CISA released nine Industrial Control Systems (ICS) advisories on September 18, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

  • ICSA-25-261-01 Westermo Network Technologies WeOS 5
  • ICSA-25-261-02 Westermo Network Technologies WeOS 5
  • ICSA-25-261-03 Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit
  • ICSA-25-261-04 Hitachi Energy Asset Suite
  • ICSA-25-261-05 Hitachi Energy Service Suite
  • ICSA-25-261-06 Cognex In-Sight Explorer and In-Sight Camera Firmware
  • ICSA-25-261-07 Dover Fueling Solutions ProGauge MagLink LX4 Devices
  • ICSA-25-191-10 End-of-Train and Head-of-Train Remote Linking Protocol (Update C)
  • ICSA-24-030-02 Mitsubishi Electric FA Engineering Software Products (Update D)

CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.



Source link

admin

Share
Published by
admin

Recent Posts

CISA Releases Malware Analysis Report on Malicious Listener Targeting Ivanti Endpoint Manager Mobile Systems

Today, CISA released a Malware Analysis Report detailing the functionality of two sets of malware…

1 day ago

CISA Releases Eight Industrial Control Systems Advisories

CISA released eight Industrial Control Systems (ICS) advisories on September 16, 2025. These advisories provide…

3 days ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

1 week ago

CISA Releases Eleven Industrial Control Systems Advisories

CISA released eleven Industrial Control Systems (ICS) advisories on September 11, 2025. These advisories provide…

1 week ago

CISA Releases Fourteen Industrial Control Systems Advisories

CISA released fourteen Industrial Control Systems (ICS) advisories on September 9, 2025. These advisories provide…

1 week ago

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

2 weeks ago

This website uses cookies.