You are here

Cybersecurity

WECON PLC Editor (ICSA-20-310-01) - Product Used in the Water and Wastewater and Energy Sectors

CISA has published an advisory on stack-based buffer overflow and heap-based buffer overflow vulnerabilities in WECON PLC Editor. Versions 1.3.8 and prior are affected. Successful exploitation of these vulnerabilities could allow an attacker to execute code under the privileges of the application. WECON is aware of these vulnerabilities and is currently developing a solution. CISA also recommends a seried of measures to mitigate these vulnerabilities.

What Every CISO Should Ask about OT/ICS Security

It is not uncommon for OT/ICS cybersecurity to fall under the authority of IT. This isn’t necessarily a bad thing, unless IT is taking responsibility/action and lacks OT-specific knowledge. While many concepts can be drawn from IT security to help secure OT, many of the processes do not translate well. The opposite also presents a challenge, as many OT operators and engineers may not have cybersecurity experience. This is why it is imperative for both OT and IT cybersecurity teams to work together; however, that isn’t always as easy as it sounds.

CISA Assistant Director Message for Infrastructure Security Month

Acting Assistant Director for Infrastructure Security Steven Harris at the Cybersecurity and Infrastructure Security Agency (CISA) has authored a message for critical infrastructure partners on the occasion of Infrastructure Security Month. During this month, Harris encourages partners to refresh their infrastructure security knowledge and spread effective messages in their communities and to their stakeholders.

Threat Awareness - Continued Qakbot/Qbot Use in Current Malicious Email Campaigns

It is no surprise threat actors are notorious for using current events in social engineered phishing campaigns. Malwarebytes discovered a current malspam campaign exploiting doubts about the election process that is delivering Qbot/Qakbot – malware often found in conjunction with Emotet. According to Malwarebytes, this current campaign is stealing email threads to be used in future campaigns. The phish contains a bogus DocuSign document attachment purporting to include information on election interference.

ARC Informatique PcVue (ICSA-20-308-03)

CISA has published an advisory on deserialization of untrusted data, access to critical private variable via public method, and information exposure of sensitive information to an unauthorized actor vulnerabilities in ARC Informatique PcVue. PcVue Versions 8.10 to versions prior to 12.0.17 are affected. Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, expose sensitive data, and prevent legitimate users from connecting to PcVue services. ARC Informatique recommends upgrading PcVue to v12.0.17. CISA also recommen

NEXCOM NIO50 (ICSA-20-308-02)

CISA has published an advisory on improper input validation and cleartext transmission of sensitive information vulnerabilities in NEXCOM NIO50. All versions of NEXCOM NIO 50 are affected. Successful exploitation of these vulnerabilities could allow an attacker to view sensitive information and cause a denial-of-service condition due to improper input validation. NEXCOM no longer sells or maintains NIO 50 and considers it to be an end-of-life product. CISA also recommends a series of measures to mitigate the vulnerabilities.

WAGO Series 750-88x and 750-352 (ICSA-20-308-01) - Products Used in the Energy Sector

CISA has published an advisory on an uncontrolled resource consumption vulnerability in WAGO Series 750-88x and 750-352. A series of firmware versions prior to FW11 are affected. Successful exploitation of this vulnerability could allow an attacker to crash the device being accessed using a denial-of-service attack. WAGO recommends updating to the latest firmware, Version FW14. It also recommends other mitigations and workarounds to help reduce the risk. CISA also recommends a series of measures to mitigate the vulnerability.

Pages

Subscribe to Cybersecurity