• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa warns of critical flaws affecting industrial appliances from advantech

CISA Warns of Critical Flaws Affecting Industrial Appliances from Advantech and Hitachi

You are here: Home / General Cyber Security News / CISA Warns of Critical Flaws Affecting Industrial Appliances from Advantech and Hitachi
October 19, 2022

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday launched two Industrial Management Programs (ICS) advisories pertaining to intense flaws in Advantech R-SeeNet and Hitachi Power APM Edge appliances.

This is made up of three weaknesses in the R-SeeNet checking answer, productive exploitation of which “could outcome in an unauthorized attacker remotely deleting files on the procedure or enabling remote code execution.”

CyberSecurity

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The list of issues, which have an impact on R-SeeNet Variations 2.4.17 and prior, is as follows –

  • CVE-2022-3385 and CVE-2022-3386 (CVSS scores: 9.8) – Two stack-dependent buffer overflow flaws that could direct to remote code execution
  • CVE-2022-3387 (CVSS score: 6.5) – A path traversal flaw that could allow a distant attacker to delete arbitrary PDF files

Patches have been manufactured accessible in version R-SeeNet model 2.4.21 unveiled on September 30, 2022.

Also published by CISA is an update to a December 2021 advisory about several flaws in Hitachi Strength Transformer Asset Efficiency Management (APM) Edge products that could render them inaccessible.

The 29 vulnerabilities, collectively assigned a CVSS rating of 8.2, stem from security holes in open source computer software factors this kind of as OpenSSL, LibSSL, libxml2, and GRUB2 bootloader. End users are advised to update to APM Edge edition 4. to remediate the bugs.

CyberSecurity

The twin alerts come less than a 7 days right after CISA posted 25 ICS advisories on October 13, 2022, spanning quite a few vulnerabilities throughout products from Siemens, Hitachi Electricity, and Mitsubishi Electric.

According to OT cybersecurity and asset checking business SynSaber, 681 ICS merchandise vulnerabilities ended up reported through CISA in the initially fifty percent of 2022, out of which 152 are rated Critical, 289 are rated High, and 2015 are rated Medium in Severity.

What is more, 54 of the Critical/Higher-rated CVEs have no patch or any mitigation readily available from the suppliers, accounting for 13% of the whole reported flaws and remaining “permanently-working day vulnerabilities.”

“It’s crucial for asset proprietors and all those defending critical infrastructure to realize when remediations are available, and how those people remediations need to be implemented and prioritized,” SynSaber explained.

Found this article exciting? Observe THN on Facebook, Twitter  and LinkedIn to read additional exclusive content we write-up.


Some pieces of this posting are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Software Supply Chain Attacks Soar 742% in Three Years
Next Post: Deadbolt Ransomware Extorts Vendors and Customers Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.