ALL NEWS

CERT Advisories

Official advisories from CERTs and security teams

Validación incorrecta de la entrada en Mitsubishi Electric

<span class="field field--name-title field--type-string field--label-hidden">Validación incorrecta de la entrada en Mitsubishi Electric</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-05">Jue, 05/02/2026 - 09:53</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/inc

7ч назадINCIBE-CERT

Ausencia de autenticación en switches de Ethernet de Moxa

<span class="field field--name-title field--type-string field--label-hidden">Ausencia de autenticación en switches de Ethernet de Moxa</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-04">Mié, 04/02/2026 - 09:11</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/inci

1д назадINCIBE-CERT

Ausencia de autenticación en Light Engine Pro de Avation

<span class="field field--name-title field--type-string field--label-hidden">Ausencia de autenticación en Light Engine Pro de Avation</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-04">Mié, 04/02/2026 - 09:13</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incib

1д назадINCIBE-CERT

Ausencia de autenticación en MOMA Seismic Station de RISS SRL

<span class="field field--name-title field--type-string field--label-hidden">Ausencia de autenticación en MOMA Seismic Station de RISS SRL</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-04">Mié, 04/02/2026 - 09:20</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/

1д назадINCIBE-CERT

CISA Adds Four Known Exploited Vulnerabilities to Catalog

<p>CISA has added four new vulnerabilities to its <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation. </p> <ul> <li><a href="https://www.cve.org/CVERecord?id=CVE-2019-19006" target="_blank">CVE-2019-19006</a> Sangoma&

CVE-2019-19006
2д назадCISA Cybersecurity Advisories

Mitsubishi Electric FREQSHIP-mini for Windows

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-034-01.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to, modify, delete, or destroy information stored on the system where the affected product is installed, or cause a denial-of-service condition on the affected system.</stro

Низкий
2д назадCISA Cybersecurity Advisories

RISS SRL MOMA Seismic Station

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-034-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could result in an unauthenticated attacker creating a denial-of-service condition.</strong></p> <p>The following versions of RISS SRL MOMA Seismic Station are affected:</p> <ul> <li>MOMA Seis

Низкий
2д назадCISA Cybersecurity Advisories

Avation Light Engine Pro

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-034-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow an attacker to take full control of the device.</strong></p> <p>The following versions of Avation Light Engine Pro are affected:</p> <ul> <li>Light Engine Pro vers:all/* (CVE-2026-

Низкий
2д назадCISA Cybersecurity Advisories

Synectix LAN 232 TRIO

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-034-04.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could result in an unauthenticated attacker modifying critical device settings or factory resetting the device.</strong></p> <p>The following versions of Synectix LAN 232 TRIO are affected:</p> <ul>

Критический
2д назадCISA Cybersecurity Advisories

Ejecución de código en FREQSHIP-mini de Mitsubishi

<span class="field field--name-title field--type-string field--label-hidden">Ejecución de código en FREQSHIP-mini de Mitsubishi</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-03">Mar, 03/02/2026 - 09:35</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-cert

2д назадINCIBE-CERT

Ejecución remota de comandos en productos de Hikvision

<span class="field field--name-title field--type-string field--label-hidden">Ejecución remota de comandos en productos de Hikvision</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-02-02">Lun, 02/02/2026 - 10:06</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-

3д назадINCIBE-CERT

Ausencia de autenticación en la serie de codificadores de KiloView

<span class="field field--name-title field--type-string field--label-hidden">Ausencia de autenticación en la serie de codificadores de KiloView</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-30">Vie, 30/01/2026 - 10:13</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incib

6д назадINCIBE-CERT

Rockwell Automation ControlLogix

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-029-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition.</strong></p> <p>The following versions of Rockwell Automation ControlLogix are affected:</p> <ul> <li>ControlLogix Redundancy En

Низкий
29 янв.CISA Cybersecurity Advisories

Rockwell Automation ArmorStart LT

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-029-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could allow an attacker to cause a denial-of-service condition.</strong></p> <p>The following versions of Rockwell Automation ArmorStart LT are affected:</p> <ul> <li>ArmorStart LT 290D &am

Низкий
29 янв.CISA Cybersecurity Advisories

KiloView Encoder Series

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-029-01.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow an unauthenticated attacker to create or delete administrator accounts, granting full administrative control.</strong></p> <p>The following versions of KiloView Encoder Series are affected:</p&gt

Низкий
29 янв.CISA Cybersecurity Advisories

Asignación incorrecta de permisos en ibaPDA de iba Systems

<span class="field field--name-title field--type-string field--label-hidden">Asignación incorrecta de permisos en ibaPDA de iba Systems</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-29">Jue, 29/01/2026 - 09:21</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/inc

29 янв.INCIBE-CERT

Fortinet Releases Guidance to Address Ongoing Exploitation of Authentication Bypass Vulnerability CVE-2026-24858

<p>Newly disclosed vulnerability <a href="https://www.cve.org/CVERecord?id=CVE-2026-24858" target="_blank">Common Vulnerabilities and Exposures (CVE)-2026-24858</a> [<a href="https://cwe.mitre.org/data/definitions/288.html" target="_blank" title="CWE-288: Authentication Bypass Using an Alternate Path or Channel">Common Weakness Enumeration (CWE)-288: Authentication Bypass Using an Alternate Path or Channel</a>] allow

CVE-2026-24858
Низкий
28 янв.CISA Cybersecurity Advisories

Múltiples vulnerabilidades en productos de Beckhoff

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en productos de Beckhoff</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-28">Mié, 28/01/2026 - 10:02</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-cer

28 янв.INCIBE-CERT

CISA Adds One Known Exploited Vulnerability to Catalog

<p>CISA has added one new vulnerability to its <a href="/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation.</p> <ul> <li><a href="https://www.cve.org/CVERecor

27 янв.CISA Cybersecurity Advisories

Schneider Electric Zigbee Products

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-027-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Schneider Electric is aware of multiple vulnerabilities with EmberZNet disclosed by Silicon Labs. Many vendors, including Schneider Electric, use Silicon Labs’ Zigbee processors in their offers. The following have denial of service vulnerabilities: Wiser iTRV, Wis

Низкий
27 янв.CISA Cybersecurity Advisories

Festo Didactic SE MES PC

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-027-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>MES PCs shipped with Windows 10 come pre-installed with XAMPP. XAMPP is a bundle of third-party open-source applications including the Apache HTTP Server, the MariaDB database and more. From time to time, vulnerabilities in these applications are discovered. These

27 янв.CISA Cybersecurity Advisories

Johnson Controls Products

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-027-04.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could result in remote SQL execution, leading to alteration or loss of data.</strong></p> <p>The following versions of Johnson Controls Products are affected:</p> <ul> <li>Applicatio

Низкий
27 янв.CISA Cybersecurity Advisories

CISA Adds Five Known Exploited Vulnerabilities to Catalog

<p>CISA has added five new vulnerabilities to its <a href="/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation.</p> <ul> <li><a href="https://www.cve.org/CVERe

26 янв.CISA Cybersecurity Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

<div class="OutlineElement Ltr SCXW240314876 BCX8"> <p>CISA has added one new vulnerability to its <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"><u>Known Exploited Vulnerabilities (KEV) Catalog</u></a>, based on evidence of active exploitation. </p> </div> <div class="ListContainerWrapper SCXW240314876 BCX8"> <ul> <li><a class="Hyperlink SCXW240314876 BCX8&quo

23 янв.CISA Cybersecurity Advisories

Product Categories for Technologies That Use Post-Quantum Cryptography Standards

<h2><strong>Executive Summary</strong></h2> <p>In response to the June 6, 2025, Executive Order (EO) 14306, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144,” the Cybersecurity and Infrastructure Security Agency (CISA) is providing and regularly updating the below lists to aid in post-quantum cryptography (PQC) adoption. The lists include hardware and software categories with example typ

Низкий
23 янв.CISA Cybersecurity Advisories

Omisión de autorización en hubs de Hubitat Elevation

<span class="field field--name-title field--type-string field--label-hidden">Omisión de autorización en hubs de Hubitat Elevation</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-23">Vie, 23/01/2026 - 10:19</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-ce

23 янв.INCIBE-CERT

Múltiples vulnerabilidades en productos Weintek

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en productos Weintek</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-23">Vie, 23/01/2026 - 10:58</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-cert/av

23 янв.INCIBE-CERT

Desbordamiento de búfer basado en pila en iSTAR de Johnson Controls

<span class="field field--name-title field--type-string field--label-hidden">Desbordamiento de búfer basado en pila en iSTAR de Johnson Controls</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-23">Vie, 23/01/2026 - 09:45</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.inci

23 янв.INCIBE-CERT

CISA Adds Four Known Exploited Vulnerabilities to Catalog

<p>CISA has added four new vulnerabilities to its <a href="/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation.</p> <ul> <li><a href="https://www.cve.org/CVERe

22 янв.CISA Cybersecurity Advisories

Hubitat Elevation Hubs

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-06.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow an authenticated attacker to escalate their privileges and control devices outside of their authorized scope.</strong></p> <p>The following versions of Hubitat Elevation Hubs are affected:

Низкий
22 янв.CISA Cybersecurity Advisories

AutomationDirect CLICK Programmable Logic Controller

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could allow an attacker to impersonate users, escalate privileges, gain unauthorized access to systems and services, and decrypt sensitive data.</strong></p> <p>The following versions of Automation

Низкий
22 янв.CISA Cybersecurity Advisories

Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-04.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow an attacker to cause a failure within the operating system of the machine hosting the ICU tool.</strong></p> <p>The following versions of Johnson Controls Inc. iSTAR Configuration Utility

Низкий
22 янв.CISA Cybersecurity Advisories

Delta Electronics DIAView

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-07.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could enable an attacker to execute arbitrary code.</strong></p> <p>The following versions of Delta Electronics DIAView are affected:</p> <ul> <li>DIAView (CVE-2026-0975)</li>

CVE-2026-0975
Низкий
22 янв.CISA Cybersecurity Advisories

Weintek cMT X Series HMI EasyWeb Service

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-05.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could allow a low-level user to alter privileges and gain full control to the device.</strong></p> <p>The following versions of Weintek cMT X Series HMI EasyWeb Service are affected:</p> <

Низкий
22 янв.CISA Cybersecurity Advisories

EVMAPA

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-08.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities could lead to degraded service, a denial-of-service, or unauthorized remote command execution, which could lead to spoofing or a manipulation of charging station statuses.</strong></p> <p>The follo

22 янв.CISA Cybersecurity Advisories

Schneider Electric EcoStruxure Process Expert

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-01.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Schneider Electric is aware of a vulnerability in its EcoStruxureTM Process and EcoStruxure™ Process Expert for AVEVA System Platform products. The EcoStruxureTM Process is a single automation system to engineer, operate, and maintain your entire infrastructure fo

22 янв.CISA Cybersecurity Advisories

Rockwell Automation CompactLogix 5370

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition.</strong></p> <p>The following versions of Rockwell Automation CompactLogix 5370 are affected:</p> <ul> <li>CompactLogi

Низкий
22 янв.CISA Cybersecurity Advisories

Múltiples vulnerabilidades en MedDream PACS Premium

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en MedDream PACS Premium</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-22">Jue, 22/01/2026 - 09:22</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-cer

22 янв.INCIBE-CERT

CISA Adds One Known Exploited Vulnerability to Catalog

<p>CISA has added one new vulnerability to its <a href="/known-exploited-vulnerabilities-catalog" data-entity-type="node" data-entity-uuid="79453b83-86b9-4e2f-b1ec-abf73c6eb291" data-entity-substitution="canonical" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>, based on evidence of active exploitation.</p> <ul> <li><a href="https://www.cve.org/CVERecor

21 янв.CISA Cybersecurity Advisories

Múltiples vulnerabilidades en productos de Rockwell Automation

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en productos de Rockwell Automation</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-21">Mié, 21/01/2026 - 11:13</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es

21 янв.INCIBE-CERT

Schneider Electric devices using CODESYS Runtime

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-020-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Schneider Electric is aware of multiple vulnerabilities disclosed on CODESYS runtime system V3 communication server. Many vendors, including Schneider Electric, embed CODESYS in their offers. If successfully exploited, these vulnerabilities could result in a denia

20 янв.CISA Cybersecurity Advisories

Rockwell Automation Verve Asset Manager

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-020-03.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Successful exploitation of these vulnerabilities may allow an attacker to access sensitive information stored in variables within the ADI server.</strong></p> <p>The following versions of Rockwell Automation Verve Asset Manager are affected:</

Низкий
20 янв.CISA Cybersecurity Advisories

Schneider Electric EcoStruxure Foxboro DCS

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-020-01.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Schneider Electric is aware of a vulnerability disclosed by INTEL used in the EcoStruxure™ Foxboro DCS product formerly known as Foxboro Evo Process Automation System and I/A Series. The [EcoStruxure™ Foxboro DCS product](https://www.se.com/ww/en/product-range/636

20 янв.CISA Cybersecurity Advisories

Múltiples vulnerabilidades en productos de B&R

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en productos de B&amp;R</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-20">Mar, 20/01/2026 - 12:28</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-

20 янв.INCIBE-CERT

Inyección de HTML en Isshue de Bdtask

<span class="field field--name-title field--type-string field--label-hidden">Inyección de HTML en Isshue de Bdtask</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-19">Lun, 19/01/2026 - 12:10</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-cert/avisos/aviso

19 янв.INCIBE-CERT

Omisión de autenticación en productos de ABB

<span class="field field--name-title field--type-string field--label-hidden">Omisión de autenticación en productos de ABB</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-19">Lun, 19/01/2026 - 09:55</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/incibe-cert/aviso

19 янв.INCIBE-CERT

Múltiples vulnerabilidades en DIAView de Delta Electronics

<span class="field field--name-title field--type-string field--label-hidden">Múltiples vulnerabilidades en DIAView de Delta Electronics</span> <span class="field field--name-created field--type-created field--label-hidden"><time class="datetime" datetime="2026-01-19">Lun, 19/01/2026 - 10:13</time> </span> <div class="field field--name-field-tipos-de-avisos field--type-entity-reference field--label-hidden field__item"><a href="https://www.incibe.es/inc

19 янв.INCIBE-CERT

Festo Firmware

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-015-02.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Incomplete Festo product documentation of remote accessible functions and their required IP ports. Depending on the product a description of the supported features can be found in the product documentation to some extent. Update A, 2022-12-13 Added affected device "Bus modu

14 янв.CISA Cybersecurity Advisories

Schneider Electric EcoStruxure Power Build Rapsody

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-015-10.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Schneider Electric is aware of a vulnerability in its EcoStruxure Power Build Rapsody software. The [EcoStruxure Power Build Rapsody](https://www.se.com/ww/en/product-country-selector/?pageType=product-range&amp;sourceId=2309) is used to enter or import the single line

14 янв.CISA Cybersecurity Advisories

Siemens Industrial Edge Devices

<p><a href="https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-015-08.json"><strong>View CSAF</strong></a></p> <h2>Summary</h2> <p><strong>Siemens Industrial Edge Devices contain an authorization bypass vulnerability that could facilitate an unauthenticated remote attacker to circumvent authentication and impersonate a legitimate user. Siemens has released new versions for several affected products and recomme

14 янв.CISA Cybersecurity Advisories