NXP Semiconductors MQX RTOS (Update A) (ICSA-17-285-04A) - Updated February 1, 2018
February 1, 2018
ICS-CERT has updated this advisory with additional details about mitigating the vulnerability. ICS-CERT.
October 17, 2017
February 1, 2018
ICS-CERT has updated this advisory with additional details about mitigating the vulnerability. ICS-CERT.
October 17, 2017
ICS-CERT has released an advisory on a Siemens TeleControl Server Basic vulnerability. Versions prior to V3.1 are affected. Successful exploitation of these vulnerabilities could allow for escalation of privileges to perform administrative actions. Siemens recommends that users install the latest version of TeleControl Server Basic. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.
ICS-CERT has released an advisory on a PHOENIX CONTACT mGuard vulnerability. Versions 7.2 to 8.6.0 are affected. Successful exploitation of this vulnerability could allow for an attacker to modify firmware update packages. PHOENIX CONTACT recommends that affected users upgrade to firmware version 8.6.1. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.
ICS-CERT has released an advisory on a Nari PCS-9611 vulnerability. All versions of the PCS-9611 relay, a control and monitoring unit, are affected. Successful exploitation of this vulnerability could allow a remote attacker arbitrary read/write abilities on the system. NCCIC has reached out to Nari and CNCERT but has not received a response. In the meantime, ICS-CERT recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.
ICS-CERT has released an advisory on an Advantech WebAccess/SCADA vulnerability. Versions prior to V8.2_20170817 are affected. Successful exploitation of these vulnerabilities could allow sensitive information to be disclosed from the target or database without authentication. Advantech has released version 8.3.0 of WebAccess/SCADA to address the reported vulnerabilities. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability.
ICS-CERT has released an advisory on a WECON Technology Co., Ltd. LeviStudio HMI Editor vulnerability. LEVI Studio HMI Editor v1.8.29 and prior versions are affected. Successful exploitation of these vulnerabilities may result in arbitrary code execution. WECON recommends that users update to the latest version. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.
ICS-CERT has released an advisory on a Moxa MXview vulnerability. MXview v2.8 and prior versions are affected. Successful exploitation of this vulnerability could allow a local authorized user with file access to escalate privileges by inserting arbitrary code into the unquoted service path. Moxa has produced new firmware Version 2.9 for the affected devices. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability. ICS-CERT.
ICS-CERT has released an advisory on a PHOENIX CONTACT FL SWITCH vulnerability. All FL SWITCH 3xxx, 4xxx, and 48xxx products running firmware Version 1.0 to 1.32 are affected. Successful exploitation of these vulnerabilities may allow an unauthenticated remote attacker to gain administrative privileges and expose information to unauthenticated users. PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability.
January 11, 2018
ICS-CERT has updated this advisory with additional details about the vulnerability. ICS-CERT.
January 4, 2018
ICS-CERT has released an advisory on a Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers vulnerability. Multiple versions of this product are affected. Successful exploitation of this vulnerability could cause the device that the attacker is accessing to become unresponsive to Modbus TCP communications and affect the availability of the device. Rockwell Automation encourages affected users to upgrade to the latest version of available firmware, FRN 21.003. ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of this vulnerability.