Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems

Posted on August 1, 2025August 1, 2025 By CWS

CISA launched two high-severity Industrial Management Techniques (ICS) advisories on July 31, 2025, highlighting essential vulnerabilities in extensively deployed industrial tools that would allow distant attackers to control essential infrastructure techniques. 

The failings have an effect on seismic monitoring gadgets and virtualized industrial techniques used throughout international essential manufacturing sectors.

Key Takeaways1. CISA issued advisories for Güralp seismic gadgets and Rockwell VMware techniques.2. Allow distant entry and code execution on industrial infrastructure3. Isolate techniques from the web and apply patches instantly

Güralp Seismic Monitoring Techniques Vulnerability

The primary advisory addresses a extreme authentication bypass vulnerability in Güralp FMUS Collection Seismic Monitoring Gadgets, affecting all variations at present deployed worldwide. 

The vulnerability, tracked as CVE-2025-8286 and categorised below CWE-306 (Lacking Authentication for Crucial Operate), carries a most CVSS v4 rating of 9.3 and CVSS v3 rating of 9.8.

Safety researcher Souvik Kandar of MicroSec found that these gadgets expose an unauthenticated Telnet-based command line interface accessible remotely with low assault complexity. 

Profitable exploitation might enable attackers to change {hardware} configurations, manipulate seismic information, or carry out manufacturing unit resets on monitoring tools essential to earthquake detection and industrial security techniques.

The vulnerability’s CVSS v4 vector string AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N signifies network-accessible assaults requiring no person interplay or privileges. 

Regardless of CISA’s coordination makes an attempt, Güralp Techniques has not responded to disclosure efforts, leaving customers to implement network-level mitigations, together with firewall isolation and VPN-secured distant entry.

Rockwell Automation’s Utilizing VMware

The second advisory targets Rockwell Automation’s Lifecycle Providers using VMware infrastructure, together with Industrial Information Facilities (IDC), VersaVirtual Home equipment (VVA), Risk Detection Managed Providers (TDMS), and Endpoint Safety Providers. 

4 distinct vulnerabilities have an effect on these techniques, with CVSS v4 scores reaching 9.4.

Three essential out-of-bounds write vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238) stem from integer overflow and underflow circumstances in VMware’s VMXNET3 digital community adapter, Digital Machine Communication Interface (VMCI), and Paravirtualized SCSI (PVSCSI) controller, respectively. 

Every carries an identical CVSS v3.1 scores of 9.3 with vector strings CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H, indicating native entry necessities however potential for full system compromise.

Moreover, CVE-2025-41239 represents a CWE-908 (Use of Uninitialized Useful resource) vulnerability in vSockets that would leak delicate reminiscence contents, rated 8.2 on CVSS v4. 

These vulnerabilities collectively allow code execution on hypervisor hosts, probably compromising complete industrial virtualization infrastructures.

Mitigations 

CISA emphasizes implementing defense-in-depth methods instantly, as these vulnerabilities have an effect on essential manufacturing sectors globally. 

Organizations should prioritize community segmentation, guaranteeing ICS gadgets stay remoted from web entry and enterprise networks. 

For Rockwell techniques, customers with lively managed service contracts will obtain direct remediation assist, whereas others ought to seek the advice of Broadcom’s safety advisories for VMware patches.

No lively exploitation has been reported for both vulnerability set, offering organizations a essential window for implementing protecting measures earlier than potential risk actor discovery and weaponization of those high-impact assault vectors.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Advisories, Automation, CISA, Güralp, ICS, Issues, Monitoring, Rockwell, Seismic, Systems, VMware

Post navigation

Previous Post: Threat Actors Abuse Proofpoint’s and Intermedia’s Link Wrapping Features to Hide Phishing Payloads
Next Post: Cyber Risk Management Firm Safe Raises $70 Million

Related Posts

New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers Cyber Security News
Aembit Named to Rising in Cyber 2025 List of Top Cybersecurity Startups Cyber Security News
Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access Cyber Security News
CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits Cyber Security News
Microsoft Defender XDR New Advanced Hunting Tables for Email and Cloud Protections Cyber Security News
North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Safely Use AI Chatbots and Assistants
  • Gen Z in the Crosshairs: Cybercriminals Shift Focus to Young, Digital-Savvy Workers
  • Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
  • In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack
  • Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News