Additional vulnerabilities documented in the advisory include an improper limitation of pathname to a restricted directory (CVE-2024-3980), commonly known as path traversal vulnerability, along with authentication bypass (CVE-2024-3982), missing authentication for critical function (CVE-2024-7940), and URL redirection to untrusted sites (CVE-2024-7941). This flaw rated CVSS v3.1 9.9 and CVSS v4.0 9.4, allows authenticated attackers with administrative privileges to execute remote code on Industrial Data Center (IDC) Generations 1–5 and VersaVirtual Appliance (VVA) Series A–C systems. These advisories, ICSA-25-091-01 and ICSA-24-331-04, address security flaws in Rockwell Automation and Hitachi Energy products respectively, providing essential information about vulnerabilities that could potentially compromise industrial operations if exploited. No public exploitation targeting these specific vulnerabilities has been reported to CISA at this time, but organizations are urged to act promptly to secure their systems against potential threats. The advisories represent part of CISA’s ongoing effort to address growing cyber threats targeting operational technologies that control essential industrial processes. For comprehensive protection guidance, CISA provides additional resources through its ICS webpage, including detailed technical information papers and cybersecurity best practices documents. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Exploitation occurs via untrusted data deserialization in Veeam’s backup software, potentially enabling lateral movement across operational technology (OT) networks. CISA emphasizes urgency due to the vulnerability’s critical manufacturing sector impact and recommends reviewing mitigation strategies in their ICS-TIP-12-146-01B technical document. The most critical vulnerability (CVE-2024-4872) received a CVSS v3 base score of 9.9, indicating the potential for severe impact if exploited. The vulnerabilities affect various versions of the MicroSCADA Pro/X SYS600 product line, including versions 10.0 through 10.5 and some 9.4 versions with specific feature packs. This flaw exists in the query validation functionality and could allow authenticated attackers to inject malicious code towards persistent data. CISA strongly encourages users and administrators of affected systems to review the advisories immediately and implement recommended mitigations. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security.
This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 02 Apr 2025 09:05:09 +0000