The U.S. Cybersecurity and Infrastructure Security Company (CISA) has printed eight Industrial Handle Programs (ICS) advisories warning of critical flaws impacting products from Hitachi Vitality, mySCADA Technologies, Industrial Management One-way links, and Nexx.
Topping the list is CVE-2022-3682 (CVSS rating: 9.9), impacting Hitachi Energy’s MicroSCADA Process Information Supervisor SDM600 that could allow an attacker to just take distant handle of the product.
The flaw stems from an issue with file authorization validation, thereby permitting an adversary to upload a specially crafted concept to the technique, primary to arbitrary code execution.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
Hitachi Strength has unveiled SDM600 1.3..1339 to mitigate the issue for SDM600 variations prior to variation 1.2 FP3 HF4 (Create Nr. 1.2.23000.291).
Another established of five critical vulnerabilities – CVE-2023-28400, CVE-2023-28716, CVE-2023-28384, CVE-2023-29169, and CVE-2023-29150 (CVSS scores: 9.9) – relate to command injection bugs existing in mySCADA myPRO versions 8.26. and prior.
“Thriving exploitation of these vulnerabilities could permit an authenticated user to inject arbitrary running program commands,” CISA warned, urging consumers to update to version 8.29. or bigger.
A critical security bug has also been disclosed in Industrial Control Inbound links ScadaFlex II SCADA Controllers (CVE-2022-25359, CVSS score: 9.1) that could permit an authenticated attacker to overwrite, delete, or generate data files.
“Industrial Management One-way links has relayed that they are closing their business enterprise,” the company stated. “This solution might be considered conclusion-of-lifetime ongoing assistance for this product or service may possibly be unavailable.”
People are proposed to minimize network publicity, isolate manage procedure networks from small business networks, and position them driving firewalls to handle potential challenges.
Rounding off the list are 5 shortcomings, which includes one critical bug (CVE-2023-1748, CVSS score: 9.3), impacting garage door controllers, clever plugs, and wise alarms bought by Nexx.
The vulnerabilities that could help risk actors to crack open residence garage doors, just take about clever plugs, and achieve distant handle of sensible alarms, according to security researcher Sam Sabetan, who found and claimed the issues.
Impending WEBINARLearn to Safe the Identity Perimeter – Demonstrated Methods
Enhance your company security with our approaching specialist-led cybersecurity webinar: Examine Identity Perimeter techniques!
Never Miss Out – Help you save Your Seat!
The next versions of Nexx smart home units are impacted –
- Nexx Garage Doorway Controller (NXG-100B, NXG-200) – Version nxg200v-p3-4-1 and prior
- Nexx Clever Plug (NXPG-100W) – Edition nxpg100cv4– and prior
- Nexx Smart Alarm (NXAL-100) – Variation nxal100v-p1-9-1and prior
“Successful exploitation of these vulnerabilities could allow an attacker to receive delicate info, execute application programmable interface (API) requests, or hijack units,” CISA stated.
Discovered this write-up exciting? Adhere to us on Twitter and LinkedIn to browse far more exclusive content material we submit.
Some pieces of this posting are sourced from:
thehackernews.com