Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking

Posted on September 19, 2025September 19, 2025 By CWS

Among the industrial management system (ICS) merchandise made by Taiwan-based Novakon are affected by critical vulnerabilities, and the seller doesn’t seem to have launched any patches. 

A subsidiary of iBASE Know-how, Novakon designs and manufactures human-machine interfaces (HMIs), industrial PCs, and IIoT options. The corporate serves 18 nations throughout North America, Europe and Asia. Advertising and marketing supplies present that 40,000 models of Novakon’s 7” HMIs have been deployed in world information facilities. 

Researchers at CyberDanube, an IT/OT penetration testing and safety consulting firm, found that Novakon’s HMIs are affected by 5 sorts of vulnerabilities.

In line with an advisory printed by CyberDanube, the HMIs are affected by an unauthenticated buffer overflow permitting distant code execution with root privileges, a listing traversal that exposes information, and a few weak authentication points that enable entry to the system and functions.

The safety agency’s researchers additionally found lacking safety mechanisms and unnecessarily excessive permissions for sure processes. 

Sebastian Dietz, safety researcher at CyberDanube, informed SecurityWeek that the vulnerabilities will be exploited remotely with out authentication.

“An unauthenticated attacker may leverage these vulnerabilities to execute excessive privilege code on these gadgets,” Dietz defined. “As HMI gadgets are used to work together with machines and methods (eg, PLCs, manufacturing traces) in essential infrastructure, gaining arbitrary code execution may have extreme penalties.”

Dietz famous that it’s tough to find out what number of gadgets could also be weak to assaults, “as they’re usually deployed in essential infrastructure and (hopefully) indirectly uncovered by way of the web”.Commercial. Scroll to proceed studying.

CyberDanube stated Novakon has been despatched a report describing its findings, however the vendor didn’t present any suggestions and ignored a overwhelming majority of its communication makes an attempt. 

Novakon has not responded to SecurityWeek’s request for remark.

Associated: DELMIA Manufacturing facility Software program Vulnerability Exploited in Assaults

Associated: ICS Patch Tuesday: Rockwell Automation Leads With 8 Safety Advisories

Associated: Important Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Merchandise

Security Week News Tags:Expose, Hacking, HMIs, Novakon, Remote, Unpatched, Vulnerabilities

Post navigation

Previous Post: U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack
Next Post: New Phishing Attack Targets Facebook Users to Steal Login Credentials

Related Posts

CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry Security Week News
UAE’s K2 Think AI Jailbroken Through Its Own Transparency Features Security Week News
Cellcom Service Disruption Caused by Cyberattack Security Week News
Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks Security Week News
689,000 Affected by Insider Breach at FinWise Bank Security Week News
Check Point to Acquire AI Security Firm Lakera Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Malware Loader ‘CountLoader’ Weaponized PDF File to Deliver Ransomware
  • Two Scattered Spider Suspects Arrested in UK; One Charged in US
  • Global Spyware Markets to Identify New Entities Entering The Market
  • Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine
  • New Phishing Attack Targets Facebook Users to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Malware Loader ‘CountLoader’ Weaponized PDF File to Deliver Ransomware
  • Two Scattered Spider Suspects Arrested in UK; One Charged in US
  • Global Spyware Markets to Identify New Entities Entering The Market
  • Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine
  • New Phishing Attack Targets Facebook Users to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News