CISA released nine Industrial Control Systems (ICS) advisories on February 4, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

  • ICSA-25-035-01 Western Telematic Inc NPS Series, DSM Series, CPM Series
  • ICSA-25-035-02 Rockwell Automation 1756-L8zS3 and 1756-L3zS3
  • ICSA-25-035-03 Elber Communications Equipment
  • ICSA-25-035-04 Schneider Electric Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC
  • ICSA-25-035-05 Schneider Electric Web Designer for Modicon
  • ICSA-25-035-06 Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H
  • ICSA-25-035-07 Schneider Electric Pro-face GP-Pro EX and Remote HMI
  • ICSA-25-035-08 AutomationDirect C-more EA9 HMI
  • ICSA-23-299-03 Ashlar-Vellum Cobalt, Graphite, Xenon, Argon, Lithium (Update A)

CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.



Source link

admin

Share
Published by
admin

Recent Posts

CISA Releases Six Industrial Control Systems Advisories

CISA released six Industrial Control Systems (ICS) advisories on February 6, 2025. These advisories provide…

1 day ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active…

2 days ago

Trimble Releases Security Updates to Address a Vulnerability in Cityworks Software

CISA is collaborating with private industry partners to respond to reports of exploitation of a…

3 days ago

CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA has added five vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active…

4 days ago

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of…

5 days ago

CISA Adds Four Known Exploited Vulnerabilities to Catalog

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of…

6 days ago

This website uses cookies.