Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ICS Patch Tuesday: Major Vendors Address Code Execution Vulnerabilities

Posted on August 13, 2025August 13, 2025 By CWS

August 2025 Patch Tuesday advisories have been revealed by a number of main firms providing industrial management system (ICS) and different operational know-how (OT) options.

Siemens has revealed 22 new advisories. One among them is for CVE-2025-40746, a vital Simatic RTLS Finding Supervisor concern that may be exploited by an authenticated attacker for code execution with System privileges. 

The corporate has additionally revealed advisories masking high-severity vulnerabilities in Comos (code execution), Siemens Engineering Platforms (code execution), Simcenter (crash or code execution), Sinumerik controllers (unauthorized distant entry), Ruggedcom (authentication bypass with bodily entry), Simatic (code execution), Siprotect (DoS), and Opcenter High quality (unauthorized entry).

Siemens additionally addressed vulnerabilities launched by means of third-party elements, together with OpenSSL, Linux kernel, Wibu Techniques, Nginx, Nozomi Networks, and SQLite.

Medium- and low-severity points have been resolved in Simotion Scout, Siprotec 5, Simatic RTLS Finding Supervisor, Ruggedcom ROX II, and Sicam Q merchandise. 

As traditional, Siemens has launched patches for a lot of of those vulnerabilities, however solely mitigations or workarounds can be found for a few of the flaws. 

Schneider Electrical has launched 5 new advisories. One among them describes 4 high-severity vulnerabilities in EcoStruxure Energy Monitoring Skilled (PME), Energy Operation (EPO), and Energy SCADA Operation (PSO) merchandise. Exploitation of the failings can result in arbitrary code execution or delicate knowledge publicity.

Within the Modicon M340 controller and its communication modules the economic large fastened a high-severity DoS vulnerability that may be triggered with specifically crafted FTP instructions, in addition to a high-severity concern that may result in delicate data publicity or a DoS situation. Commercial. Scroll to proceed studying.

Within the Schneider Electrical Software program Replace instrument, the corporate patched a high-severity vulnerability that may enable an attacker to escalate privileges, corrupt recordsdata, get hold of data, or trigger a persistent DoS. 

Medium-severity points that may result in privilege escalation, DoS, or delicate credential publicity have been patched in Saitel and EcoStruxure merchandise. 

Honeywell has revealed six advisories specializing in constructing administration merchandise, together with a number of advisories that inform prospects about Home windows patches for Maxpro and Professional-Watch NVR and VMS merchandise. The corporate has additionally launched advisories masking PW-series entry controller patches and safety enhancements.

Aveva has revealed an advisory for 2 points in its PI Integrator for Enterprise Analytics. Two vulnerabilities have been patched: one arbitrary file add concern that might result in code execution, and a delicate knowledge publicity weak point.

ABB informed prospects on Tuesday about a number of vulnerabilities affecting its Facet, Nexus and Matrix merchandise. Among the flaws will be exploited with out authentication for distant code execution, acquiring credentials, and to govern recordsdata and varied elements.

Phoenix Contact has knowledgeable prospects a few privilege escalation vulnerability in Gadget and Replace Administration. The corporate has described it as a misconfiguration that enables a low-privileged native person to execute arbitrary code with admin privileges. Germany’s CERT@VDE has additionally revealed a duplicate of the Phoenix Contact advisory.

The US cybersecurity company CISA has revealed three new advisories describing vulnerabilities in Santesoft Sante PACS Server, Johnson Controls iSTAR, and Ashlar-Vellum merchandise. CISA has additionally distributed the Aveva advisory and one of many Schneider Electrical advisories. 

A couple of days previous to Patch Tuesday, Rockwell Automation revealed an advisory informing prospects about a number of high-severity code execution vulnerabilities affecting its Enviornment Simulation product. 

Additionally previous to Patch Tuesday, Mitsubishi Electrical launched an advisory describing an data tampering flaw in Genesis and MC Works64 merchandise.

Associated: ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact

Associated: ICS Patch Tuesday: Vulnerabilities Addressed by Rockwell, ABB, Siemens, Schneider

Security Week News Tags:Address, Code, Execution, ICS, Major, Patch, Tuesday, Vendors, Vulnerabilities

Post navigation

Previous Post: Multiple Chrome High-Severity Vulnerabilities Let Attackers Execute Arbitrary Code
Next Post: Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws

Related Posts

US Announces $100 Million for State, Local and Tribal Cybersecurity Security Week News
Sesame Workshop Regains Control of Elmo’s Hacked X Account After Racist Posts Security Week News
Chinese Espionage Crews Circle SentinelOne in Year-Long Reconnaissance Campaign Security Week News
Mobile Forensics Tool Used by Chinese Law Enforcement Dissected Security Week News
SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover Security Week News
TrustCloud Raises $15 Million for Security Assurance Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
  • Fortinet, Ivanti Release August 2025 Security Patches
  • Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data
  • Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws
  • ICS Patch Tuesday: Major Vendors Address Code Execution Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
  • Fortinet, Ivanti Release August 2025 Security Patches
  • Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data
  • Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws
  • ICS Patch Tuesday: Major Vendors Address Code Execution Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News