Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’

Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’

Posted on July 1, 2025July 1, 2025 By CWS

Vital vulnerabilities affecting a product made by Germany-based Microsens might be exploited by hackers to conduct distant assaults in opposition to organizations.

Microsens gives a variety of connectivity and automation options for industrial organizations and enterprises, together with switches, converters, constructing controllers, and transceivers. The corporate’s NMP Internet+ product allows customers to manage, monitor and configure industrial switches and different Microsens community tools.

An advisory revealed by the cybersecurity company CISA final week knowledgeable organizations that the Microsens NMP Internet+ product is affected by two vital and one high-severity vulnerability.

The vital vulnerabilities might be exploited by an unauthenticated attacker to generate solid JSON Internet Tokens and bypass authentication (CVE-2025-49151) and overwrite information and execute arbitrary code (CVE-2025-49153). The high-severity situation is expounded to the truth that the JSON Internet Tokens don’t expire.

Noam Moshe, vulnerability researcher at Claroty’s Team82, who has been credited for the invention, advised SecurityWeek that an attacker may chain these flaws.

One vulnerability can be utilized to acquire a legitimate authentication token that gives entry to the focused system, whereas the second bug allows the attacker to overwrite vital information on the server, giving them full management over the system on the OS degree.

“These two vulnerabilities collectively enable an attacker to leap ‘from zero to hero’, which means gaining full management over the system with no need to have any prior information/credentials to the server,” Moshe defined.

The researcher identified that an attacker wants entry to the net server related to the focused Microsens NMP Internet+ occasion to take advantage of the vulnerabilities, however warned that a number of situations are uncovered to the web and probably weak to assaults.Commercial. Scroll to proceed studying.

CISA mentioned it’s not conscious of assaults exploiting these vulnerabilities and the seller has launched updates to patch the issues (model 3.3.0 for Home windows and Linux). 

In accordance with the company’s advisory, the impacted product is used worldwide, together with within the vital manufacturing sector.

Associated: Iranian Hackers’ Most well-liked ICS Targets Left Open Amid Recent US Assault Warning

Associated: Siemens Notifies Prospects of Microsoft Defender Antivirus Challenge

Associated: ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA

Security Week News Tags:Critical, Flaws, Hackers, Hero, Microsens, Product

Post navigation

Previous Post: LevelBlue to Acquire Trustwave to Create Major MSSP
Next Post: Europol Dismantles Fraud Crypto Investment Ring That Tricked 5000+ Victims Worldwide

Related Posts

Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign Hundreds of Salesforce Customers Hit by Widespread Data Theft Campaign Security Week News
In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed Security Week News
High-Severity Vulnerabilities Patched in Tenable Nessus Agent High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News
Adobe Addresses 44 Vulnerabilities in Software Update Adobe Addresses 44 Vulnerabilities in Software Update Security Week News
CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors Security Week News
Preemptive Security Urged as Cyber Threats Accelerate Preemptive Security Urged as Cyber Threats Accelerate Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark