Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits

Posted on September 1, 2025September 1, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) has printed 9 Industrial Management Methods (ICS) advisories on August 28, 2025, detailing high- and medium-severity vulnerabilities throughout main distributors’ merchandise. 

The advisories spotlight remote-exploitable flaws, privilege-escalation weaknesses, reminiscence corruption bugs, and insecure configurations. 

CISA and distributors purpose to empower operators with exact steering to safeguard ICS environments towards rising cyber threats.

Key Takeaways1. 9 ICS advisories element essential flaws—from authentication bypass and credential leaks to buffer overflows and privilege escalations.2. Apply vendor patches, isolate management networks with VPNs/firewalls.3. Carry out impression assessments, observe defense-in-depth (ICS-TIP) steering.

Mitsubishi Electrical MELSEC iQ-F Collection Flaws

ICSA-25-240-01 and ICSA-25-240-02 underpin two distinct vulnerabilities within the MELSEC iQ-F Collection CPU modules.

Lacking Authentication for Crucial Perform (CVE-2025-7405) in ICSA-25-240-01 (CVSS v4 6.9, CWE-306) permits distant attackers to learn/write machine values or halt program execution with out authentication.

Cleartext Transmission of Delicate Info (CVE-2025-7731) in ICSA-25-240-02 (CVSS v4 8.7, CWE-319) exposes SLMP credentials over the community.

Affected fashions span FX5U, FX5UC, FX5UJ, and FX5S collection, with firmware model thresholds specified. Distributors suggest LAN isolation, VPN enforcement, IP filtering, and bodily entry controls.

Schneider, Delta, GE Vernova Flaws

Schneider Electrical’s Saitel DR/DP RTUs in ICSA-25-240-03 disclose Improper Privilege Administration (CVE-2025-8453, CVSS v3 6.7), enabling authenticated engineers to escalate privileges through configuration file tampering. Patch HUe v11.06.30 addresses this.

Delta Electronics surfaces two advisories: CNCSoft-G2 Out-of-bounds Write (CVE-2025-47728, CVSS v4 8.5) in ICSA-25-240-04 permits arbitrary code execution by means of malformed DPAX recordsdata; replace to v2.1.0.27 or later.

COMMGR Buffer Overflow & Code Injection (CVE-2025-53418 CVSS v4 8.8; CVE-2025-53419 CVSS v4 8.4) in ICSA-25-240-05 requires patching to v2.10.0.

GE Vernova’s CIMPLICITY HMI/SCADA suite (ICSA-25-240-06) suffers from an Uncontrolled Search Path Factor (CVE-2025-7719, CVSS v4 7.0), allowing native privilege escalation; improve to 2024 SIM 4 is really useful.

Mitsubishi & Hitachi Power Flaws

A number of FA Engineering Software program Merchandise (ICSA-24-135-04, CVSS v4 4.4) detailing Privilege, Useful resource Consumption, and Out-of-bounds Write flaws throughout over 30 software program utilities (CVE-2023-51776 by means of CVE-2024-26314). 

Customers should apply Replace D (newest variations listed) and observe defense-in-depth tips.

ICONICS Digital Options and MC Works64 (ICSA-25-140-04, CVSS v4 6.8) Execution with Pointless Privileges (CVE-2025-0921) in AlarmWorX64 Pager providers; mitigations embrace disabling Traditional OPC Level Supervisor and implementing administrator-only logins.

Lastly, Hitachi Power’s Relion 670/650 and SAM600-IO Collection (ICSA-25-184-01) expose an Improper Test for Uncommon Situations (CVE-2025-1718, CVSS v4 7.1), permitting FTP-authenticated customers to set off machine reboots. 

Firmware variations 2.2.6.4 and a pair of.2.5.8 or later mitigate threat.

CISA emphasizes performing impression analyses, isolating management networks, using VPNs and firewalls, and adhering to really useful ICS-TIP and defense-in-depth methods. 

Organizations ought to report suspected exploitation makes an attempt and apply vendor-provided patches directly.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Advisories, CISA, Exploits, ICS, Releases, Surrounding, Vulnerabilities

Post navigation

Previous Post: How Prompt Injection Attacks Bypassing AI Agents With Users Input
Next Post: Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users

Related Posts

Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered Cyber Security News
Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines Cyber Security News
How to Detect and Mitigate Insider Threats in Your Organization Cyber Security News
Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands Cyber Security News
Top 10 Best Dynamic Application Security Testing (DAST) Platforms in 2025 Cyber Security News
New WhatsApp Scam Alert Tricks Users to Get Complete Access to Your WhatsApp Chats Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Gravwell Closes $15.4M Funding Round to Expand Data Analytics and Security Platform
  • CISA Warns of Apple macOS, iOS, tvOS, Safari, and watchOS Vulnerability Exploited in Attacks
  • SBOM Pioneer Allan Friedman Joins NetRise to Advance Supply Chain Visibility
  • Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams
  • Defakto Raises $30 Million for Non-Human IAM Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Gravwell Closes $15.4M Funding Round to Expand Data Analytics and Security Platform
  • CISA Warns of Apple macOS, iOS, tvOS, Safari, and watchOS Vulnerability Exploited in Attacks
  • SBOM Pioneer Allan Friedman Joins NetRise to Advance Supply Chain Visibility
  • Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams
  • Defakto Raises $30 Million for Non-Human IAM Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News