• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

CISA Points New ICS Advisories on Vital Vulnerabilities and Exploits

Admin by Admin
August 27, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


The Cybersecurity and Infrastructure Safety Company (CISA) launched three Industrial Management Programs (ICS) advisories on August 26, 2025, detailing 9 essential vulnerabilities in INVT VT-Designer and HMITool (CVSS v4 8.5).

A number of flaws in Schneider Electrical Modicon M340 controllers (CVSS v4 scores as much as 9.1), and several other points in Danfoss AK-SM 8xxA Sequence drives (CVSS v3.1 scores as much as 9.0). Quick mitigations are urged to stop distant code execution and unauthorized entry.

INVT VT-Designer and HMITool Vulnerabilities

The primary advisory (ICSA-25-238-01) covers 9 memory-corruption and type-confusion flaws in INVT’s VT-Designer 2.1.13 and HMITool 7.1.011. Exploitation requires consumer interplay however can yield arbitrary code execution at excessive privileges:

  • CVE-2025-7223 by way of CVE-2025-7226: Out-of-bounds write in HMITool (CVSS v3.1 7.8; CVSS v4 8.5)
  • CVE-2025-7227 by way of CVE-2025-7229, CVE-2025-7231: Out-of-bounds write in VT-Designer (CVSS v3.1 7.8; CVSS v4 8.5)
  • CVE-2025-7230: Sort-confusion in VT-Designer (CVSS v3.1 7.8; CVSS v4 8.5)

These vulnerabilities affect essential infrastructure sectors worldwide, together with Vitality, IT, Transportation, and Manufacturing.

CISA urges community segmentation, firewall isolation, VPN hardening, and strict entry controls to mitigate danger.

Schneider Electrical Modicon M340 Controller Flaws

The second advisory (ICSA-25-238-03) identifies remote-accessible buffer overflows and improper entry management in Schneider Electrical Modicon M340 controllers and communication modules. Key CVEs embody:

  • CVE-2025-7241, CVE-2025-7242: Stack-based buffer overflow in Ethernet port handler (CVSS v3.1 8.3; CVSS v4 9.1)
  • CVE-2025-7243: Heap-based overflow by way of malformed Modbus packets (CVSS v3.1 8.6; CVSS v4 9.0)
  • CVE-2025-7244: Improper authentication bypass on internet administration interface (CVSS v3.1 7.5; CVSS v4 8.2)

Profitable exploitation can permit unauthorized code execution or configuration modifications, posing important operational dangers.

Distributors have launched firmware updates; customers should validate firmware variations ≥ 2.3.5-B for M340 CPU and modules.

Danfoss AK-SM 8xxA Sequence Drive Vulnerabilities

The third advisory (ICSA-25-140-03 Replace A) covers a number of vulnerabilities in Danfoss AK-SM 8xxA Sequence variable-frequency drives. Notable CVEs are:

  • CVE-2025-7310: Out-of-bounds learn in Modbus/TCP parser (CVSS v3.1 7.2)
  • CVE-2025-7311: Improper enter validation in serial interface (CVSS v3.1 6.8)
  • CVE-2025-7312: Authentication bypass in FTP administration module (CVSS v3.1 7.9)

These may allow distant monitoring or alteration of drive parameters, affecting industrial operations. Danfoss launched firmware patch 1.12.0 addressing all points; fast updates are advisable.

CISA strongly advises asset house owners to use vendor patches, isolate ICS networks, implement least-privilege entry, and monitor for exploit makes an attempt. Detailed mitigations and greatest practices can be found on the CISA ICS webpage.

Discover this Information Fascinating! Observe us on Google Information, LinkedIn, and X to Get Instantaneous Updates!

Tags: AdvisoriesCISACriticalExploitsICSIssuesVulnerabilities
Admin

Admin

Next Post
Latest books from the MIT neighborhood

Latest books from the MIT neighborhood

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Ideas For Operating Competitor Campaigns In Paid Search

Ideas For Operating Competitor Campaigns In Paid Search

August 23, 2025
15 Advertising Concepts for Your Small Companies (+ Free Guidelines)

15 Advertising Concepts for Your Small Companies (+ Free Guidelines)

July 3, 2025

Trending.

New Win-DDoS Flaws Let Attackers Flip Public Area Controllers into DDoS Botnet through RPC, LDAP

New Win-DDoS Flaws Let Attackers Flip Public Area Controllers into DDoS Botnet through RPC, LDAP

August 11, 2025
Microsoft Launched VibeVoice-1.5B: An Open-Supply Textual content-to-Speech Mannequin that may Synthesize as much as 90 Minutes of Speech with 4 Distinct Audio system

Microsoft Launched VibeVoice-1.5B: An Open-Supply Textual content-to-Speech Mannequin that may Synthesize as much as 90 Minutes of Speech with 4 Distinct Audio system

August 25, 2025
Stealth Syscall Method Permits Hackers to Evade Occasion Tracing and EDR Detection

Stealth Syscall Method Permits Hackers to Evade Occasion Tracing and EDR Detection

June 2, 2025
Qilin Ransomware Makes use of TPwSav.sys Driver to Bypass EDR Safety Measures

Qilin Ransomware Makes use of TPwSav.sys Driver to Bypass EDR Safety Measures

July 31, 2025
How you can open the Antechamber and all lever places in Blue Prince

How you can open the Antechamber and all lever places in Blue Prince

April 14, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

The way to generate leads out of your web site (16 professional ideas)

The way to generate leads out of your web site (16 professional ideas)

August 27, 2025
Methods to increase storage in Story of Seasons: Grand Bazaar

Methods to increase storage in Story of Seasons: Grand Bazaar

August 27, 2025
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved