Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking

Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking

Posted on September 19, 2025September 19, 2025 By CWS

Among the industrial management system (ICS) merchandise made by Taiwan-based Novakon are affected by critical vulnerabilities, and the seller doesn’t seem to have launched any patches. 

A subsidiary of iBASE Know-how, Novakon designs and manufactures human-machine interfaces (HMIs), industrial PCs, and IIoT options. The corporate serves 18 nations throughout North America, Europe and Asia. Advertising and marketing supplies present that 40,000 models of Novakon’s 7” HMIs have been deployed in world information facilities. 

Researchers at CyberDanube, an IT/OT penetration testing and safety consulting firm, found that Novakon’s HMIs are affected by 5 sorts of vulnerabilities.

In line with an advisory printed by CyberDanube, the HMIs are affected by an unauthenticated buffer overflow permitting distant code execution with root privileges, a listing traversal that exposes information, and a few weak authentication points that enable entry to the system and functions.

The safety agency’s researchers additionally found lacking safety mechanisms and unnecessarily excessive permissions for sure processes. 

Sebastian Dietz, safety researcher at CyberDanube, informed SecurityWeek that the vulnerabilities will be exploited remotely with out authentication.

“An unauthenticated attacker may leverage these vulnerabilities to execute excessive privilege code on these gadgets,” Dietz defined. “As HMI gadgets are used to work together with machines and methods (eg, PLCs, manufacturing traces) in essential infrastructure, gaining arbitrary code execution may have extreme penalties.”

Dietz famous that it’s tough to find out what number of gadgets could also be weak to assaults, “as they’re usually deployed in essential infrastructure and (hopefully) indirectly uncovered by way of the web”.Commercial. Scroll to proceed studying.

CyberDanube stated Novakon has been despatched a report describing its findings, however the vendor didn’t present any suggestions and ignored a overwhelming majority of its communication makes an attempt. 

Novakon has not responded to SecurityWeek’s request for remark.

Associated: DELMIA Manufacturing facility Software program Vulnerability Exploited in Assaults

Associated: ICS Patch Tuesday: Rockwell Automation Leads With 8 Safety Advisories

Associated: Important Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Merchandise

Security Week News Tags:Expose, Hacking, HMIs, Novakon, Remote, Unpatched, Vulnerabilities

Post navigation

Previous Post: U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack
Next Post: New Phishing Attack Targets Facebook Users to Steal Login Credentials

Related Posts

US Links Handala Hackers to Iranian Government US Links Handala Hackers to Iranian Government Security Week News
Securing Industrial Control Systems: Challenges and Future Securing Industrial Control Systems: Challenges and Future Security Week News
CISA Urges Critical Infrastructure to Enhance Cybersecurity CISA Urges Critical Infrastructure to Enhance Cybersecurity Security Week News
FBI Warns of Deepfake Messages Impersonating Senior Officials FBI Warns of Deepfake Messages Impersonating Senior Officials Security Week News
Douglas Day: From Engineer to Ethical Hacker Douglas Day: From Engineer to Ethical Hacker Security Week News
Harvard Is First Confirmed Victim of Oracle EBS Zero-Day Hack Harvard Is First Confirmed Victim of Oracle EBS Zero-Day Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark