July 2025 Patch Tuesday ICS safety advisories have been revealed by Siemens, Schneider Electrical and Phoenix Contact.
Siemens has launched 9 new advisories, in addition to a safety bulletin urging clients to take steps to safe their industrial management programs (ICS) amid an rising menace to the operational expertise (OT) panorama. The alert cites the present geopolitical scenario and references a latest US authorities alert warning organizations a couple of potential surge in assaults by Iran.
The economic big additionally knowledgeable clients that its Sentron Powermanager and Desigo CC units aren’t affected by a not too long ago disclosed distant code execution vulnerability in Apache Tomcat.
Two critical- and one high-severity flaw have been addressed by Siemens in its Sinec NMS product. The safety holes may enable privilege escalation and code execution.
Siemens has additionally knowledgeable clients about high-severity vulnerabilities within the TIA Administrator framework (privilege escalation and code execution), Sicam Toolbox II (MitM assault), Strong Edge (DoS or code execution), Ruggedcom ROS (MitM and unauthorized entry), and Simatic CN 4100 (DoS).
Medium-severity points have been addressed in Siprotect 5, and TIA Undertaking Server and TIA Portal merchandise. They’ll result in the publicity of delicate info and DoS assaults, respectively.
Schneider Electrical has revealed 4 new advisories. Considered one of them describes a number of critical- and high-severity vulnerabilities affecting the EcoStruxure IT Information Heart Professional product. The failings may be exploited for unauthenticated distant code execution, root password discovery, distant command execution, and privilege escalation.
A distinct advisory describes one knowledge publicity situation in EcoStruxure Energy Monitor Professional and Energy Operation merchandise. Two different advisories describe the influence of third-party part flaws on EcoStruxure Energy Operation and legacy industrial PCs.Commercial. Scroll to proceed studying.
Phoenix Contact additionally launched 4 new advisories on Tuesday. Two of them describe essential vulnerabilities in PLCnext firmware, enabling attackers to reboot PLCs, achieve entry to and execute recordsdata, trigger a DoS situation, and carry out different actions. A majority of the problems influence third-party elements.
Two different Phoenix Contact advisories cowl vulnerabilities in Charx EV charging controllers, together with essential flaws. They are often exploited by hackers to realize learn/write entry, trigger a DoS situation, and escalate privileges.
The Phoenix Contact advisories had been additionally revealed by Germany’s VDE CERT.
Within the US, CISA revealed one new advisory informing organizations about a number of vulnerabilities, together with ones rated ‘essential’ and ‘excessive’, affecting Emerson ValveLink valve monitoring merchandise. The vulnerabilities may be exploited to acquire delicate info, tamper with parameters, and run unauthorized code.
A number of days previous to Patch Tuesday, advisories had been revealed by ABB (RMC-100 authentication bypass, info publicity vulnerabilities), and Mitsubishi Electrical (DoS in Melsec and code execution in Melsoft).
Associated: ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA
Associated: Siemens Notifies Clients of Microsoft Defender Antivirus Situation