally, ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of the vulnerability.

Tags: 
ics-cert siemens

PHOENIX CONTACT WLAN Capable Devices Using the WPA2 Protocol (ICSA-17-325-01)

ICS-CERT has released an advisory on a PHOENIX CONTACT WLAN capable devices using the WPA2 Protocol vulnerability. Numerous versions of these devices are affected. Successful exploitation of this vulnerability could allow an attacker to operate as a “man-in-the-middle” between a device and a wireless access point.

Siemens SICAM (ICSA-17-320-02) – Product Used in Energy Sector

ICS-CERT has released an advisory on a Siemens SICAM vulnerability. All versions of SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, DNPi00 are affected. Successful exploitation of these vulnerabilities could allow an unauthenticated remote attacker to execute arbitrary code. Siemens provides a series of steps to mitigate this vulnerability, which includes disabling the web server after commissioning. Additionally, ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of the vulnerability.

Tags: 
ics-cert siemens

Moxa Nport 5110, 5130, and 5150 (ICSA-17-320-01) – Product Used in Energy Sector

ICS-CERT has released an advisory on a Moxa Nport 5110, 5130, and 5150 vulnerability. Numerous versions of these products are affected. Successful exploitation of these vulnerabilities could allow for remote code execution on the device. Moxa has produced new firmware for the affected devices Additionally, ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of the vulnerability. ICS-CERT.

Tags: 
ics-cert moxa

Schneider Electric InduSoft Web Studio and InTouch Machine Edition (ICSA-17-313-02) – Product Used in the Water and Wastewater and Energy Sectors

ICS-CERT has released an advisory on a Schneider Electric InduSoft Web Studio and InTouch Machine Edition vulnerability. For InduSoft Web Studio, v8.0 SP2 Patch 1 and prior versions are affected; for InTouch Machine Edition, v8.0 SP2 Patch 1 and prior versions are affected. Successful exploitation of this vulnerability could allow a remote un-authenticated attacker to remotely execute code with high privileges. For both products, Schneider Electric recommends users upgrade to v8.1 as soon as possible.

Advantech WebAccess (ICSA-17-306-02) – Product Used in the Water and Wastewater and Energy Sectors

ICS-CERT has released an advisory on an Advantech WebAccess vulnerability. Versions of WebAccess prior to V8.2_20170817 are affected. Successful exploitation of these vulnerabilities may allow remote code execution. Advantech has released a new version of WebAccess to address the vulnerabilities. ICS-CERT.

ABB FOX515T (ICSA-17-304-01)

ICS-CERT has released an advisory on an ABB FOX515T vulnerability. FOX515T release 1.0 is affected. Successful exploitation of this vulnerability could allow for a local attacker to craft a malicious script that would enable retrieval of any file on the server. ABB reports that the product has been phased out and has reached obsolete status. No further maintenance is planned for the product. ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability.

Tags: 
ics-cert abb

Pages

Subscribe to Cybersecurity