Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking

Posted on September 19, 2025September 19, 2025 By CWS

Among the industrial management system (ICS) merchandise made by Taiwan-based Novakon are affected by critical vulnerabilities, and the seller doesn’t seem to have launched any patches. 

A subsidiary of iBASE Know-how, Novakon designs and manufactures human-machine interfaces (HMIs), industrial PCs, and IIoT options. The corporate serves 18 nations throughout North America, Europe and Asia. Advertising and marketing supplies present that 40,000 models of Novakon’s 7” HMIs have been deployed in world information facilities. 

Researchers at CyberDanube, an IT/OT penetration testing and safety consulting firm, found that Novakon’s HMIs are affected by 5 sorts of vulnerabilities.

In line with an advisory printed by CyberDanube, the HMIs are affected by an unauthenticated buffer overflow permitting distant code execution with root privileges, a listing traversal that exposes information, and a few weak authentication points that enable entry to the system and functions.

The safety agency’s researchers additionally found lacking safety mechanisms and unnecessarily excessive permissions for sure processes. 

Sebastian Dietz, safety researcher at CyberDanube, informed SecurityWeek that the vulnerabilities will be exploited remotely with out authentication.

“An unauthenticated attacker may leverage these vulnerabilities to execute excessive privilege code on these gadgets,” Dietz defined. “As HMI gadgets are used to work together with machines and methods (eg, PLCs, manufacturing traces) in essential infrastructure, gaining arbitrary code execution may have extreme penalties.”

Dietz famous that it’s tough to find out what number of gadgets could also be weak to assaults, “as they’re usually deployed in essential infrastructure and (hopefully) indirectly uncovered by way of the web”.Commercial. Scroll to proceed studying.

CyberDanube stated Novakon has been despatched a report describing its findings, however the vendor didn’t present any suggestions and ignored a overwhelming majority of its communication makes an attempt. 

Novakon has not responded to SecurityWeek’s request for remark.

Associated: DELMIA Manufacturing facility Software program Vulnerability Exploited in Assaults

Associated: ICS Patch Tuesday: Rockwell Automation Leads With 8 Safety Advisories

Associated: Important Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Merchandise

Security Week News Tags:Expose, Hacking, HMIs, Novakon, Remote, Unpatched, Vulnerabilities

Post navigation

Previous Post: U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack
Next Post: New Phishing Attack Targets Facebook Users to Steal Login Credentials

Related Posts

Security Firms Hit by Salesforce–Salesloft Drift Breach Security Week News
Webinar Today: Why Context is a Secret Weapon in Application Security Posture Management Security Week News
‘Highest Ever’ Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability Security Week News
In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer Security Week News
Dropzone AI Raises $37 Million for Autonomous SOC Analyst Security Week News
Cisco Patches High-Severity IOS XR Vulnerabilities Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case
  • How Software Development Teams Can Securely and Ethically Deploy AI Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News