Categories: Cyber Security News

CISA Releases ICS Advisories Addressing Current Vulnerabilities and Exploits

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released eight Industrial Control System (ICS) advisories on June 24, 2025, highlighting critical vulnerabilities across global industrial infrastructure.

These advisories target systems ranging from terminal operating systems to electric vehicle charging stations, with multiple vulnerabilities allowing remote code execution and data theft.

The coordinated disclosure impacts vendors, including Schneider Electric, Kaleris, and ControlID, with several flaws rated critical under CVSS v4 scoring.

High-Risk Terminal and Controller Vulnerabilities

Kaleris Navis N4 Terminal Operating System (ICSA-25-175-01) contains two critical flaws: CVE-2025-2566 (CVSS v4 9.3) enables remote code execution through unsafe Java deserialization, while CVE-2025-5087 (CVSS v4 6.0) allows credential theft via cleartext transmission.

Affected versions before 4.0 require immediate patching or network segmentation.

Schneider Electric Modicon Controllers (ICSA-25-175-03) face three unpatched vulnerabilities (CVE-2025-3905, CVE-2025-3116, CVE-2025-3117), with mitigations limited to firewall restrictions and VPN usage until a firmware update is released.

End-of-Life and Authentication Bypass Threats

Schneider Electric’s discontinued EVLink WallBox (ICSA-25-175-04) carries three vulnerabilities (path traversal, XSS, OS command injection) rated CVSS v4 8.6, permitting full device takeover.

With no vendor patches available, CISA mandates firewall isolation and WPA3 encryption.

ControlID iDSecure On-Premises (ICSA-25-175-05) has a CVSS v4 9.3-rated improper authentication flaw enabling system compromise alongside SSRF and SQL injection risks.

No remediation timeline is provided.

Web Application and Legacy System Risks

Parsons AccuWeather Widget (ICSA-25-175-06) contains a cross-site scripting vulnerability (CVE-2025-5015, CVSS v4 8.7) allowing malicious RSS feed injection.

While cloud instances are patched, on-premise deployments require manual updates.

Mitsubishi Electric MELSEC-Q Series PLCs (ICSA-19-029-02) received Update B for legacy vulnerabilities, emphasizing the persistent threats to outdated industrial equipment.

CISA urges immediate review of all advisories, prioritizing network segmentation and credential hardening.

The agency notes no active exploitation but warns that unmitigated systems risk operational disruption and critical infrastructure compromise.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

The post CISA Releases ICS Advisories Addressing Current Vulnerabilities and Exploits appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Dragon Ball Super: Beerus Trailer Teases the Resurrection of Frieza

A new trailer for Dragon Ball Super: Beerus has arrived, teasing a look at not…

2 hours ago

Dragon Ball Xenoverse 3 Announced for PC and Consoles in First Trailer

Bandai Namco has announced Dragon Ball Xenoverse 3 for PC via Steam, PlayStation 5, and…

3 hours ago

Tammy Fogle outlines vision for Abilene City Council Place 4 race

ABILENE, Texas (KTAB/KRBC) – Abilene City Council Place 4 candidate Tammy Fogle is sharing her…

4 hours ago

The Best Deals Today: Apple AirTag 4-Pack, 3 for $33 Movie Deal, Sony WH-1000XM5 Headphones, and More

A new weekend has arrived, and today, you can save big on Apple AirTags, 4K…

5 hours ago

Avengers: Endgame Re-Release Footage is ‘Critical’ to the Plot of Doomsday

Director Joe Russo has confirmed the upcoming Avengers: Endgame re-release will include new footage that…

6 hours ago

Windrose Celebrates 1 Million Copies Sold as Player Counts Climb

Cooperative pirate survival game Windrose has reached 1 million copies sold less than a week…

7 hours ago

This website uses cookies.