ControlbyWeb Relay

RISK EVALUATION. Successful exploitation of this vulnerability could allow an authenticated attacker to run malicious code during a user's session.
The affected ControlByWeb Relay products are vulnerable to a stored cross-site scripting vulnerability, which could allow an attacker to inject arbitrary scripts into the endpoint of a web interface that could run malicious javascript code during a user's session.
CVE-2023-6333 has been assigned to this vulnerability.
A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is.
Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
Locate control system networks and remote devices behind firewalls and isolating them from business networks.
When remote access is required, use more secure methods, such as virtual private networks, recognizing VPNs may have vulnerabilities and should be updated to the most current version available.
Also recognize VPN is only as secure as the connected devices.
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.
Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.
Gov/ics in the technical information paper, ICS-TIP-12-146-01B-Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


This Cyber News was published on www.cisa.gov. Publication date: Thu, 07 Dec 2023 17:00:27 +0000


Cyber News related to ControlbyWeb Relay

CVE-2024-2103 - Inclusion of undocumented features vulnerability accessible when logged on with a privileged access level on the following Schweitzer Engineering Laboratories relays could allow the relay to behave unpredictably: SEL-700BT Motor Bus Transfer Relay, ...
1 year ago Tenable.com
ControlbyWeb Relay - RISK EVALUATION. Successful exploitation of this vulnerability could allow an authenticated attacker to run malicious code during a user's session. The affected ControlByWeb Relay products are vulnerable to a stored cross-site scripting ...
1 year ago Cisa.gov CVE-2023-6333
CVE-2017-7905 - A Weak Cryptography for Passwords issue was discovered in General Electric (GE) Multilin SR 750 Feeder Protection Relay, firmware versions prior to Version 7.47; SR 760 Feeder Protection Relay, firmware versions prior to Version 7.47; SR 469 Motor ...
5 years ago
CVE-2021-21404 - Syncthing is a continuous file synchronization program. In Syncthing before version 1.15.0, the relay server `strelaysrv` can be caused to crash and exit by sending a relay message with a negative length field. Similarly, Syncthing itself can crash ...
4 years ago
CVE-2020-3442 - The DuoConnect client enables users to establish SSH connections to hosts protected by a DNG instance. When a user initiates an SSH connection to a DNG-protected host for the first time using DuoConnect, the user’s browser is opened to a login ...
4 years ago
CVE-2024-1683 - Tenable Identity Exposure Secure Relay leverages third-party software to help provide underlying functionality. One of the third-party components (Envoy) was found to contain vulnerabilities, and updated versions have been made available by the ...
1 year ago Tenable.com
Tor University Challenge: First Semester Report Card - In August of 2023 EFF announced the Tor University Challenge, a campaign to get more universities around the world to operate Tor relays. The primary goal of this campaign is to strengthen the Tor network by creating more high bandwidth and reliable ...
1 year ago Eff.org
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com
Recommended Practices for Enterprise Electronic Messaging Security and Governance - Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, ...
1 year ago Cybersecurity-insiders.com

Cyber Trends (last 7 days)