You are here

nccic

Advantech WebAccess HMI Designer (ICSA-18-114-03) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC has released an advisory on vulnerabilities in Advantech WebAccess HMI Designer. Versions 2.1.7.32 and earlier are affected. Successful exploitation of these vulnerabilities may allow an attacker to remotely execute arbitrary code. The NCCIC is working with Advantech to provide mitigation steps to resolve the issues. In the meantime, the NCCIC recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities. NCCIC/ICS-CERT.

Intel 2G Modem (ICSA-18-114-02)

The NCCIC has released an advisory on vulnerabilities in Intel 2G modem. A series of Intel and Sofia products that use the Intel 2G modem are affected. Successful exploitation of this buffer overflow vulnerability may allow remote code execution. Intel is making firmware updates available to device manufacturers that protect systems from this vulnerability. The NCCIC recommends customers should check with their device manufacturers and apply any available updates as soon as practical.

Tags: 
nccic ics-cert intel

Rockwell Automation Stratix Industrial Managed Ethernet Switch (ICSA-18-107-05) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC/ICS-CERT has released an advisory on vulnerabilities in Rockwell Automation Stratix Industrial Managed Ethernet Switch. Allen-Bradley Stratix 8300 Industrial Managed Ethernet Switches, versions 15.2(4a)EA5 and earlier, are affected. Successful exploitation of these vulnerabilities could result in loss of availability, confidentiality, and/or integrity caused by memory exhaustion, module restart, information corruption, and/or information exposure. Rockwell Automation has released knowledge base article 1073315 and recommends implementing a series of mitigations.

Rockwell Automation Stratix and ArmorStratix Switches (ICSA-18-107-04) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC/ICS-CERT has released an advisory on vulnerabilities in Rockwelll Automation Stratix and ArmorStratix Switches. Numerous versions of these products are affected. Successful exploitation of these vulnerabilities could result in loss of availability, confidentiality, and/or integrity caused by memory exhaustion, module restart, information corruption, and/or information exposure. Rockwell Automation recommends users upgrade to FRN 15.2(6)E1 or later.

Rockwell Automation Stratix Services Router (ICSA-18-107-03) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC/ICS-CERT has released an advisory on vulnerabilities in Rockwelll Automation Stratix Services Router. Allen-Bradley Stratix 5900 Services Router, versions 15.6.3M1 and earlier, are affected. Successful exploitation of these vulnerabilities could result in loss of availability, confidentiality, and/or integrity caused by memory exhaustion, module restart, information corruption, and/or information exposure.

Schneider Electric InduSoft Web Studio and InTouch Machine Edition (ICSA-18-107-01) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC/ICS-CERT has released an advisory on vulnerabilities in Schneider Electric InduSoft Web Studio and InTouch Machine Edition. InduSoft Web Studio v8.1 and prior versions and InTouch Machine Edition 2017 v8.1 and prior versions are affected. Successful exploitation of this vulnerability during tag, alarm, or event related actions could allow remote code execution that, under high privileges, could completely compromise the device.

Yokogawa CENTUM and Exaopc (ICSA-18-102-01) – Products Used in the Energy Sector

The NCCIC/ICS-CERT has released an advisory on a vulnerability in Yokogawa CENTUM series and Exaopc. Multiple versions of this product are affected. Successful exploitation of this vulnerability could allow a local attacker to generate false system or process alarms, or block system or process alarm displays. Yokogawa has produced mitigations for the affected products. The NCCIC/ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

Omron CX-One (ICSA-18-100-02)

The NCCIC/ICS-CERT has released an advisory on vulnerabilities in Omron CX-One. Multiple versions of this product are affected. Successful exploitation of these vulnerabilities could allow remote code execution. Omron has released an updated version of CX-One to address the reported vulnerabilities. The NCCIC/ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities. NCCIC/ICS-CERT.

Tags: 
nccic ics-cert omron

ATI Systems Emergency Mass Notification Systems (ICSA-18-100-01)

The NCCIC/ICS-CERT has released an advisory on vulnerabilities in ATI’s Emergency Mass Notification System. The HPSS16, HPSS32, MHPSS, and ALERT 400 devices are affected. Improper authentication vulnerability caused by specially crafted malicious radio transmissions may allow an attacker to remotely trigger false alarms. ATI has created a patch which adds additional security features to the command packets sent over the radio. Additionally, ATI recommends that, where feasible, simple voice radios be replaced with digital P-25 (APCO) radios, which provide highly secure encrypted links.

Tags: 
nccic ics-cert

LCDS Leão Consultoria e Desenvolvimento de Sistemas Ltda ME LAquis SCADA (ICSA-18-095-03) – Products Used in the Water and Wastewater and Energy Sectors

The NCCIC/ICS-CERT has released an advisory on a vulnerability in LCDS Leão Consultoria e Desenvolvimento de Sistemas Ltda ME LAquis SCADA. LAquis SCADA software versions 4.1.0.3391 and prior are affected. Successful exploitation of this vulnerability could cause the device an attacker is accessing to crash, resulting in a structured exception handler overflow condition, which may allow code execution. LCDS recommends that users update to version 4.1.0.3774. The NCCIC/ICS-CERT also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities.

Pages

Subscribe to nccic