Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits

Posted on September 1, 2025September 1, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) has printed 9 Industrial Management Methods (ICS) advisories on August 28, 2025, detailing high- and medium-severity vulnerabilities throughout main distributors’ merchandise. 

The advisories spotlight remote-exploitable flaws, privilege-escalation weaknesses, reminiscence corruption bugs, and insecure configurations. 

CISA and distributors purpose to empower operators with exact steering to safeguard ICS environments towards rising cyber threats.

Key Takeaways1. 9 ICS advisories element essential flaws—from authentication bypass and credential leaks to buffer overflows and privilege escalations.2. Apply vendor patches, isolate management networks with VPNs/firewalls.3. Carry out impression assessments, observe defense-in-depth (ICS-TIP) steering.

Mitsubishi Electrical MELSEC iQ-F Collection Flaws

ICSA-25-240-01 and ICSA-25-240-02 underpin two distinct vulnerabilities within the MELSEC iQ-F Collection CPU modules.

Lacking Authentication for Crucial Perform (CVE-2025-7405) in ICSA-25-240-01 (CVSS v4 6.9, CWE-306) permits distant attackers to learn/write machine values or halt program execution with out authentication.

Cleartext Transmission of Delicate Info (CVE-2025-7731) in ICSA-25-240-02 (CVSS v4 8.7, CWE-319) exposes SLMP credentials over the community.

Affected fashions span FX5U, FX5UC, FX5UJ, and FX5S collection, with firmware model thresholds specified. Distributors suggest LAN isolation, VPN enforcement, IP filtering, and bodily entry controls.

Schneider, Delta, GE Vernova Flaws

Schneider Electrical’s Saitel DR/DP RTUs in ICSA-25-240-03 disclose Improper Privilege Administration (CVE-2025-8453, CVSS v3 6.7), enabling authenticated engineers to escalate privileges through configuration file tampering. Patch HUe v11.06.30 addresses this.

Delta Electronics surfaces two advisories: CNCSoft-G2 Out-of-bounds Write (CVE-2025-47728, CVSS v4 8.5) in ICSA-25-240-04 permits arbitrary code execution by means of malformed DPAX recordsdata; replace to v2.1.0.27 or later.

COMMGR Buffer Overflow & Code Injection (CVE-2025-53418 CVSS v4 8.8; CVE-2025-53419 CVSS v4 8.4) in ICSA-25-240-05 requires patching to v2.10.0.

GE Vernova’s CIMPLICITY HMI/SCADA suite (ICSA-25-240-06) suffers from an Uncontrolled Search Path Factor (CVE-2025-7719, CVSS v4 7.0), allowing native privilege escalation; improve to 2024 SIM 4 is really useful.

Mitsubishi & Hitachi Power Flaws

A number of FA Engineering Software program Merchandise (ICSA-24-135-04, CVSS v4 4.4) detailing Privilege, Useful resource Consumption, and Out-of-bounds Write flaws throughout over 30 software program utilities (CVE-2023-51776 by means of CVE-2024-26314). 

Customers should apply Replace D (newest variations listed) and observe defense-in-depth tips.

ICONICS Digital Options and MC Works64 (ICSA-25-140-04, CVSS v4 6.8) Execution with Pointless Privileges (CVE-2025-0921) in AlarmWorX64 Pager providers; mitigations embrace disabling Traditional OPC Level Supervisor and implementing administrator-only logins.

Lastly, Hitachi Power’s Relion 670/650 and SAM600-IO Collection (ICSA-25-184-01) expose an Improper Test for Uncommon Situations (CVE-2025-1718, CVSS v4 7.1), permitting FTP-authenticated customers to set off machine reboots. 

Firmware variations 2.2.6.4 and a pair of.2.5.8 or later mitigate threat.

CISA emphasizes performing impression analyses, isolating management networks, using VPNs and firewalls, and adhering to really useful ICS-TIP and defense-in-depth methods. 

Organizations ought to report suspected exploitation makes an attempt and apply vendor-provided patches directly.

Discover this Story Fascinating! Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Advisories, CISA, Exploits, ICS, Releases, Surrounding, Vulnerabilities

Post navigation

Previous Post: How Prompt Injection Attacks Bypassing AI Agents With Users Input
Next Post: Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users

Related Posts

Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities Cyber Security News
Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack Cyber Security News
Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
PoC Published For Fortinet 0-Day Vulnerability That Being Exploited in the Wild Cyber Security News
Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems Cyber Security News
Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution
  • ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics
  • Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users
  • CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits
  • How Prompt Injection Attacks Bypassing AI Agents With Users Input

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution
  • ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics
  • Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users
  • CISA Releases Nine ICS Advisories Surrounding Vulnerabilities, and Exploits
  • How Prompt Injection Attacks Bypassing AI Agents With Users Input

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News