Several industrial control system (ICS) vulnerabilities have been disclosed. These include 29 vulnerabilities in Hitachi Disk Array Systems, an improper check vulnerability in Palo Alto Networks products, and an unrestricted file upload issue in Philips products using Apache Struts. Additionally, ABB Cylon Aspect and HMS Ewon Flexy 205 products have been found vulnerable to code injection and remote code execution, respectively. These vulnerabilities, some with publicly available exploits, pose a risk to industrial and infrastructure environments, requiring prompt patching and mitigation.
A critical heap-based buffer overflow vulnerability (CVE-2024-49775) in Siemens’ User Management Component (UMC) allows unauthenticated remote attackers to execute arbitrary code. This flaw affects multiple Siemens products and poses a severe risk to industrial and enterprise environments. Siemens has issued security advisory SSA-928984, urging customers to apply fixes or mitigations immediately to prevent exploitation. This vulnerability highlights the dangers of outdated and vulnerable industrial control systems.
Multiple critical vulnerabilities have been disclosed impacting various Industrial Control Systems (ICS) products. These vulnerabilities, identified in AutomationDirect’s C-More EA9 Programming Software, Planet Technology’s industrial switch WGS-804HPT, and other products, could enable remote code execution (RCE) and other serious security compromises if exploited. The vulnerabilities highlight the ongoing challenge of securing critical infrastructure against sophisticated cyberattacks. Organizations are urged to apply the necessary mitigations and keep their ICS software updated to prevent attacks and minimize the risk to their operations.