You are here

Cybersecurity

CISA Alert: Guidance on the North Korean Cyber Threat

The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has published an alert intended to serve as a comprehensive resource on the North Korean cyber threat. The U.S. Departments of State and the Treasury and the FBI also contributed to this product. Although much of the malicious activity described in the alert is targeted against the financial sector, the alert reminds its audience that North Korea has the capability to conduct disruptive or destructive cyber activities affecting U.S. critical infrastructure.

Intel Releases Security Advisories on Multiple Products - Updated April 14, 2020

April 14, 2020

Intel has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to gain escalation of privileges. CISA encourages users and administrators to review the following Intel advisories and apply the necessary updates or workarounds. Read the advisory at CISA.

March 10, 2020

Siemens TIM 3V-IE and 4R-IE Family Devices (ICSA-20-105-09) – Products Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on an active debug code vulnerability in Siemens TIM 3V-IE and 4R-IE Family Devices. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could allow an unauthenticated attacker with network access to gain full control over the device. Siemens has released updates for the affected products and recommends users update to the new version. CISA also recommends a series of measures to mitigate the vulnerability.

Siemens SIMOTICS, Desigo, APOGEE, and TALON (ICSA-20-105-06) – Products Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on a business logic errors vulnerability in Siemens SIMOTICS, Desigo, APOGEE, and TALON. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could allow an attacker to affect the availability and integrity of the device. Siemens recommends mitigations and workarounds for the affected products. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Siemens Climatix (ICSA-20-105-04)

CISA has published an advisory on cross-site scripting and basic XSS vulnerabilities in Siemens Climatix. All versions of Climatix POL908 (BACnet/IP module) and Climatix POL909 (AWM module) are affected. Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code to access confidential information without authentication. Siemens has identified specific workarounds and mitigations users can apply to reduce the risk. CISA also recommends a series of measures to mitigate the vulnerabilities.

Triangle MicroWorks SCADA Data Gateway (ICSA-20-105-03) – Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on stack-based buffer overflow, out-of-bounds read, and type confusion vulnerabilities in Triangle MicroWorks SCADA Data Gateway. Versions 2.41.0213 through 4.0.122 are affected. These vulnerabilities allow remote attackers to execute arbitrary code and disclose on affected installations of Triangle Microworks SCADA Data Gateway with DNP3 Outstation channels. Authentication is not required to exploit these vulnerabilities. Triangle Microworks recommends users update to Version 4.0.123.

Triangle MicroWorks DNP3 Outstation Libraries (ICSA-20-105-02) – Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on a stack-based buffer overflow vulnerability in Triangle MicroWorks DNP3 Outstation Libraries. Versions 3.16.00 through 3.25.01 are affected. Successful exploitation of this vulnerability could possibly allow remote attackers to stop the execution of code on affected equipment. Triangle Microworks recommends users update to Version 3.26. CISA also recommends a series of measures to mitigate the vulnerability. Read the advisory at CISA.

Pages

Subscribe to Cybersecurity