#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

37 C
Dubai
Thursday, July 3, 2025
HomeTopics 3OT - ICS - SCADA CybersecurityCISA Releases Three Critical Industrial Control Systems Advisories: Safeguarding Critical Infrastructure Against...

CISA Releases Three Critical Industrial Control Systems Advisories: Safeguarding Critical Infrastructure Against Emerging Threats

Date:

Related stories

PDFs: Portable Documents or Perfect Phishing Vectors?

Cybersecurity professionals are sounding the alarm: PDF attachments are...

Google Urgently Patches CVE‑2025‑6554 Zero‑Day in Chrome 138 Stable Update

On 26 June 2025, Google rapidly deployed a Stable Channel update...

French Police Arrest Five Key Operators Behind BreachForums Data-Theft Platform

On 25 June 2025, France’s specialist cybercrime unit (BL2C) detained five...
spot_imgspot_imgspot_imgspot_img

In a decisive move to enhance the cybersecurity posture of critical infrastructure systems, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued three new Industrial Control Systems (ICS) advisories. These advisories highlight vulnerabilities in widely used equipment across critical sectors such as communications, energy, and critical manufacturing. With the increasing complexity and interconnectedness of industrial control systems, any vulnerabilities within them pose significant risks to public safety, economic stability, and national security.

The vulnerabilities outlined by CISA affect three key systems: the TEM Opera Plus FM Family Transmitter, Subnet Solutions’ PowerSYSTEM Center, and Delta Electronics’ DIAEnergie system. These advisories underscore the critical importance of addressing security flaws in industrial systems and offer mitigation strategies to minimize the risk of exploitation. As the number of cyber threats targeting ICS continues to rise, addressing these vulnerabilities is crucial for ensuring the resilience of critical infrastructure worldwide.

1. TEM Opera Plus FM Family Transmitter Vulnerabilities

The TEM Opera Plus FM Family Transmitter is a widely deployed system in the communications sector, particularly in broadcasting applications. CISA’s advisory reveals two significant vulnerabilities within this transmitter:

  • Missing Authentication for Critical Function (CVE-2024-41988): This flaw allows unauthenticated access to critical functions within the system, enabling attackers to overwrite firmware and execute arbitrary code.
  • Cross-Site Request Forgery (CSRF) (CVE-2024-41987): Exploiting this vulnerability can allow malicious actors to perform administrative actions without authorization, potentially leading to the compromise of system integrity.

With these vulnerabilities assigned a CVSS v4 base score of 9.3 and 8.6, respectively, the risks posed by successful exploitation are considerable, including the possibility of remote code execution and unauthorized administrative control over the system. The fact that public proof-of-concept exploits for these vulnerabilities already exist further amplifies the urgency for operators to implement mitigations.

2. Subnet Solutions’ PowerSYSTEM Center Vulnerabilities

The second advisory pertains to Subnet Solutions’ PowerSYSTEM Center, a crucial tool used in the energy and critical manufacturing sectors. Three vulnerabilities have been identified in this system:

  • Server-Side Request Forgery (SSRF) (CVE-2020-28168): This vulnerability allows attackers to bypass proxy servers and access internal resources by manipulating requests.
  • Inefficient Regular Expression Complexity (CVE-2021-3749): Attackers can exploit this flaw to cause denial-of-service (DoS) conditions by overloading the system with resource-intensive regular expressions.
  • Cross-Site Request Forgery (CSRF) (CVE-2023-45857): This vulnerability allows unauthorized actions to be performed on behalf of authenticated users, potentially exposing sensitive data.

The CVSS scores for these vulnerabilities range from 5.9 to 7.5, indicating a moderate to high risk of exploitation. Given the critical nature of the industries relying on the PowerSYSTEM Center, it is imperative for organizations to address these vulnerabilities promptly to avoid operational disruptions.

3. Delta Electronics’ DIAEnergie Vulnerabilities

Delta Electronics’ DIAEnergie system, which is widely used in energy management and monitoring applications, was found to contain two severe SQL injection vulnerabilities (CVE-2024-43699 and CVE-2024-42417). These vulnerabilities, rated with CVSS v4 scores of 9.3 and 8.7, allow attackers to manipulate the system’s SQL queries, potentially retrieving sensitive data or causing service interruptions.

SQL injection vulnerabilities are particularly dangerous as they enable attackers to directly interact with the system’s database, potentially leading to data theft, manipulation, or even denial-of-service attacks. Given the critical role that energy management systems play in optimizing industrial operations, securing these systems is vital for ensuring the continued smooth operation of essential services.

10 Ways to Protect Against ICS Vulnerabilities

To mitigate the risks posed by these vulnerabilities and prevent future incidents, CISA and cybersecurity experts recommend the following 10 strategies:

  1. Segment ICS Networks from Business Networks: Use firewalls and network segmentation to isolate industrial control systems from business and public networks, reducing the attack surface.
  2. Implement Strong Authentication Mechanisms: Ensure all critical system functions require authentication, including multi-factor authentication (MFA), to prevent unauthorized access.
  3. Regularly Update and Patch Systems: Apply patches and updates to ICS software as soon as they are released. Unpatched systems are a prime target for attackers.
  4. Deploy Network Monitoring Solutions: Utilize intrusion detection systems (IDS) and other monitoring tools to detect unusual activity within ICS networks and respond promptly to potential threats.
  5. Minimize Remote Access: Limit remote access to control systems and use secure methods such as Virtual Private Networks (VPNs) to protect connections. Ensure that VPNs are regularly updated to address potential vulnerabilities.
  6. Conduct Regular Security Audits: Perform routine audits of ICS infrastructure to identify and address security gaps, vulnerabilities, and misconfigurations.
  7. Train Employees in Cybersecurity Best Practices: Educate employees and operators on cybersecurity awareness, phishing prevention, and the proper handling of system access credentials.
  8. Limit Privileged Access: Apply the principle of least privilege (PoLP) by granting access to only those functions necessary for a user’s role, reducing the potential for unauthorized actions.
  9. Use Web Application Firewalls (WAF): Implement WAF solutions to protect web interfaces of control systems from cross-site scripting (XSS), CSRF, and SQL injection attacks.
  10. Develop a Comprehensive Incident Response Plan: Ensure your organization has a well-documented and regularly tested incident response plan for ICS-related cybersecurity incidents, allowing for quick and effective remediation in the event of an attack.

Conclusion

As cyber threats targeting industrial control systems grow more sophisticated, it is essential for organizations in critical infrastructure sectors to remain vigilant. CISA’s release of these three advisories highlights the urgency of addressing vulnerabilities in widely deployed ICS systems to protect against potential exploitation. Whether it is through missing authentication, CSRF vulnerabilities, or SQL injections, attackers are constantly seeking opportunities to exploit weaknesses in ICS networks.

By adopting proactive security measures such as network segmentation, regular patching, and strong authentication, organizations can significantly reduce their exposure to cyberattacks. The consequences of failing to secure these systems could result in operational downtime, data breaches, and even physical harm to critical infrastructure. As these vulnerabilities demonstrate, the stakes are high, and the need for comprehensive cybersecurity defenses in industrial control systems has never been greater.

Want to stay on top of cybersecurity news? Follow us on Facebook, X (Twitter), Instagram, and LinkedIn for the latest threats, insights, and updates!

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here