Categories: US-Cert-Repository

CISA Releases 10 Industrial Control Systems Advisories


CISA released 10 Industrial Control Systems (ICS) advisories. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

  • ICSA-25-294-01 Rockwell Automation 1783-NATR
  • ICSA-25-294-02 Rockwell Automation Compact GuardLogix 5370
  • ICSA-25-294-03 Siemens SIMATIC S7-1200 CPU V1/V2 Devices
  • ICSA-25-294-04 Siemens RUGGEDCOM ROS Devices
  • ICSA-25-294-05 CloudEdge Online Cameras and App
  • ICSA-25-294-06 Raisecomm RAX701-GC Series
  • ICSMA-25-294-01 Oxford Nanopore Technologies MinKNOW
  • ICSA-25-035-07 Schneider Electric Pro-Face GP-Pro EX and Remote HMI (Update A)
  • ICSA-24-354-07 Schneider Electric Modicon Controllers (Update A)
  • ICSA-25-140-08 Schneider Electric Modicon Controllers (Update B)

CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.



Source link

admin

Share
Published by
admin

Recent Posts

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on…

3 days ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on…

5 days ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2026-3502 TrueConf Client…

1 week ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on…

1 week ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on…

2 weeks ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on…

2 weeks ago

This website uses cookies.