ALL NEWS

Avisos CERT

Avisos oficiales de CERTs y equipos de seguridad

Múltiples vulnerabilidades en Frick Controls Quantum HD de Johnson Controls, Inc.

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en Frick Controls Quantum HD de Johnson Controls, Inc.</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-27">Vie, 27/02/2026 - 09:17</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="ht

27 febINCIBE-CERT

Múltiples vulnerabilidades en Copeland XWEB y XWEB Pro

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en Copeland XWEB y XWEB Pro </span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-27">Vie, 27/02/2026 - 09:33</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe

27 febINCIBE-CERT

Omisión de autenticación en Sarix Pro 3 Series IP Cameras de Pelco

<span class="field field--name-title field--type-string field--label-hidden">Omisión de autenticación en Sarix Pro 3 Series IP Cameras de Pelco</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-27">Vie, 27/02/2026 - 10:27</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incib

27 febINCIBE-CERT

Múltiples vulnerabilidades en swtchenergy de SWITCH EV

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en swtchenergy de SWITCH EV</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-27">Vie, 27/02/2026 - 10:32</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-

27 febINCIBE-CERT

Múltiples vulnerabilidades en el sitio web de Chargemap

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en el sitio web de Chargemap</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-27">Vie, 27/02/2026 - 10:53</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe

27 febINCIBE-CERT

Johnson Controls, Inc. Frick Controls Quantum HD

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-01.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities can lead to pre-authentication remote code execution, information leak or denial of service.</strong></p> <p>The following versions of Johnson Controls, Inc. Frick Controls Quantum HD are affected:</p>

Bajo
26 febCISA Cybersecurity Advisories

SWITCH EV swtchenergy.com

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-06.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could allow attackers to impersonate charging stations, hijack sessions, suppress or misroute legitimate traffic to cause large-scale denial of service, and manipulate data sent to the backend.</strong></p> <p&

Bajo
26 febCISA Cybersecurity Advisories

EV2GO ev2go.io

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-04.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could allow attackers to impersonate charging stations, hijack sessions, suppress or misroute legitimate traffic to cause large-scale denial of service, and manipulate data sent to the backend.</strong></p> <p&

Bajo
26 febCISA Cybersecurity Advisories

CloudCharge cloudcharge.se

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could allow attackers to impersonate charging stations, hijack sessions, suppress or misroute legitimate traffic to cause large-scale denial of service, and manipulate data sent to the backend.</strong></p> <p&

Bajo
26 febCISA Cybersecurity Advisories

Mobility46 mobility46.se

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-08.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks.</strong></p> <p>The following versions of

Bajo
26 febCISA Cybersecurity Advisories

EV Energy ev.energy

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-07.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks.</strong></p> <p>The following versions of

Bajo
26 febCISA Cybersecurity Advisories

Copeland XWEB and XWEB Pro

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-10.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could allow an attacker to bypass authentication, cause a denial-of-service condition, cause memory corruption, and execute arbitrary code.</strong></p> <p>The following versions of Copeland XWEB and XWEB Pr

Bajo
26 febCISA Cybersecurity Advisories

Pelco, Inc. Sarix Pro 3 Series IP Cameras

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow attackers to gain unauthorized access to sensitive device data, bypass surveillance controls, and expose facilities to privacy breaches, operational risks, and regulatory compliance issues.</strong></p> &

Bajo
26 febCISA Cybersecurity Advisories

Yokogawa CENTUM VP R6, R7

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-09.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could allow an attacker to terminate the software stack process, cause a denial-of-service condition, or execute arbitrary code.</strong></p> <p>The following versions of Yokogawa CENTUM VP R6, R7 are affect

Bajo
26 febCISA Cybersecurity Advisories

Chargemap chargemap.com

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-05.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks.</strong></p> <p>The following versions of

Bajo
26 febCISA Cybersecurity Advisories

CISA Adds Two Known Exploited Vulnerabilities to Catalog

<p>CISA has added two new vulnerabilities to its <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation. </p> <ul> <li><a href="https://www.cve.org/CVERecord?id=CVE-2022-20775" target="_blank">CVE-2022-20775</a> Cisco Catalyst SD-WAN Path Traversal Vulnerability&

CVE-2022-20775
25 febCISA Cybersecurity Advisories

CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems

<p><em>The purpose of this Alert is to provide resources for organizations with Cisco Software-Defined Wide-Area Networking (SD-WAN) systems, including Federal Civilian Executive Branch (FCEB) agencies, to address ongoing exploitation of multiple vulnerabilities. Notably, the Cybersecurity and Infrastructure Security Agency (CISA) has added </em><a href="https://www.cve.org/CVERecord?id=CVE-2026-20127" target="_blank"><em>CVE-2026-20127</em></a>

CVE-2026-20127
25 febCISA Cybersecurity Advisories

Múltiples vulnerabilidades en MasterSCADA BUK-TS de InSAT

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en MasterSCADA BUK-TS de InSAT</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-25">Mié, 25/02/2026 - 09:26</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/inci

25 febINCIBE-CERT

Múltiples vulnerabilidades en AC500 V3 de ABB

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en AC500 V3 de ABB</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-25">Mié, 25/02/2026 - 09:43</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-cert/avis

25 febINCIBE-CERT

CISA Adds One Known Exploited Vulnerability to Catalog

<p>CISA has added one new vulnerability to its <a href="/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation.</p> <ul> <li><a href="https://www.cve.org/CVERecor

24 febCISA Cybersecurity Advisories

Gardyn Home Kit

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-055-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could allow unauthenticated users to access and control edge devices, access cloud-based devices and user information without authentication, and pivot to other edge devices managed in the Gardyn cloud environment.&

Bajo
24 febCISA Cybersecurity Advisories

Schneider Electric EcoStruxure Building Operation Workstation

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-055-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Schneider Electric is aware of a vulnerability in EcoStruxure Building Operation Workstation and EcoStruxure Building Operation WebStation. [EcoStruxure Building Operation (EBO)](https://www.se.com/ww/en/product-range/62111-ecostruxure-building-operation-software/

24 febCISA Cybersecurity Advisories

InSAT MasterSCADA BUK-TS

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-055-01.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities may allow remote code execution.</strong></p> <p>The following versions of InSAT MasterSCADA BUK-TS are affected:</p> <ul> <li>MasterSCADA BUK-TS vers:all/* (CVE-2026-21410, CVE-2

CVE-2026-21410
Bajo
24 febCISA Cybersecurity Advisories

Escalada de privilegios en productos de TRUMPF

<span class="field field--name-title field--type-string field--label-hidden">Escalada de privilegios en productos de TRUMPF</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-24">Mar, 24/02/2026 - 09:36</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-cert/avi

24 febINCIBE-CERT

CISA Adds Two Known Exploited Vulnerabilities to Catalog

<p>CISA has added two new vulnerabilities to its <a href="/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation.</p> <ul> <li><a href="https://www.cve.org/CVERec

20 febCISA Cybersecurity Advisories

Múltiples vulnerabilidades en USR-W610 de Jinan USR IOT Technology Limited

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en USR-W610 de Jinan USR IOT Technology Limited</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-20">Vie, 20/02/2026 - 09:44</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://w

20 febINCIBE-CERT

Limitación incorrecta a un directorio restringido en DNA Engineering Web Tools de Valmet

<span class="field field--name-title field--type-string field--label-hidden">Limitación incorrecta a un directorio restringido en DNA Engineering Web Tools de Valmet</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-20">Vie, 20/02/2026 - 10:04</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a h

20 febINCIBE-CERT

Múltiples vulnerabilidades en SmartServer IoT de EnOcean Edge Inc

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en SmartServer IoT de EnOcean Edge Inc</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-20">Vie, 20/02/2026 - 09:11</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe

20 febINCIBE-CERT

Autenticación faltante para función crítica en OdorEyes EcoSystem de Welker

<span class="field field--name-title field--type-string field--label-hidden">Autenticación faltante para función crítica en OdorEyes EcoSystem de Welker</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-20">Vie, 20/02/2026 - 09:26</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://

20 febINCIBE-CERT

Valmet DNA Engineering Web Tools

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-050-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow an unauthenticated attacker to manipulate the web maintenance services URL to achieve arbitrary file read access.</strong></p> <p>The following versions of Valmet DNA Engineering Web Tools are affec

Bajo
19 febCISA Cybersecurity Advisories

Jinan USR IOT Technology Limited (PUSR) USR-W610

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-050-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could result in authentication being disabled, a denial-of-service condition, or an attacker stealing valid user credentials, including administrator credentials.</strong></p> <p>The following versions of Ji

Bajo
19 febCISA Cybersecurity Advisories

Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-050-04.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could result in an over- or under-odorization event.</strong></p> <p>The following versions of Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller are affected:</p> <ul> <li>Odor

Bajo
19 febCISA Cybersecurity Advisories

EnOcean SmartServer IoT

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-050-01.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could allow an attacker to remotely execute arbitrary code and bypass ASLR.</strong></p> <p>The following versions of EnOcean SmartServer IoT are affected:</p> <ul> <li>SmartServer IoT &amp

Bajo
19 febCISA Cybersecurity Advisories

CISA Adds Two Known Exploited Vulnerabilities to Catalog

<p>CISA has added two new vulnerabilities to its <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation.</p> <ul> <li><a href="https://www.cve.org/CVERecord?id=CVE-2021-22175" target="_blank">CVE-2021-22175</a> GitLab Server-Side Request Forgery (SSRF) Vulnerability</li> <li><a href="https://w

CVE-2021-22175
18 febCISA Cybersecurity Advisories

Múltiples vulnerabilidades en GE Vernova Enervista UR Setup

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en GE Vernova Enervista UR Setup</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-18">Mié, 18/02/2026 - 10:04</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/in

18 febINCIBE-CERT

Desbordamiento de búfer basado en pila en ASDA-Soft de Delta Electronics

<span class="field field--name-title field--type-string field--label-hidden">Desbordamiento de búfer basado en pila en ASDA-Soft de Delta Electronics</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-18">Mié, 18/02/2026 - 09:35</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www

18 febINCIBE-CERT

Ausencia de autenticación en productos de CCTV de Honeywell

<span class="field field--name-title field--type-string field--label-hidden">Ausencia de autenticación en productos de CCTV de Honeywell</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-18">Mié, 18/02/2026 - 09:37</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/in

18 febINCIBE-CERT

CISA Adds Four Known Exploited Vulnerabilities to Catalog

<p>CISA has added four new vulnerabilities to its <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation.</p> <ul> <li><a href="https://www.cve.org/CVERecord?id=CVE-2008-0015" target="_bla

CVE-2008-0015
17 febCISA Cybersecurity Advisories

Delta Electronics ASDA-Soft

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-048-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability may allow an attacker to write arbitrary data beyond the bounds of a stack-allocated buffer, leading to the corruption of a structured exception handler (SEH).</strong></p> <p>The following versions o

Bajo
17 febCISA Cybersecurity Advisories

Honeywell CCTV Products

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-048-04.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could lead to account takeovers and unauthorized access to camera feeds; an unauthenticated attacker may change the recovery email address, potentially leading to further network compromise.</strong></p> &l

17 febCISA Cybersecurity Advisories

GE Vernova Enervista UR Setup

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-048-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities may allow code execution with elevated privileges.</strong></p> <p>The following versions of GE Vernova Enervista UR Setup are affected:</p> <ul> <li>Enervista UR Setup <8.

Bajo
17 febCISA Cybersecurity Advisories

Siemens Simcenter Femap and Nastran

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-048-01.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Siemens Simcenter Femap and Nastran is affected by multiple file parsing vulnerabilities that could be triggered when the application reads files in NDB and XDB formats. If a user is tricked to open a malicious file with any of the affected products, this could le

17 febCISA Cybersecurity Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

<p>CISA has added one new vulnerability to its <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation.</p> <ul> <li><a href="https://www.cve.org/CVERecord?id=CVE-2026-1731" target="_blank" title="https://www.cve.org/cverecord?id=cve-2026-1731">CVE-2026-1731</a> BeyondTrust Remote Support (RS) a

CVE-2026-1731
13 febCISA Cybersecurity Advisories

Carga de ficheros sin restricción en Airleader Master

<span class="field field--name-title field--type-string field--label-hidden">Carga de ficheros sin restricción en Airleader Master</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-13">Vie, 13/02/2026 - 09:40</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-c

13 febINCIBE-CERT

Credenciales predeterminadas en SuprOS de Hitachi Energy

<span class="field field--name-title field--type-string field--label-hidden">Credenciales predeterminadas en SuprOS de Hitachi Energy</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-13">Vie, 13/02/2026 - 09:51</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incib

13 febINCIBE-CERT

CISA Adds Four Known Exploited Vulnerabilities to Catalog

<p>CISA has added four new vulnerabilities to its <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation.</p> <ul> <li><a href="https://www.cve.org/CVERecord?id=CVE-2024-43468" target="_bl

CVE-2024-43468
12 febCISA Cybersecurity Advisories

Hitachi Energy SuprOS

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-043-09.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Hitachi Energy is aware of a vulnerability that affects the SuprOS product versions listed in this document. An attacker successfully exploiting this vulnerability can cause confidentiality, integrity and availability impacts. Please refer to the Recommended Immed

12 febCISA Cybersecurity Advisories

Siemens COMOS

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-043-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>COMOS is affected by multiple vulnerabilities that could allow an attacker to execute arbitrary code or cause denial of service condition, data infiltration or perform access control violations. Siemens has released new versions for several affected products and r

Bajo
12 febCISA Cybersecurity Advisories

Siemens SINEC OS

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-043-06.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>SINEC OS before V3.3 contains third-party components with multiple vulnerabilities. Siemens has released new versions for the affected products and recommends to update to the latest versions.</strong></p> <p>The following versions of Siemens SIN

Bajo
12 febCISA Cybersecurity Advisories