• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

CISA Points New ICS Advisories on Vital Vulnerabilities and Exploits

Admin by Admin
August 27, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


The Cybersecurity and Infrastructure Safety Company (CISA) launched three Industrial Management Programs (ICS) advisories on August 26, 2025, detailing 9 essential vulnerabilities in INVT VT-Designer and HMITool (CVSS v4 8.5).

A number of flaws in Schneider Electrical Modicon M340 controllers (CVSS v4 scores as much as 9.1), and several other points in Danfoss AK-SM 8xxA Sequence drives (CVSS v3.1 scores as much as 9.0). Quick mitigations are urged to stop distant code execution and unauthorized entry.

INVT VT-Designer and HMITool Vulnerabilities

The primary advisory (ICSA-25-238-01) covers 9 memory-corruption and type-confusion flaws in INVT’s VT-Designer 2.1.13 and HMITool 7.1.011. Exploitation requires consumer interplay however can yield arbitrary code execution at excessive privileges:

  • CVE-2025-7223 by way of CVE-2025-7226: Out-of-bounds write in HMITool (CVSS v3.1 7.8; CVSS v4 8.5)
  • CVE-2025-7227 by way of CVE-2025-7229, CVE-2025-7231: Out-of-bounds write in VT-Designer (CVSS v3.1 7.8; CVSS v4 8.5)
  • CVE-2025-7230: Sort-confusion in VT-Designer (CVSS v3.1 7.8; CVSS v4 8.5)

These vulnerabilities affect essential infrastructure sectors worldwide, together with Vitality, IT, Transportation, and Manufacturing.

CISA urges community segmentation, firewall isolation, VPN hardening, and strict entry controls to mitigate danger.

Schneider Electrical Modicon M340 Controller Flaws

The second advisory (ICSA-25-238-03) identifies remote-accessible buffer overflows and improper entry management in Schneider Electrical Modicon M340 controllers and communication modules. Key CVEs embody:

  • CVE-2025-7241, CVE-2025-7242: Stack-based buffer overflow in Ethernet port handler (CVSS v3.1 8.3; CVSS v4 9.1)
  • CVE-2025-7243: Heap-based overflow by way of malformed Modbus packets (CVSS v3.1 8.6; CVSS v4 9.0)
  • CVE-2025-7244: Improper authentication bypass on internet administration interface (CVSS v3.1 7.5; CVSS v4 8.2)

Profitable exploitation can permit unauthorized code execution or configuration modifications, posing important operational dangers.

Distributors have launched firmware updates; customers should validate firmware variations ≥ 2.3.5-B for M340 CPU and modules.

Danfoss AK-SM 8xxA Sequence Drive Vulnerabilities

The third advisory (ICSA-25-140-03 Replace A) covers a number of vulnerabilities in Danfoss AK-SM 8xxA Sequence variable-frequency drives. Notable CVEs are:

  • CVE-2025-7310: Out-of-bounds learn in Modbus/TCP parser (CVSS v3.1 7.2)
  • CVE-2025-7311: Improper enter validation in serial interface (CVSS v3.1 6.8)
  • CVE-2025-7312: Authentication bypass in FTP administration module (CVSS v3.1 7.9)

These may allow distant monitoring or alteration of drive parameters, affecting industrial operations. Danfoss launched firmware patch 1.12.0 addressing all points; fast updates are advisable.

CISA strongly advises asset house owners to use vendor patches, isolate ICS networks, implement least-privilege entry, and monitor for exploit makes an attempt. Detailed mitigations and greatest practices can be found on the CISA ICS webpage.

Discover this Information Fascinating! Observe us on Google Information, LinkedIn, and X to Get Instantaneous Updates!

Tags: AdvisoriesCISACriticalExploitsICSIssuesVulnerabilities
Admin

Admin

Next Post
Latest books from the MIT neighborhood

Latest books from the MIT neighborhood

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

10 Issues I Want I Might Do In A Pokémon Recreation

10 Issues I Want I Might Do In A Pokémon Recreation

November 12, 2025
Hackers Goal Perplexity Comet Browser Customers

Hackers Goal Perplexity Comet Browser Customers

October 26, 2025

Trending.

The way to Clear up the Wall Puzzle in The place Winds Meet

The way to Clear up the Wall Puzzle in The place Winds Meet

November 16, 2025
Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

March 29, 2026
Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

March 16, 2026
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Gemini 2.5 Professional Preview: even higher coding efficiency

Gemini 2.5 Professional Preview: even higher coding efficiency

April 12, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

RansomHub associates linked to rival RaaS suppliers

This month in safety with Tony Anscombe – September 2025 version

April 13, 2026
Google March Core Replace Visibility Shifts & Patterns Within the US – Worldwide search engine optimization Guide, Creator & Speaker

Google March Core Replace Visibility Shifts & Patterns Within the US – Worldwide search engine optimization Guide, Creator & Speaker

April 13, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved