Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Double-Edged Sustainability Sword Of AI In Web Design

      August 20, 2025

      Top 12 Reasons Enterprises Choose Node.js Development Services for Scalable Growth

      August 20, 2025

      GitHub’s coding agent can now be launched from anywhere on platform using new Agents panel

      August 20, 2025

      Stop writing tests: Automate fully with Generative AI

      August 19, 2025

      Who will maintain the future? Rethinking open source leadership for a new generation

      August 20, 2025

      Exporting a Cloth Simulation from Blender to an Interactive Three.js Scene

      August 20, 2025

      3D Layered Text: Motion and Variations

      August 20, 2025

      Hades Mining emerges from stealth with €5.5M Pre-Seed funding

      August 20, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Deconstructing the Request Lifecycle in Sitecore Headless – Part 2: SSG and ISR Modes in Next.js

      August 20, 2025
      Recent

      Deconstructing the Request Lifecycle in Sitecore Headless – Part 2: SSG and ISR Modes in Next.js

      August 20, 2025

      Susan Etlinger, AI Analyst and Industry Watcher on Building Trust

      August 20, 2025

      MongoDB Installation

      August 20, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      TerraMaster D1 SSD Plus Review: Experience a Faster External SSD

      August 20, 2025
      Recent

      TerraMaster D1 SSD Plus Review: Experience a Faster External SSD

      August 20, 2025

      Microsoft is investigating Windows 11 KB5063878 SSD data corruption/failure issue

      August 20, 2025

      Microsoft Surface Won’t Turn On: 6 Tested Solutions to Fix

      August 20, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CISA’s Latest Advisories Expose High-Risk Vulnerabilities in Industrial Control Systems

    CISA’s Latest Advisories Expose High-Risk Vulnerabilities in Industrial Control Systems

    April 3, 2025

    Industrial Control Systems

    The Cybersecurity and Infrastructure Security Agency (CISA) issued two crucial Industrial Control Systems (ICS) advisories, highlighting vulnerabilities that could have serious impacts on critical infrastructure. These ICS advisories, identified as ICSA-25-091-01 and ICSA-24-331-04, are designed to inform organizations about current security threats, vulnerabilities, and necessary mitigations related to ICS products and systems. 

    Details of the Industrial Control Systems Advisories 

    The two ICS advisories shared by CISA include vulnerabilities targeting Rockwell Automation Lifecycle Services with Veeam Backup and Replication and itachi Energy MicroSCADA Pro/X SYS600. Here is a quick breakdown of the vulnerabilities and their advisories.  

    ICSA-25-091-01 

    The first advisory, ICSA-25-091-01, focuses on a severe vulnerability in Rockwell Automation’s Lifecycle Services integrated with Veeam Backup and Replication. This vulnerability is related to the deserialization of untrusted data (CWE-502), a common type of issue in which attackers can manipulate software to execute malicious code remotely. A CVSS v4 score of 9.4 has been assigned to this flaw, indicating a high risk, as it is remotely exploitable with low attack complexity.

    Rockwell Automation’s affected products include the Industrial Data Center (IDC) with Veeam (Generations 1 – 5) and VersaVirtual Appliance (VVA) with Veeam (Series A – C). If successfully exploited, this vulnerability could allow attackers with administrative privileges to execute arbitrary code on affected systems, potentially leading to a complete system compromise.

    CISA urges organizations to take immediate defensive measures to mitigate the risk, including: 

    • Minimizing network exposure for all control systems and ensuring they are not directly accessible from the internet.
    • Using secure access methods like Virtual Private Networks (VPNs) when remote access is necessary. 
    • Keeping VPNs up to date to prevent vulnerabilities from being exploited. 

    Rockwell Automation is actively working with CISA to notify affected customers, especially those with an active Infrastructure Managed Service contract, and provide them with guidance on patching and remediation. 

    ICSA-24-331-04 

    The second advisory, ICSA-24-331-04, addresses a series of vulnerabilities in Hitachi Energy’s MicroSCADA Pro/X SYS600 system, an essential part of critical infrastructure in manufacturing and energy sectors. This advisory outlines multiple flaws, including issues such as improper neutralization of special elements in data query logic, path traversal vulnerabilities, and session hijacking possibilities through authentication bypass.

    The most severe vulnerability, CVE-2024-4872, has been assigned a CVSS v3 score of 9.9, highlighting its critical nature. This flaw allows authenticated attackers to inject malicious code into the system, potentially compromising the integrity of persistent data and allowing unauthorized access to sensitive functions. Other issues, such as improper limitations on file paths (CVE-2024-3980), could allow attackers to manipulate files essential to the system’s operation, leading to further compromise. 

    As with the Rockwell Automation advisory, CISA urges users to implement mitigations immediately to reduce the risks. Hitachi Energy has released patches for the affected versions, including a critical update to Version 10.6 for MicroSCADA Pro/X SYS600. Users are also advised to apply necessary workarounds and stay updated with security patches to protect against exploitation. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar
    Next Article AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock

    Related Posts

    Development

    Deconstructing the Request Lifecycle in Sitecore Headless – Part 2: SSG and ISR Modes in Next.js

    August 20, 2025
    Development

    Susan Etlinger, AI Analyst and Industry Watcher on Building Trust

    August 20, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Text-to-image basics with Amazon Nova Canvas

    Machine Learning

    Overwatch 2 shows off its ambitious Stadium Mode, new hero, launch date, and more in the new Season 16 gameplay trailer

    News & Updates

    Le notizie minori del mondo GNU/Linux e dintorni della settimana nr 32/2025

    Linux

    NVIDIA NeMo Framework Vulnerability Let Attackers Execute Remote Code

    Security

    Highlights

    15 Best Free and Open Source Linux GUI Password Managers

    July 2, 2025

    A password manager is a utility which helps users store and retrieve passwords and other…

    CVE-2025-6887 – Tenda AC5 Stack-Based Buffer Overflow Vulnerability

    June 30, 2025

    Apple’s AirPods Just Got Smarter with New Camera Trick, Studio Mic and Sleep Detection

    June 12, 2025

    Firefox Patches Multiple Vulnerabilities That Could Lead to Browser Crash

    June 11, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.