Search
Close this search box.

Vulnerability Pulse

Every week, we catalog the major industrial cybersecurity vulnerabilities and updates you should know about. Here are the notable threats from the week of August 13 - 19. Sign up to get these updates right to your inbox!

AUGUST 18, 2023

Juniper Juno OS

Juniper Juno OS contains a remote execution vulnerability that can allow a threat actor to cause a denial-of-service condition.

Sources: CISA, Juniper

AUGUST 17, 2023

​ICONICS and Mitsubishi Electric Products

​ICONICS and Mitsubishi Electric Products contain buffer overflow, out-of-bounds read, observable timing discrepancy and more vulnerabilities that can result in information disclosure, denial-of-service or remote code execution.


Sources: CISA, ICONICS

Schneider Electric PowerLogic ION7400 / PM8000 / ION8650 / ION8800 / ION9000 Power Meters

Schneider Electric PowerLogic ION7400/PM8000/ION8650/ION8800/ION9000 Power Meters contain a cleartext transmission of sensitive information vulnerability that can allow an attacker to cause a disclosure of sensitive information, a denial of service or modification of data if an attacker is able to intercept network traffic.


Sources: Schneider Electric, CISA

Walchem Intuition 9

Walchem Intuition 9 contains missing authentication for critical function and improper authentication vulnerabilities that can allow an attacker to download and export sensitive data or grant an attacker direct login to a device.


Sources: CISA, Walchem

AUGUST 16, 2023

Citrix Content Collaboration

Citrix Content Collaboration contains an improper access control vulnerability that can allow an unauthenticated attacker to remotely compromise customer-managed ShareFile storage zones controllers.

Sources: CISA, NIST

AUGUST 15, 2023

Schneider Electric EcoStruxure Control Expert, Process Expert, Modicon M340, M580 and M580 CPU

Schneider Electric EcoStruxure Control Expert, Process Expert, Modicon M340, M580 and M580 CPU contain an authentication bypass by capture-replay vulnerability that can allow an attacker to execute unauthorized Modbus functions on the controller when hijacking an authenticated Modbus session.


Sources: CISA, Schneider Electric

Rockwell Automation Armor PowerFlex

Rockwell Automation Armor PowerFlex contains an incorrect calculation vulnerability that can allow an attacker to send an influx of network commands, causing the product to generate an influx of event log traffic at a high rate, resulting in the stop of normal operations.


Sources: CISA, Rockwell Automation

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES