CISA Releases Nine Industrial Control Systems Advisories


CISA released nine Industrial Control Systems (ICS) Advisories. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. 

  • ICSA-25-338-01 Mitsubishi Electric GX Works2
  • ICSA-25-338-02 MAXHUB Pivot
  • ICSA-25-338-03 Johnson Controls OpenBlue Mobile Web Application for OpenBlue Workplace
  • ICSA-25-338-04 Johnson Controls iSTAR
  • ICSA-25-338-05 Sunbird DCIM dcTrack and Power IQ
  • ICSA-25-338-06 SolisCloud Monitoring Platform
  • ICSA-25-338-07 Advantech iView
  • ICSA-25-148-03 Consilium Safety CS5000 Fire Panel (Update A)
  • ICSA-25-219-02 Johnson Controls FX Server, FX80 and FX90 (Update A)

CISA encourages users and administrators to review newly released ICS Advisories for technical details and mitigations. 



Source link

admin

Share
Published by
admin

Recent Posts

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

22 hours ago

CISA, Australia, and Partners Author Joint Guidance on Securely Integrating Artificial Intelligence in Operational Technology

CISA and the Australian Signals Directorate’s Australian Cyber Security Centre, in collaboration with federal and international…

2 days ago

PRC State-Sponsored Actors Use BRICKSTORM Malware Across Public Sector and Information Technology Systems

The Cybersecurity and Infrastructure Security Agency (CISA) is aware of ongoing intrusions by People’s Republic…

3 days ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

4 days ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

6 days ago

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

7 days ago

This website uses cookies.