Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Releases Two Advisories Covering Vulnerabilities, and Exploits Surrounding ICS

Posted on August 6, 2025August 6, 2025 By CWS

CISA launched two pressing Industrial Management Programs (ICS) advisories on August 5, 2025, addressing important safety vulnerabilities in vital manufacturing and vitality sector programs. 

These advisories element exploitable flaws that would compromise industrial operations and doubtlessly disrupt important providers throughout a number of sectors.

Key Takeaways1. CISA warns of safety flaws in Mitsubishi Electrical and Tigo Vitality ICS merchandise.2. Tigo Vitality vulnerabilities enable distant exploits; Mitsubishi threat allows info tampering.3. Pressing motion is required.

Mitsubishi Electrical Programs 

CISA advisory ICSA-25-217-01 identifies a Home windows Shortcut Following vulnerability (CWE-64) affecting a number of Mitsubishi Electrical Iconics Digital Options merchandise, together with GENESIS64 (all variations), GENESIS (model 11.00), and Mitsubishi Electrical MC Works64 (all variations). 

The vulnerability, assigned CVE-2025-7376 with a CVSS v3.1 base rating of 5.9, allows info tampering by means of symbolic hyperlink manipulation.

The vulnerability permits attackers with low-privileged code execution capabilities to create symbolic hyperlinks that trigger elevated processes to carry out unauthorized writes to arbitrary file system places. 

This exploitation methodology can lead to denial-of-service (DoS) circumstances if vital system recordsdata are modified. The assault vector requires native entry with low assault complexity, making it notably regarding for programs with a number of consumer entry factors.

Mitsubishi Electrical has launched GENESIS Model 11.01 as a remediation measure, and directors are strongly inspired to implement strict entry controls, together with administrator-only login configurations and firewall restrictions.

Tigo Vitality Cloud Programs 

The second advisory, ICSA-25-217-02, reveals three extreme vulnerabilities in Tigo Vitality’s Cloud Join Superior (CCA) machine affecting variations 4.0.1 and prior. 

These vulnerabilities current a considerably greater threat profile, with probably the most vital receiving a CVSS v4 rating of 9.3.

CVE-2025-7768 exposes hard-coded credentials (CWE-798) that present unauthorized administrative entry, enabling full machine compromise. 

CVE-2025-7769 identifies a command injection vulnerability (CWE-77) within the /cgi-bin/mobile_api endpoint’s DEVICE_PING command, permitting distant code execution. 

CVE-2025-7770 reveals predictable session ID era (CWE-337) utilizing timestamp-based strategies, facilitating unauthorized entry to delicate machine capabilities.

These vulnerabilities collectively allow attackers to achieve full system management, modify photo voltaic vitality manufacturing settings, disrupt security mechanisms, and expose delicate operational knowledge. 

The distant exploitability of those flaws makes them notably harmful for vitality sector infrastructure.

Mitigations

CISA emphasizes implementing defense-in-depth methods, together with community isolation, firewall deployment, and VPN-secured distant entry. 

Organizations are suggested to conduct thorough influence assessments earlier than implementing defensive measures and keep up to date safety patches.

Each distributors are actively addressing these vulnerabilities, with Mitsubishi Electrical offering rapid patches and Tigo Vitality creating complete fixes. 

CISA reviews no recognized public exploitations concentrating on these particular vulnerabilities presently, however recommends rapid motion given the vital nature of affected programs.

Equip your SOC with full entry to the most recent risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Advisories, CISA, Covering, Exploits, ICS, Releases, Surrounding, Vulnerabilities

Post navigation

Previous Post: AI Is Transforming Cybersecurity Adversarial Testing
Next Post: Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data

Related Posts

New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands Cyber Security News
Weaponized PyPI Package Steals Solana Private Keys Via Supply Chain Attack Cyber Security News
Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers Cyber Security News
Indian Authorities Dismantled Cybercriminals That Impersonate as Microsoft Tech Support Cyber Security News
Anubis Ransomware Attacking Android and Windows Users to Encrypt Files and Steal Login Credentials Cyber Security News
Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools
  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 2)
  • Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC
  • Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems
  • Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools
  • Black Hat USA 2025 – Summary of Vendor Announcements (Part 2)
  • Adobe Issues Out-of-Band Patches for AEM Forms Vulnerabilities With Public PoC
  • Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems
  • Critical Trend Micro Apex One Management RCE Vulnerability Actively Exploited in the wild

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News