Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations

SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations

Posted on January 31, 2026January 31, 2026 By CWS

A medium-severity vulnerability within the Iconics Suite SCADA system that might enable attackers to set off denial-of-service situations on important industrial management techniques.

The flaw, tracked as CVE-2025-0921, impacts supervisory management and knowledge acquisition infrastructure broadly deployed throughout automotive, vitality, and manufacturing sectors.

Vulnerability Overview

CVE-2025-0921 stems from an execution-with-unnecessary-privileges weak spot in a number of providers inside Mitsubishi Electrical Iconics Digital Options GENESIS64.

The vulnerability has a CVSS rating of 6.5, which is classed as medium severity. Profitable exploitation allows attackers to misuse privileged file system operations to raise privileges and corrupt important system binaries, in the end compromising system integrity and availability.

CVE IdentifierVulnerability DescriptionCVSS ScoreCVE-2025-0921Execution with pointless privileges vulnerability in a number of providers of Mitsubishi Electrical Iconics Digital Options GENESIS646.5 (Medium)

The vulnerability was found throughout a complete safety evaluation carried out by Unit 42 researchers Asher Davila and Malav Vyas in early 2024.

This discovering represents certainly one of six vulnerabilities recognized in Iconics Suite variations 10.97.2 and earlier for Microsoft Home windows platforms.

The researchers beforehand disclosed 5 associated vulnerabilities affecting the identical SCADA platform, with CVE-2025-0921 rising as an extra risk throughout their investigation.

Permissions of GraphWorX64(supply: paloaltonetworks)

Based on Mitsubishi Electrical’s safety advisory, the vulnerability impacts all variations of GENESIS64, MC Works64, and GENESIS model 11.00.

Iconics Suite maintains lots of of hundreds of installations throughout greater than 100 nations, spanning important infrastructure sectors resembling authorities services, navy installations, water and wastewater remedy crops, utilities, and vitality suppliers.

Technical Exploitation Particulars

The vulnerability resides within the Pager Agent part of AlarmWorX64 MMX, the alarm administration system that displays industrial processes.

Attackers with native entry can exploit the flaw by manipulating the SMSLogFile path configuration saved within the IcoSetup64.ini file situated within the C:ProgramDataICONICS listing.

newly altered cng.sys file created by the exploit(supply:PaloAltonetwork)

The assault chain includes creating symbolic hyperlinks from the log file location to focus on system binaries.

When directors ship check messages or the system robotically triggers alerts, logging data follows the symbolic hyperlink and overwrites important drivers resembling cng.sys, which offers cryptographic providers for Home windows system parts.

Upon system reboot, the corrupted driver causes boot failures, trapping the machine in an infinite restore loop and rendering the OT engineering workstation inoperable.

Infinite Home windows boot loop brought on by the corrupted driver (supply: paloaltonetworks)

Researchers demonstrated that exploitation turns into considerably simpler when mixed with CVE-2024-7587, a beforehand disclosed vulnerability within the GenBroker32 installer that grants extreme permissions to the C:ProgramDataICONICS listing, permitting any native person to change important configuration information.

Nevertheless, attackers might nonetheless exploit CVE-2025-0921 independently if log information turn out to be writable on account of misconfiguration, different vulnerabilities, or social engineering.

Mitsubishi Electrical has launched patches for GENESIS model 11.01 and later, which prospects can obtain from the Iconics Group Useful resource Heart.

For GENESIS64 customers, a hard and fast model is presently below growth and shall be launched within the close to future. The seller has indicated no plans to launch patches for MC Works64, requiring prospects to implement mitigations within the meantime.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Disrupting, DoS, Industrial, Operations, Potentially, SCADA, Triggers, Vulnerability

Post navigation

Previous Post: Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
Next Post: Automated Penetration Testing Toolkit Designed for Linux systems

Related Posts

An Open-Source Tool to See Through Encrypted Traffic in Linux systems An Open-Source Tool to See Through Encrypted Traffic in Linux systems Cyber Security News
WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File WinRAR Directory Vulnerability Let Execute Arbitrary Code Using a Malicious File Cyber Security News
Crypto User Loses ,000 in Seconds After Clicking Instagram Ad Promising Easy Profits Crypto User Loses $9,000 in Seconds After Clicking Instagram Ad Promising Easy Profits Cyber Security News
New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins Cyber Security News
American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign Cyber Security News
20 Best Inventory Management Tools in 2025 20 Best Inventory Management Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News