CISA released seven Industrial Control Systems (ICS) advisories on August 12, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

  • ICSA-25-224-01 Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share
  • ICSA-25-224-02 Johnson Controls iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2
  • ICSA-25-224-03 Schneider Electric EcoStruxure Power Monitoring Expert
  • ICSA-25-224-04 AVEVA PI Integrator
  • ICSA-24-263-04 MegaSys Computer Technologies Telenium Online Web Application (Update A)
  • ICSA-25-191-10 End-of-Train and Head-of-Train Remote Linking Protocol (Update A)
  • ICSMA-25-224-01 Santesoft Sante PACS Server

CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.



Source link

admin

Share
Published by
admin

Recent Posts

CISA Releases Two Industrial Control Systems Advisories

CISA released two Industrial Control Systems (ICS) advisories on August 5, 2025. These advisories provide…

2 days ago

Microsoft Releases Guidance on High-Severity Vulnerability (CVE-2025-53786) in Hybrid Exchange Deployments

Update (08/07/2025): CISA issued Emergency Directive (ED) 25-02: Mitigate Microsoft Exchange Vulnerability in response to CVE-2025-53786.…

3 days ago

CISA Issues ED 25-02: Mitigate Microsoft Exchange Vulnerability

Today, CISA issued Emergency Directive (ED) 25-02: Mitigate Microsoft Exchange Vulnerability in response to CVE-2025-53786,…

4 days ago

CISA Releases Ten Industrial Control Systems Advisories

CISA released ten Industrial Control Systems (ICS) advisories on August 7, 2025. These advisories provide…

5 days ago

CISA Releases Malware Analysis Report Associated with Microsoft SharePoint Vulnerabilities

CISA published a Malware Analysis Report (MAR) with analysis and associated detection signatures on files…

6 days ago

CISA Adds Three Known Exploited Vulnerabilities to Catalog

CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence…

1 week ago

This website uses cookies.