Source |
Cyble |
Identifiant |
8644674 |
Date de publication |
2025-01-30 08:42:50 (vue: 2025-01-30 09:08:02) |
Titre |
ICS Vulnerability Report: Cyble Urges Critical mySCADA Fixes |
Texte |
>
Overview
A pair of 9.8-severity flaws in mySCADA myPRO Manager SCADA systems were among the vulnerabilities highlighted in Cyble\'s weekly Industrial Control System (ICS) Vulnerability Intelligence Report.
Cyble Research & Intelligence Labs (CRIL) examined eight ICS vulnerabilities in the January 28 report for clients, including high-severity flaws in critical manufacturing, energy infrastructure, and transportation networks.
OS Command Injection (CWE-78) and Improper Security Checks (CWE-358, CWE-319) accounted for half of the vulnerabilities in the report, “indicating a persistent challenge in securing authentication and execution processes in ICS environments,” Cyble said.
Critical mySCADA Vulnerabilities
The critical mySCADA myPRO supervisory control and data acquisition (SCADA) vulnerabilities haven\'t yet appeared in the NIST National Vulnerability Database (NVD) or the MITRE CVE database, but they were the subject of a CISA ICS advisory on January 23.
The mySCADA myPRO Manager system provides user interfaces and functionality for real-time monitoring and control of industrial processes across a range of critical industries and applications. CISA said the vulnerabilities can be exploited remotely with low attack complexity, potentially allowing a remote attacker to execute arbitrary commands or disclose sensitive information.
CVE-2025-20061 was assigned a CVSS v3.1 base score of 9.8 and is an Improper Neutralization of Special Elements used in an OS Command (\'OS Command Injection\') vulnerability. CISA said mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information, so the vulnerability could be used to execute arbitrary commands on an affected system.
CVE-2025-20014 is also a 9.8-severity OS Command Injection vulnerability, as myPRO also does not properly neutralize POST requests sent to a specific port with version information, which could potentially lead to an attacker executing arbitrary commands.
The following mySCADA products are affected:
myPRO Manager: Versions prior to 1.3
myPRO Runtime: Versions prior to 9.2.1
mySCADA recommends that users update to the latest versions:
mySCADA PRO Manager 1.3
mySCADA PRO Runtime 9.2.1
|
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
20014 20061 2025 319 358 access accessible accounted acquisition across actors adapt additional adopting advisories advisory affected affected: alerts all allowing along also among an incident appeared applications applying approach arbitrary are assessment assessments assets assigned attack attacker authentication automating a zero base based behind firewalls better bodies business but by by threat can cause caused challenge checks cisa cisa is click here clients command commands complex complexity comprehensive compromise conclusion conducting consistency control controls could covers cril critical cve cvss cwe cyber cybersecurity cyble damage data database day deployment details developing device devices disclose disrupt does effective efficiency eight elements employee employees energy ensure ensuring environments especially establishing examined execute executing execution exploitation exploited exposure external fixes flaws focus following from full functionality gaps good half haven help high highlighted hygiene ics identify implementing importance important improper improve improving include: includes including increasingly industrial industries information infrastructure injection insights intelligence interfaces internal internet inventory isolate issued its january labs landscape lateral latest layered lead like limit locate low maintain maintaining management management reduces manager manager: manufacturing measures might minimize mitigating mitre monitoring movement multi mypro myscada national necessary network networks neutralization neutralize nist not nvd observed offered ongoing operational operations organizations overall overview pair particularly patch patching penetration persistent physical plan port post potential potentially practices prevent prior pro procedures processes products programs proper properly protected provides range real recognizing phishing attempts recommendations recommended recommends reduce regular regularly regulatory remote remotely report report: requests required research resilience response right risk runtime runtime: said scada score scrutinized secure securing security segmentation sensitive sent several severity should special specific staying steps strategy subject such supervisory system systems technology tested testing them these those threaten threats time timely to cyber tools top to vulnerability traffic training transportation trust policy undergo understanding update updated urges used user users validated vendors verification version versions versions: vpn vulnerabilities vulnerabilities vulnerability weekly which with email information working yet and “indicating |
Tags |
Tool
Vulnerability
Patching
Industrial
|
Stories |
|
Move |
|