Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits

CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits

Posted on July 11, 2025July 11, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) has launched 13 vital Industrial Management Programs (ICS) advisories on July 10, 2025, highlighting important vulnerabilities affecting main industrial automation distributors.

This complete safety alert encompasses a number of assault vectors concentrating on important infrastructure parts, starting from community administration methods to course of management gear used throughout manufacturing, vitality, and transportation sectors.

The advisories reveal widespread safety flaws in methods manufactured by distinguished distributors together with Siemens, Delta Electronics, Advantech, KUNBUS, and IDEC.

These vulnerabilities current severe dangers to operational expertise environments, probably permitting unauthorized entry to vital infrastructure methods.

The affected merchandise span varied industrial functions, from Siemens’ SINEC community administration methods to specialised railroad communication protocols, indicating the broad scope of potential threats dealing with industrial operations.

CISA analysts recognized these vulnerabilities via ongoing safety assessments and coordination with affected distributors.

The safety flaws exhibit subtle assault patterns that might allow risk actors to compromise industrial management methods via a number of entry factors.

These vulnerabilities significantly threaten methods managing energy distribution, manufacturing processes, and transportation networks.

Essentially the most regarding facet entails the assault vectors concentrating on community administration interfaces and human-machine interface (HMI) methods.

Particularly, the Siemens SINEC NMS and TIA Portal vulnerabilities (ICSA-25-191-01 and ICSA-25-191-05) expose community configuration methods to potential exploitation.

These methods usually function with elevated privileges, making profitable assaults significantly harmful as they may present attackers with complete community entry and management capabilities.

The an infection mechanisms primarily leverage weak authentication protocols and inadequate enter validation in web-based administration interfaces.

Attackers can exploit these weaknesses via crafted HTTP requests that bypass safety controls, probably executing arbitrary code heading in the right direction methods.

The persistence ways contain modifying system configurations to take care of entry even after system restarts, making detection and remediation difficult for safety groups.

Examine stay malware habits, hint each step of an assault, and make sooner, smarter safety choices -> Strive ANY.RUN now

Cyber Security News Tags:CISA, Control, Exploits, Industrial, Releases, Surrounding, Systems, Vulnerabilities

Post navigation

Previous Post: Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
Next Post: Iranian APTs Hackers Actively Attacking Transportation and Manufacturing Sectors

Related Posts

Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely Django App Vulnerabilities Chained to Execute Arbitrary Code Remotely Cyber Security News
Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications Cyber Security News
Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Cyber Security News
SantaStealer Attacks Users to Exfiltrates Sensitive Documents, Credentials, and Wallet Data SantaStealer Attacks Users to Exfiltrates Sensitive Documents, Credentials, and Wallet Data Cyber Security News
Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide Microsoft 365 Admin Center Outage Blocks Access for Admins Worldwide Cyber Security News
SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News