Between April 21 and April 27, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) published advisories addressing significant vulnerabilities in various industrial control systems (ICS) and other technologies. These warnings emphasize the importance of timely updates and mitigations to protect against potential cyber threats.
Affected Products and Versions
The advisories focused on numerous products across different manufacturers, highlighting vulnerabilities in specific software versions that could expose systems to security risks. Key products and their affected versions include:
-
ABB Products:
- ACS5000: Vulnerable from versions Laaab 4.03.0 to Laaab 5.06.1.
- ACS6000: Affected from versions LAA 2.10.0 to LAAB.
- ACS6080: Impacted from versions Laaaa 2.10.0 to Laaab 5.06.1.
-
Albedo Telecom:
- Net.Time: Specifically, the PTP/NTP Clock (Serial No. NBC0081P) is affected at software release 1.4.4.
-
Johnson Controls Inc.:
- UCI: All versions before 6.9.5 are vulnerable.
-
Nice Linear:
- Emerge E3: Versions up to 1.00-07 are affected.
-
Planet Technology:
- NMS-1000V: All versions are vulnerable.
- NMS-500: Affected in all versions.
- Uni-NMS-Lite: Versions 1.0b211018 and earlier are at risk.
- WGS-4215-8T2S: Vulnerable from version 1.305B241115 and prior.
- WGS-804HPT-V2: Affected in versions 2.305B250121 and earlier.
-
Schneider Electric Products:
- Modicon M340: All versions are vulnerable, with specific mention of versions before 3.10 and SV3.60.
- Modicon M580: All versions are at risk, particularly those before versions 2.80, 2.90, and SV4.20.
- Modicon MC80: All versions are affected, with versions below 1.80 noted.
- Modicon Momentum: All versions and specific components like CPU versions 171CBU*.
- Modicon Premium: Impacted across all versions, especially those before 3.20.
- Modicon Quantum: Affected in all versions, particularly those before 3.60.
- Wiser Home Controller WHC-5918A: All versions are vulnerable.
-
Siemens:
- Telecontrol Server Basic SQL: Affected versions prior to V3.1.2.2.
- Telecontrol Server Basic: All versions before v3.1.2.2 are vulnerable.
- Vestel:
- AC Charger EVC04: Version 3.75.0 is noted to have vulnerabilities.
Recommendations for Users and Administrators
In light of these vulnerabilities, the Cyber Center has strongly urged users and administrators to take immediate action. They recommend:
- Reviewing the advisories for specific details on each affected product.
- Implementing any suggested mitigations present in the advisories.
- Applying necessary updates to software and systems, ensuring that any available patches are installed promptly to safeguard against potential exploitation by cyber threats.
Conclusion
The advisories issued by CISA serve as a crucial reminder of the importance of maintaining cybersecurity protocols. Organizations relying on the affected products must prioritize updating their systems and adhere to best security practices to mitigate risks associated with these vulnerabilities. The proactive approach of reviewing and applying updates can significantly enhance the security posture of industrial control systems and connected technologies.