Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking

1,000 Instantel Industrial Monitoring Devices Possibly Exposed to Hacking

Posted on June 3, 2025June 3, 2025 By CWS

Over 1,000 industrial monitoring units made by Canada-based Instantel could also be uncovered to distant hacking attributable to a crucial vulnerability.

An advisory printed lately by the cybersecurity company CISA revealed that Instantel’s Micromate product, which is designed to document vibration, noise, and air overpressure, is affected by a vulnerability associated to the shortage of authentication on a configuration port.

The flaw, tracked as CVE-2025-1907 with a CVSS rating of 9.8, can enable an attacker to execute arbitrary instructions on a tool.

Souvik Kandar, the Microsec researcher who found the safety gap, informed SecurityWeek that he has recognized over 1,000 internet-exposed Micromate units worldwide that might be weak to assaults.

The weak product is broadly used for numerous purposes, together with mining, tunneling, bridge monitoring, building, and environmental security.

Kandar defined that an attacker who can obtain command execution on a Micromate machine might alter or disable its monitoring performance, resulting in false or incomplete knowledge. An attacker might additionally make modifications to undermine knowledge integrity, probably inflicting issues for auditing, compliance, or insurance coverage claims. 

The machine can be corrupted or shut down, which might result in crucial operations similar to blasting and tunneling being interrupted, the researcher stated.

In keeping with Kandar, an attacker may additionally be capable to leverage a hacked machine to maneuver laterally to different related IT or OT programs.Commercial. Scroll to proceed studying.

CISA famous in its advisory that Instantel is engaged on a firmware replace for this vulnerability. Till a patch turns into accessible, customers are suggested to restrict entry to the affected machine to trusted IP addresses. 

Instantel has not responded to SecurityWeek’s request for remark. 

Associated: Crucial Flaw Permits Distant Hacking of AutomationDirect Industrial Gateway

Associated: Lantronix Machine Utilized in Crucial Infrastructure Exposes Techniques to Distant Hacking

Associated: Orthanc Server Vulnerability Poses Danger to Medical Knowledge, Healthcare Operations

Security Week News Tags:Devices, Exposed, Hacking, Industrial, Instantel, Monitoring, Possibly

Post navigation

Previous Post: Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities
Next Post: Microsoft Edge for Android Adds InPrivate Tab Locking with PIN & Bio Authentication

Related Posts

Trusted Relationships: Emerging Threat in Email Security Trusted Relationships: Emerging Threat in Email Security Security Week News
Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks Security Week News
Palo Alto Networks Patches Privilege Escalation Vulnerabilities Palo Alto Networks Patches Privilege Escalation Vulnerabilities Security Week News
Data Breach by Over 300 Chrome Extensions Uncovered Data Breach by Over 300 Chrome Extensions Uncovered Security Week News
Netskope Raises Over 8 Million in IPO Netskope Raises Over $908 Million in IPO Security Week News
SmarterMail Vulnerability Exploited in Attacks SmarterMail Vulnerability Exploited in Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark