CISA released seventeen Industrial Control Systems (ICS) advisories on May 16, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

ICSA-24-137-01 Siemens Parasolid
ICSA-24-137-02 Siemens SICAM Products
ICSA-24-137-03 Siemens Teamcenter Visualization and JT2Go
ICSA-24-137-04 Siemens Polarion ALM
ICSA-24-137-05 Siemens Simcenter Nastran
ICSA-24-137-06 Siemens SIMATIC CN 4100 Before V3.0
ICSA-24-137-07 Siemens SIMATIC RTLS Locating Manager
ICSA-24-137-08 Siemens PS/IGES Parasolid Translator Component
ICSA-24-137-09 Siemens Solid Edge
ICSA-24-137-10 Siemens RUGGEDCOM CROSSBOW
ICSA-24-137-11 Siemens RUGGEDCOM APE1808
ICSA-24-137-12 Siemens Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems
ICSA-24-137-13 Siemens Industrial Products
ICSA-24-137-14 Rockwell Automation FactoryTalk View SE
 
ICSA-23-044-01 Mitsubishi Electric MELSEC iQ-R Series Safety CPU and SIL2 Process CPU (Update A)
ICSA-24-074-14 Mitsubishi Electric MELSEC-Q/L Series (Update A)
 
ICSMA-20-049-02 GE Healthcare Ultrasound Products (Update A)

CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations.

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore More

CISA Issues Emergency Directive 24-02: Mitigating the Significant Risk from Nation-State Compromise of Microsoft Corporate Email System

April 11, 2024 0 Comments 0 tags

Today, CISA publicly issued Emergency Directive (ED) 24-02 to address the recent campaign by Russian state-sponsored cyber actor Midnight Blizzard to exfiltrate email correspondence of Federal Civilian Executive Branch (FCEB)

Cyber Pros Embrace AI, Over 80% Believe It Will Enhance Jobs

February 22, 2024 0 Comments 0 tags

ISC2 found that 82% of cybersecurity professionals believe AI will improve the efficiency of their jobs

SMBs at Risk From SendGrid-Focused Phishing Tactics

February 22, 2024 0 Comments 0 tags

Kaspersky explained the fraudulent emails prompted recipients to enable two-factor authentication