Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems

Posted on August 1, 2025August 1, 2025 By CWS

CISA launched two high-severity Industrial Management Techniques (ICS) advisories on July 31, 2025, highlighting essential vulnerabilities in extensively deployed industrial tools that would allow distant attackers to control essential infrastructure techniques. 

The failings have an effect on seismic monitoring gadgets and virtualized industrial techniques used throughout international essential manufacturing sectors.

Key Takeaways1. CISA issued advisories for Güralp seismic gadgets and Rockwell VMware techniques.2. Allow distant entry and code execution on industrial infrastructure3. Isolate techniques from the web and apply patches instantly

Güralp Seismic Monitoring Techniques Vulnerability

The primary advisory addresses a extreme authentication bypass vulnerability in Güralp FMUS Collection Seismic Monitoring Gadgets, affecting all variations at present deployed worldwide. 

The vulnerability, tracked as CVE-2025-8286 and categorised below CWE-306 (Lacking Authentication for Crucial Operate), carries a most CVSS v4 rating of 9.3 and CVSS v3 rating of 9.8.

Safety researcher Souvik Kandar of MicroSec found that these gadgets expose an unauthenticated Telnet-based command line interface accessible remotely with low assault complexity. 

Profitable exploitation might enable attackers to change {hardware} configurations, manipulate seismic information, or carry out manufacturing unit resets on monitoring tools essential to earthquake detection and industrial security techniques.

The vulnerability’s CVSS v4 vector string AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N signifies network-accessible assaults requiring no person interplay or privileges. 

Regardless of CISA’s coordination makes an attempt, Güralp Techniques has not responded to disclosure efforts, leaving customers to implement network-level mitigations, together with firewall isolation and VPN-secured distant entry.

Rockwell Automation’s Utilizing VMware

The second advisory targets Rockwell Automation’s Lifecycle Providers using VMware infrastructure, together with Industrial Information Facilities (IDC), VersaVirtual Home equipment (VVA), Risk Detection Managed Providers (TDMS), and Endpoint Safety Providers. 

4 distinct vulnerabilities have an effect on these techniques, with CVSS v4 scores reaching 9.4.

Three essential out-of-bounds write vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238) stem from integer overflow and underflow circumstances in VMware’s VMXNET3 digital community adapter, Digital Machine Communication Interface (VMCI), and Paravirtualized SCSI (PVSCSI) controller, respectively. 

Every carries an identical CVSS v3.1 scores of 9.3 with vector strings CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, indicating native entry necessities however potential for full system compromise.

Moreover, CVE-2025-41239 represents a CWE-908 (Use of Uninitialized Useful resource) vulnerability in vSockets that would leak delicate reminiscence contents, rated 8.2 on CVSS v4. 

These vulnerabilities collectively allow code execution on hypervisor hosts, probably compromising complete industrial virtualization infrastructures.

Mitigations 

CISA emphasizes implementing defense-in-depth methods instantly, as these vulnerabilities have an effect on essential manufacturing sectors globally. 

Organizations should prioritize community segmentation, guaranteeing ICS gadgets stay remoted from web entry and enterprise networks. 

For Rockwell techniques, customers with lively managed service contracts will obtain direct remediation assist, whereas others ought to seek the advice of Broadcom’s safety advisories for VMware patches.

No lively exploitation has been reported for both vulnerability set, offering organizations a essential window for implementing protecting measures earlier than potential risk actor discovery and weaponization of those high-impact assault vectors.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Advisories, Automation, CISA, Güralp, ICS, Issues, Monitoring, Rockwell, Seismic, Systems, VMware

Post navigation

Previous Post: Threat Actors Abuse Proofpoint’s and Intermedia’s Link Wrapping Features to Hide Phishing Payloads
Next Post: Cyber Risk Management Firm Safe Raises $70 Million

Related Posts

Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds Cyber Security News
How Smart Timesheet Software Is Changing the Way of Work Cyber Security News
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Cyber Security News
Key Vulnerabilities, Threats, and Data Breaches Cyber Security News
Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Cyber Security News
Managing Data Subject Access Requests in Compliance Programs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries
  • Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries
  • Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News