You are here

Cybersecurity

Yokogawa Vnet/IP Open Communication Driver (ICSA-19-003-02) – Products Used in the Energy Sector

The NCCIC has published an advisory on a resource management error vulnerability in Yokogawa Vnet/IP Open Communication Driver. Numerous products and versions of these products are affected. Successful exploitation of this vulnerability could allow an attacker to cause Vnet/IP network communications to controlled devices to become unavailable. Yokogawa recommends users of affected devices and versions update to the latest available release. The NCCIC also advises on a series of mitigating measures for this vulnerability.

Hetronic Nova-M (ICSA-19-003-03)

The NCCIC has published an advisory on an authentication bypass by capture-replay vulnerability. All versions prior to r161 are affected. Successful exploitation of this vulnerability could allow unauthorized users to view commands, replay commands, control the device, or stop the device from running. Hetronic recommends that all Nova-M users update their radio transmitters and receivers. The NCCIC also advises on a series of mitigating measures for this vulnerability. NCCIC/ICS-CERT.

Cryptojacking Isn’t Going Away

Cryptojacking refers to the practice of attackers harnessing the processing power of computers they don’t own to mine for cryptocurrency, such as Bitcoin or Monero. Cryptojacking’s popularity soared when cryptocurrencies hit their all-time highs in late 2017 and early 2018, and attackers adapted the malware used for these activities to go after mobile devices, cloud infrastrucuture, Internet of Things devices, and even operational technology (OT).

How the Federal Government’s Partial Shutdown Affects the Department of Homeland Security

The partial government shutdown that began on Saturday has resulted in furloughs for nearly 33,000 federal employees from the U.S. Department of Homeland Security (DHS), which represents about 13 percent of the organization’s approximately 245,000 person workforce. DHS’s law enforcement and emergency management functions are largely unaffected by the shutdown, with most employees exempt from furloughs at components like Customs and Border Protection, the Coast Guard, the Transportation Security Administration, and the Federal Emergency Management Agency, among others.

Rockwell Automation FactoryTalk Services Platform (ICSA-18-331-02) – Product Used in the Water and Wastewater Sector

The NCCIC has published an advisory on an improper input validation vulnerability in Rockwell Automation FactoryTalk Services Platform. Versions 2.90 and earlier are affected. Successful exploitation of this vulnerability could allow a remote attacker to diminish communications or cause a complete denial of service to the device. Rockwell Automation recommends that affected users update to the latest version of the application. The NCCIC also advises on a series of mitigating measures for these vulnerabilities.

Horner Automation Cscape (ICSA-18-354-01)

The NCCIC has published an advisory on an improper input validation vulnerability in Horner Automation Cscape. Versions 9.80.75.3 SP3 and prior are affected. Successful exploitation of this vulnerability could crash the device being accessed, allow the attacker to read confidential information, and may allow an attacker to remotely execute arbitrary code. Horner Automation recommends affected users update to the latest version of Cscape (Version 9.80 SP4). The NCCIC also advises on a series of mitigating measures for these vulnerabilities.

Pages

Subscribe to Cybersecurity