Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact

Posted on October 15, 2025October 15, 2025 By CWS

The October 2025 Patch Tuesday has introduced advisories from a number of main ICS/OT distributors, together with Siemens, Schneider Electrical, Rockwell Automation, ABB, Phoenix Contact, and Moxa.

Siemens has printed six new advisories, together with two that describe important vulnerabilities. One among them is a important flaw in TeleControl Server Fundamental, which might enable an unauthenticated, distant attacker to acquire person password hashes. The attacker can then log in and carry out unauthorized operations.

The second important bug is an authentication difficulty impacting Simatic ET 200SP communication processors. An unauthenticated, distant attacker can exploit the vulnerability to entry configuration knowledge.

A number of high- and medium-severity points have been present in Siemens SiPass, which permit an unauthenticated distant attacker to take advantage of person accounts, manipulate knowledge, impersonate customers, or execute arbitrary code on the server.

In Strong Edge, Siemens patched 4 high-severity vulnerabilities that may result in an software crash or arbitrary code execution if the attacker can persuade the sufferer to open specifically crafted information. All points have been reported to the commercial large by researcher Michael Heinzl.

The corporate has additionally knowledgeable prospects {that a} Chrome vulnerability identified to have been exploited within the wild impacts HyperLynx and Industrial Edge App Writer merchandise. As well as, prospects have been instructed about an SQL injection flaw in Sinec NMS that permits an authenticated attacker to insert malicious knowledge and escalate privileges.

Schneider Electrical has solely printed one new advisory. It describes a high-severity EcoStruxure OPC UA Server Professional product vulnerability that may be exploited to trigger a DoS situation.

Rockwell Automation has printed seven new advisories. One advisory has an general severity score of ‘important’. It addresses three flaws within the 1783-NATR configurable NAT router, together with one that may be exploited to trigger a DoS situation, take management of admin accounts, and modify NAT guidelines. Commercial. Scroll to proceed studying.

The remaining advisories handle high-severity points. Two privilege escalation flaws permitting an attacker to realize entry to information, processes and system assets have been resolved in FactoryTalk Linx. 

A few different advisories handle FactoryTalk product vulnerabilities. One informs prospects about patches for FactoryTalk View Machine Version and PanelView Plus 7 flaws permitting attackers to delete information or achieve unauthorized entry to the product. The second advisory covers a DoS difficulty in FactoryTalk ViewPoint.

Rockwell has additionally launched patches for DoS vulnerabilities within the 1715 EtherNet/IP Communications Module, Compact GuardLogix 5370 controllers, and ArmorStart distributed motor controllers.

The cybersecurity company CISA has printed its personal advisory for the Rockwell 1715 EtherNet/IP vulnerabilities. 

Phoenix Contact this week launched two new advisories. One describes a number of vulnerabilities in QUINT4 UPS units that may enable an unauthenticated, distant attacker to conduct DoS assaults and collect login credentials. The second advisory describes a vulnerability within the firmware of CHARX SEC-3xxx charging controllers that may be exploited for command injection with root privileges.

Germany’s CERT@VDE has picked up the Phoenix Contact advisories and as well as it has printed an advisory for a Murrelektronik product difficulty that exposes delicate data. 

ABB printed just one advisory on Patch Tuesday, however launched a number of others in latest days. The Patch Tuesday advisory covers three medium-severity B&R Automation Runtime SDM points permitting session takeover, code execution, and the injection of method knowledge right into a CSV file.

The opposite latest advisories describe safety holes in MConfig (cleartext password dumping), Automation Runtime (DoS), and EIBPORT (XSS). 

Moxa printed two advisories this month, on October 9. The corporate introduced patches for hardcoded SSH non-public key and encryption-related points in TRC-2190 collection merchandise.

Associated: ICS Patch Tuesday: Rockwell Automation Leads With 8 Safety Advisories

Associated: ICS Patch Tuesday: Main Distributors Handle Code Execution Vulnerabilities

Security Week News Tags:ABB, Announced, Contact, Fixes, ICS, Patch, Phoenix, Rockwell, Schneider, Siemens, Tuesday

Post navigation

Previous Post: Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication
Next Post: Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence

Related Posts

Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI Security Week News
Dropzone AI Raises $37 Million for Autonomous SOC Analyst Security Week News
161,000 People Impacted by Krispy Kreme Data Breach Security Week News
Exposed Docker APIs Likely Exploited to Build Botnet Security Week News
CISO Conversations: John ‘Four’ Flynn, VP of Security at Google DeepMind Security Week News
Connex Credit Union Data Breach Impacts 172,000 People Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns Of Rapid7 Velociraptor Vulnerability Exploited in Ransomware Attacks
  • Customer Service Firm 5CA Denies Responsibility for Discord Data Breach
  • TigerJack Hacks Infiltrated Developer Marketplaces with 11 Malicious VS Code Extensions
  • How Attackers Bypass Synced Passkeys
  • Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns Of Rapid7 Velociraptor Vulnerability Exploited in Ransomware Attacks
  • Customer Service Firm 5CA Denies Responsibility for Discord Data Breach
  • TigerJack Hacks Infiltrated Developer Marketplaces with 11 Malicious VS Code Extensions
  • How Attackers Bypass Synced Passkeys
  • Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News