You are here

Cybersecurity

Two New Supply Chain Attacks Revealed

Over the past week, two supply-chain attacks have come to light. The first involves VestaCP, a control-panel interface that system administrators use to manage servers. According to security firm Eset, unknown attackers compromised VestaCP servers and used their access to make a malicious change to an installer that was available for download. “The VestaCP installation script was altered to report back generated admin credentials to vestacp.com after a successful installation,” said ESET Malware Researcher Marc-Étienne M.Léveillé.

Cybersecurity Risk and Responsibility in the Water Sector (AWWA)

The American Water Works Association's (AWWA's) Cybersecurity Risk & Responsibility in the Water Sector report seeks to help water utilities understand their cybersecurity risks and what they can do to address them. In addition to discussing the significant risks cyber poses to water utilities, which involves a review of some of the most notable cyber incidents involving the sector, the report also addresses less discussed but nonetheless important aspects of cybersecurity.

GAIN Electronic Co. Ltd SAGA1-L Series (ICSA-18-296-02)

The NCCIC has released an advisory about authentication bypass by capture-replay, improper access control, and improper authentication vulnerabilities in GAIN Electronic Co. Ltd SAGA1-L Series. All firmware versions prior to A0.10 are affected. Successful exploitation of these vulnerabilities could allow remote code execution and potentially delete the product’s firmware. GAIN Electronic Co. Ltd has recommended that users update to firmware version A0.10. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

Telecrane F25 Series (ICSA-18-296-03)

The NCCIC has released an advisory on an authentication bypass by capture-replay vulnerability in Telecrane F25 series. All versions prior to 00.0A are affected. Successful exploitation of this vulnerability could allow unauthorized users to view commands, replay commands, control the device, or stop the device from running. Telecrane recommends upgrading to the latest firmware. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

Advantech WebAccess (ICSA-18-296-01) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC has released an advisory on stack-based buffer overflow, external control of file name or path, improper privilege management, and path traversal vulnerabilities in Advantech WebAccess. Versions 8.3.1 and prior are affected. Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, access files and perform actions at a privileged level, or delete files on the system. Advantech has released Version 8.3.3 of WebAccess to address the reported vulnerabilities.

National Cybersecurity Awareness Month: Safeguarding the Nation’s Infrastructure Needs to Be “Our Shared Responsibility”

The theme for this week of National Cybersecurity Awarness Month is “Critical Infrastructure Cybersecurity,” for which the National Cyber Security Alliance (NCSA) is seeking to raise awareness of the important role individuals and organizations play in helping to protect the assets and systems we depend upon. “NCSA, [the U.S. Department of Homeland Security], and thousands of supporters are committed to reiterating the message that everyone shares a role in protecting cyberspace.

Pages

Subscribe to Cybersecurity