Critical Infrastructure Alert
Urgent ICS Vulnerability Advisory
Stay informed on the latest security threats impacting critical infrastructure. Discover the vulnerabilities affecting key industry players and learn how to protect your systems.
TECHNICAL DEEP DIVE IN HERE
We get that not everyone wants the super detailed nitty-gritty. But we did the research and it would be a shame to just let it rot in file on our computers when it could just as easily rot here where you can enjoy it. You know, if you’re into that kind of thing.
EXPAND FOR THE DEEP DIVE
CISA ICS Advisory Deep Dive (April 10, 2025): Siemens, Rockwell, ABB – Time to Patch!
1.0 The Executive Summary)
What’s the Point? Look, CISA dropped a bunch of Industrial Control System (ICS) advisories on April 10, 2025. This report cuts through the noise and tells you what really matters about the security holes found in Siemens, Rockwell Automation, and ABB gear.1 Forget the theory; we’re talking real-world risks, how bad guys could break in, and what you actually need to do to stop them, especially if you’re running critical infrastructure.
The Gory Details (Key Findings): We dug into eight of these advisories, and here’s the lowdown:
- Wide-Open Doors (Critical Remote Vulns): Alarm bells should be ringing. We found some nasty, critical-level vulns you can hit remotely, without needing special access or tricking users. Think weak logins on Siemens Industrial Edge devices (CVE-2024-54092, a scary 9.8 CVSS score) 2, potential full system takeover (RCE) on Siemens Insights Hub Private Cloud thanks to “IngressNightmare” bugs (like CVE-2025-1974, another 9.8) 3, and ways to own ABB Arctic Wireless Gateways via SMS or SSH shenanigans (CVE-2023-47610 & CVE-2024-6387, both scoring 9.2).4 Easy peasy for attackers.
- No Patch? Big Problem: Get this – the Siemens SENTRON 7KT PAC1260 Data Manager is riddled with critical holes (including hardcoded passwords scoring a perfect 10.0 CVSS!), and Siemens says “tough luck, replace the hardware.”5 Ouch. Plus, some Siemens Industrial Edge boxes are still waiting for a patch for that critical login bypass.2
- Supply Chain Nightmares: It’s not just the vendors’ code. Flaws popped up in stuff they use, like Telit modems and OpenSSH in ABB gateways 4, the ingress-nginx controller in Siemens Insights Hub 3, and even basic libraries like Rust in Siemens SIDIS Prime.6 Your security is only as strong as the weakest link in the chain.
- Hitting Where It Hurts (Critical Sectors): This isn’t niche stuff. The affected Siemens, Rockwell, and ABB products are everywhere in Critical Manufacturing and Energy. A breach here could be catastrophic.2
- Ready to Exploit? CISA didn’t see active attacks using these specific CVEs when they published 2, but don’t breathe easy. The underlying bugs in things like ingress-nginx 10, Telit modems 12, and OpenSSH 13 are public knowledge. Plus, hackers love targeting ICS, especially edge devices and critical infrastructure.15 It’s only a matter of time.
- The Usual Suspects (Recommendations): The advice boils down to this: Patch if you can, segment your networks like crazy, lock down remote access, use strong passwords and controls, watch your logs like a hawk, and train your users not to be click-happy.
How Worried Should You Be? VERY. We rate the urgency as HIGH. Why? Critical scores, remote access holes, bad guys already targeting these sectors and vendors 16, some underlying bugs being public knowledge, and the fact that messing up ICS can cause real physical damage and chaos.19
What’s Inside: We’ll cover the overall threat scene, dive deep into each advisory, spotlight the risks for Manufacturing and Energy, talk about real-world urgency, and wrap up with the key takeaways and your to-do list. There’s a handy vulnerability table in the appendix too.
2.0 Setting the Stage (Introduction)
The News: On April 10, 2025, Uncle Sam’s cybersecurity agency, CISA, sounded the alarm with ten new Industrial Control Systems (ICS) advisories.1 Think of these as public service announcements for the folks running the machinery behind modern life. This report zeroes in on eight advisories hitting the big players: Siemens, Rockwell Automation, and ABB.1 CISA’s job is to get this info out so you can lock things down.20
What We Looked At: Our magnifying glass is focused on these specific CISA alerts:
- ICSA-25-100-01 Siemens License Server 7
- ICSA-25-100-02 Siemens SIDIS Prime 6
- ICSA-25-100-03 Siemens Solid Edge 8
- ICSA-25-100-04 Siemens Industrial Edge Devices 2
- ICSA-25-100-05 Siemens Insights Hub Private Cloud 3
- ICSA-25-100-06 Siemens SENTRON 7KT PAC1260 Data Manager 5
- ICSA-25-100-07 Rockwell Automation Arena 9
- ICSA-25-100-09 ABB Arctic Wireless Gateways 4
How We Did It: We tore apart each CISA advisory 2, checked the vendors’ own security notes (like Siemens ProductCERT 7, Rockwell 23, and ABB 24), and mixed in intel about where this stuff is used 6, known exploits for the building blocks involved 10, who’s attacking these industries 16, and general ICS security 101.19 Quick heads-up: CISA stopped updating Siemens advisories after posting them (as of Jan 2023), so you have to check Siemens ProductCERT for the latest scoop.7
Why ICS Security is a Big Deal: These aren’t just computers; they run power plants, factories, and more.33 If they get hacked, things can go boom – literally. We’re talking blackouts, production halts costing fortunes 19, environmental disasters, and people getting hurt.19 Plus, everything’s getting connected (IT meets OT), and the hackers targeting this stuff are getting smarter.16 Ignoring ICS security is playing with fire.
3.0 The Big Picture: What We’re Up Against
Okay, before we dissect the specific bugs from April 10, let’s zoom out. These new CVEs didn’t appear in a vacuum. The bad guys targeting ICS have their usual playbook, and vulnerabilities like these are exactly what they look for.
What Hackers Are Doing Right Now: Attackers are constantly scanning the internet for weak spots, especially in systems common in industrial settings. CISA even keeps a “Most Wanted” list called the Known Exploited Vulnerabilities (KEV) catalog – basically, bugs that hackers are actively using in the wild.21 Rockwell Automation even pulls this KEV data into their own alerts.23 A recent scary example? CVE-2025-22457 in Ivanti VPNs.15 Looked minor at first, but some sharp attackers (Mandiant thinks it’s a China-linked group, UNC5221) figured out how to turn it into a full remote takeover.15 They started hitting systems mid-March 2025, proving they can weaponize bugs fast, especially on those crucial edge devices that connect networks.15
Just because the specific Siemens, Rockwell, and ABB CVEs from April 10 weren’t yet on the KEV list when CISA published 2 doesn’t mean they’re safe. Hackers love hitting infrastructure like VPNs and edge devices because they’re often the front door to the OT network.15 New bugs in these areas are like fresh meat. Groups like UNC5221 (also tied to VOLTZITE/Volt Typhoon) 15 are known to go after OT data and systems.16 So, a missing KEV entry might just mean nobody’s caught them using it yet. Don’t bet on that lasting.
Who’s Attacking and Why: Critical sectors like Energy and Manufacturing are prime targets for everyone from state spies to ransomware gangs looking for a payday.16 Groups like VOLTZITE (Volt Typhoon’s cousin) specifically hunt for OT blueprints, network maps, and manuals.16 Others like KAMACITE and ELECTRUM go after energy systems, sometimes with destructive malware, especially during conflicts.16 And ransomware? It’s booming. Dragos saw a 60% jump in ransomware gangs hitting industrial targets in early 2024 compared to 2023.16
Their Playbook (Common TTPs): How do they get in and cause trouble?
- Hitting known bugs, often in internet-facing stuff.16
- Using weak or stolen passwords for remote access.16
- Tricking users with phishing emails.16
- Using basic tools already on your system (living-off-the-land) for spying (like ping, net, systeminfo, CurrPorts, TCPView) and moving around (like PowerShell for SMB logins).17
- Stealing more passwords.17
- Turning off your antivirus (like Microsoft Defender).17
- Grabbing sensitive data like config files, database backups (using tools like SQLCMD), and secret designs.17
Now, look at the April 10 advisories. Weak logins? Check.2 Remote code execution? Check.3 Sneaking around directories (path traversal)? Check.4 Hardcoded passwords? Check.5 These aren’t theoretical problems; they’re the exact keys attackers use to unlock your ICS kingdom. That’s why these advisories are more than just technical details – they’re warnings based on how real attacks happen.
4.0 The Nitty-Gritty: Breaking Down the Advisories
Alright, let’s get specific. Here’s the breakdown for each of the eight Siemens, Rockwell, and ABB advisories from April 10, 2025.
4.1 ICSA-25-100-01 Siemens License Server: Local Trouble Brewing 7
- What’s Affected & Where: Siemens License Server (SLS) versions before V4.3.7 This software pops up everywhere – Chemical, Critical Manufacturing, Energy, Food/Ag, Water systems.7 No exact numbers, but hitting this many vital sectors means a compromise could ripple outwards, even if it starts small.
- The Bugs & Scores: Two main issues:
- CVE-2025-29999: Playing loose with privileges (CWE-269), scoring 6.7 (v3) / 5.4 (v4).7
- CVE-2025-30000: Not checking certificates properly (CWE-295), also 6.7 (v3) / 5.4 (v4).7
- The Risk & How Hackers Exploit It: Bad news: you need local access (AV:L) and it’s tricky (AC:H).7 Good news (sort of): requires low initial access (PR:L) but needs a user to mess up (UI:R/P) – like clicking a bad file or letting an attacker plant one for CVE-2025-29999.7 CISA says no known public exploits, and you can’t hit it from afar.7
- The Damage: If a low-level local user pulls this off, they could become admin or run nasty code.7 In critical infrastructure? Owning the license server could shut down vital software or be a launchpad for deeper attacks.
- The Fix & Defense: Siemens says update SLS to V4.3 or later.7 Standard advice applies: lock down network access, follow Siemens’ security rules 7, segment your network, use firewalls, secure remote access (VPNs!), and watch for weird activity like CISA always recommends.7
- The Bottom Line: Even though it’s local and tricky, hitting five critical sectors is serious.7 Attackers might get local access some other way (phishing, another bug, insider), making this privilege boost valuable. Owning a server that controls licenses for critical software is bad news. Needing user interaction also means training is key, even for tech staff.7
4.2 ICSA-25-100-02 Siemens SIDIS Prime: A Swiss Cheese Situation 6
- What’s Affected & Where: Siemens SIDIS Prime versions before V4.0.700.6 Used across Chemical, Critical Manufacturing, Energy, Food/Ag, and Water sectors 6, sometimes just listed as “Multiple Sectors” 39 – meaning it’s widespread in sensitive places.
- The Bugs & Scores: Hold onto your hats – 14 different CVEs are listed 6, covering a smorgasbord of weaknesses (CWEs). Think race conditions (CWE-363), bad validation (CWE-354, CWE-20), infinite loops (CWE-606), buffer overflows (CWE-122), sending secrets in plain text (CWE-319), using memory after freeing it (CWE-416), null pointer issues (CWE-476), and more. Scores are all over the place, with some High/Critical ones like CVE-2024-0056 (plaintext secrets, CVSS v4 9.1) and CVE-2024-30105 (resource hogging, CVSS v4 8.7).6
- The Risk & How Hackers Exploit It: It’s a mixed bag. Some need local access, some network, some adjacent. Some are easy to exploit, some hard. Some need no privileges, some low, some high. Some need user clicks, some don’t.6 Crucially, some are remotely exploitable with low complexity.6
- The Damage: A successful hit could mean files deleted, systems crashing (DoS), data getting corrupted, secrets leaking, or even full Remote Code Execution (RCE).6
- The Fix & Defense: Patch! Update SIDIS Prime to V4.0.700 or later.6 All the usual Siemens/CISA advice applies: protect networks, segment, secure VPNs, monitor, train users.6 An older advisory also specifically suggested encrypting OPC UA traffic as a workaround.39
- The Bottom Line: With 14 different holes 6, SIDIS Prime looks like Swiss cheese. This huge attack surface makes it easier for hackers to find something that works, or maybe chain bugs together (e.g., steal info with one bug, use it to get RCE with another). Defending this needs a solid, layered approach. Plus, some bugs come from third-party stuff like the Rust library (CVE-2022-21658) 6 or older OPC UA libraries 39, showing how supply chain risk bites you – flaws in building blocks get passed down, making life hard for everyone.
4.3 ICSA-25-100-03 Siemens Solid Edge: Watch Out for Weaponized Blueprints 8
- What’s Affected & Where: Siemens Solid Edge CAD software – SE2024 before Update 12, and SE2025 before Update 3.8 This is mainly used in Critical Manufacturing.8 While maybe not the biggest CAD player overall (one source says 0.17% market share 25), it’s a leader in specific areas like machine design and 3D printing.26 For its users, it’s vital.
- The Bugs & Scores: One main culprit: CVE-2024-54091, an Out-of-bounds Write (CWE-787) triggered by opening a booby-trapped X_T design file.8 Scores are 7.8 (v3) / 7.3 (v4).8
- The Risk & How Hackers Exploit It: Needs local access (AV:L) and the user has to open the bad file (UI:R/P).8 Complexity is Low (v3) / High (v4), but the v3 score suggests it might not be too hard once the user clicks.8 No special privileges needed (PR:N).8 No known public exploits, not remotely hittable.8
- The Damage: If exploited, an attacker could run their own code as the Solid Edge program.8 Since CAD software handles super-sensitive product designs (the “crown jewels” 26), this could mean stolen designs (spies!), messed-up blueprints before manufacturing (sabotage!), or using the engineer’s computer to hop deeper into the network.
- The Fix & Defense: Siemens has updates: SE2024 needs V224.0 Update 12+, SE2025 needs V225.0 Update 3+.8 The big non-patch fix: DON’T OPEN X_T FILES FROM SKETCHY SOURCES.8 Standard CISA/Siemens advice applies too.8
- The Bottom Line: The real danger here is the data. CAD files are gold for manufacturers.26 Getting code execution 8 via a bad file means attackers could steal or tamper with designs, causing huge financial or reputational hits. The attack relies on tricking users with a legit file type (X_T) 8, showing the risk in design sharing and why users must verify file sources.
4.4 ICSA-25-100-04 Siemens Industrial Edge Devices: Critical Hole, Some Unpatchable 2
- What’s Affected & Where: A whole list of Siemens Industrial Edge gear: IEOD, Virtual Device, SCALANCE LPE9413, and various SIMATIC IPCs (IPC127E, IPC227E, IPC427E, IPC847E, IPC BX-39A, IPC BX-59A).2 These are found in Critical Manufacturing 2 and Energy.36 Industrial Edge is Siemens’ big push for edge computing and AI on the factory floor, often partnering with folks like NVIDIA.27 So, expect more of these out there.
- The Bugs & Scores: The main villain is CVE-2024-54092, a Weak Authentication flaw (CWE-287).2 It scores a critical 9.8 (v3) and a high 9.3 (v4).2
- The Risk & How Hackers Exploit It: This one’s bad. Remotely exploitable (AV:N), easy complexity (AC:L), no privileges needed (PR:N), no user interaction (UI:N).2 However, Siemens and NVD say you need identity federation enabled (now or previously) and the attacker needs to know a valid username.22 No public PoCs found 22, and CISA saw no active exploitation yet.2
- The Damage: An unauthenticated remote attacker could waltz past logins and pretend to be a real user.2 That means controlling the edge device, messing with processes, fiddling with data going between OT and IT/cloud, stealing info, or using it as a beachhead into the OT network. Rated High impact across the board (Confidentiality, Integrity, Availability).2
- The Fix & Defense: Updates exist for most devices: IEOD/Virtual need V1.21.1-1-a+; various SIMATIC IPCs need V3.0+.2 Big Red Flag: No fix currently for SCALANCE LPE9413 (6GK5998-3GS01-2AC2) and SIMATIC IPC427E Industrial Edge Device.2 For those, and generally, Siemens says lock down network access to trusted parties only.2 Standard CISA/Siemens network hardening and segmentation are vital.2
- The Bottom Line: This critical, remote login bypass 2 hits Siemens’ edge strategy 27 right where it hurts. Edge devices are often the crucial link between OT and IT/cloud. Breaking that link without needing a password could let attackers disrupt vital AI apps (like quality control 27) or sneak into sensitive OT zones. The fact that some hardware has no patch 2 is a massive, ongoing risk, forcing reliance on network isolation which might not be foolproof. It shows how securing hardware can be way harder and slower than software.
4.5 ICSA-25-100-05 Siemens Insights Hub Private Cloud: Cloud Woes & IngressNightmare 3
- What’s Affected & Where: All versions of Siemens Insights Hub Private Cloud.3 This is their Industrial IoT (IIoT) platform for grabbing, managing, and analyzing factory data, mainly in Critical Manufacturing.3 It powers tools like their AI “Production Copilot.”28 This alert is about the private cloud version.
- The Bugs & Scores: Five CVEs listed: CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514.3 These aren’t Siemens’ bugs directly, but flaws in the ingress-nginx controller, a common piece of Kubernetes infrastructure.10 CISA mentions Improper Input Validation and Bad Isolation (Compartmentalization).3 The whole mess is nicknamed “IngressNightmare”.10 Scores range from 4.8 up to a critical 9.8 for CVE-2025-1974.3
- The Risk & How Hackers Exploit It: All remotely exploitable (AV:N).3 Mostly low complexity (AC:L), except one (CVE-2025-24513 is AC:H).3 Some need no privileges (PR:N for the critical CVE-2025-1974 and CVE-2025-24513), others need low (PR:L).3 No user interaction needed (UI:N).3 While CISA didn’t see attacks on Insights Hub specifically 3, the underlying IngressNightmare bugs, especially CVE-2025-1974, are publicly known with exploit details and PoCs floating around.10
- The Damage: A successful hit could let an attacker run code inside the ingress controller, steal sensitive info (like Kubernetes secrets!), or crash the system (DoS).3 Because ingress controllers often have high privileges in Kubernetes, hitting CVE-2025-1974 could potentially mean owning the entire cluster.10
- The Fix & Defense: Siemens says Insights Hub Private Cloud customers need to call support for patch info.3 Standard Siemens 3 and CISA advice applies. Fixing the underlying IngressNightmare usually means updating the ingress-nginx controller (to 1.11.5+ or 1.12.1+) and locking down network access to its admission controller webhook, maybe even disabling it if you don’t need it.10
- The Bottom Line: This shows the danger of building industrial platforms on complex tech like Kubernetes. A bug in the foundation (ingress-nginx) shakes the whole Siemens house.3 Since ingress controllers handle traffic for lots of apps and run with power, owning one via CVE-2025-1974 could give attackers keys to sensitive manufacturing data 28 or control over network traffic.10 The public exploit details for IngressNightmare 11 make patching or mitigating this extremely urgent, regardless of whether Insights Hub itself has been targeted yet.
4.6 ICSA-25-100-06 Siemens SENTRON 7KT PAC1260 Data Manager: Unpatchable and Ugly 5
- What’s Affected & Where: All versions of the SENTRON 7KT PAC1260 Data Manager.5 This gadget is part of Siemens’ power monitoring lineup, used in the Energy sector to track energy use via a web browser.5 Heads up: older related devices (PAC1200) also had critical bugs before.50
- The Bugs & Scores: A nasty list of nine CVEs 5:
- CVE-2024-41788, -41789, -41790: OS Command Injection (CWE-78), scoring 9.1 (v3) / 9.4 (v4).
- CVE-2024-41791, -41793: Missing Authentication (CWE-306), scoring 7.3/8.6 (v3) / 6.9/7.7 (v4).
- CVE-2024-41792: Path Traversal (CWE-22), scoring 8.6 (v3) / 9.2 (v4).
- CVE-2024-41794: Hard-coded Credentials (CWE-798), scoring a perfect 10.0 (v3 & v4).
- CVE-2024-41795: Cross-Site Request Forgery (CSRF) (CWE-352), scoring 6.5 (v3) / 6.9 (v4).
- CVE-2024-41796: Unverified Password Change (CWE-620), scoring 6.5 (v3) / 6.9 (v4).
- The Risk & How Hackers Exploit It: All remotely exploitable (AV:N), all low complexity (AC:L).5 Some need high privileges (PR:H for command injection), but most need none (PR:N).5 Only CSRF and password change need user interaction (UI:R/A); the rest are hands-off (UI:N).5 CISA saw no specific public exploits.5 While no public PoCs were found for the critical hardcoded password (CVE-2024-41794) 46 or path traversal (CVE-2024-41792) 48 bugs, these types are usually well-understood and exploitable.
- The Damage: It’s bad. Authenticated RCE as root (Command Injection); unauthenticated log reading/clearing, device reset, time setting (Missing Auth); unauthenticated reading of any file as root (Path Traversal); unauthenticated turning on SSH (Missing Auth); full unauthenticated root access via SSH if it’s on (Hard-coded Creds); unauthenticated changing settings via CSRF; unauthenticated setting any password via CSRF + password change flaw.5
- Combo Attacks (Chaining): Yep, clear potential here. An attacker could use CVE-2024-41793 (Missing Auth) to turn on SSH without logging in, then use the hardcoded password from CVE-2024-41794 to get full root access.5 Or, use CVE-2024-41795 (CSRF) with CVE-2024-41796 (Unverified Password Change) to hijack admin accounts by tricking them.5
- The Fix & Defense: THIS IS THE KICKER: SIEMENS ISN’T PATCHING THIS. Their advice? Trash the 7KT PAC1260 and buy the newer SENTRON 7KT PAC1261 model (and make sure it’s updated).5 The only workaround offered is for the CSRF/password bugs: tell users not to click weird links while logged in.5 Standard CISA/Siemens advice applies, and older SENTRON alerts suggested network isolation and blocking ports.5
- The Bottom Line: No patches + hardware replacement needed = huge problem.5 Energy sector orgs using this device are stuck with critical vulns unless they rip and replace, which costs time and money. This is a perfect example of why legacy/EOL ICS gear is so risky. The sheer variety of attack methods (injection, auth bypass, path traversal, hardcoded creds, CSRF) 5 and the easy chaining options make this device a prime target for anyone wanting energy data or a way into the network.
4.7 ICSA-25-100-07 Rockwell Automation Arena: Simulation Software Under Siege (Again) 9
- What’s Affected & Where: Rockwell Automation’s Arena simulation software, versions 16.20.08 and older.9 Arena is a big deal in discrete event simulation, used all over – Manufacturing, Logistics, Healthcare, Supply Chain, Government/Military, Mining, Food & Bev.30 Reportedly used by most Fortune 100 companies and taught everywhere.31 CISA tags it mainly for Critical Manufacturing 9, but it’s used way beyond that.53
- The Bugs & Scores: Eleven CVEs listed 9, mostly memory corruption bugs: Using uninitialized variables (CVE-2025-2285), writing out of bounds (CVE-2025-2286, -2287, -2288, -2293, -2829), reading out of bounds (CVE-2025-3285, -3286, -3287, -3288), and stack buffer overflows (CVE-2025-3289). All eleven get the same scores: 7.8 (v3.1) / 8.5 (v4).9 Similar memory bugs (Use After Free, Out-of-bounds Read/Write, Bad Initialization) have plagued Arena before.52
- The Risk & How Hackers Exploit It: All need local access (AV:L) and user interaction (UI:R/P) – specifically, tricking someone into opening a malicious Arena model file (DOE file).9 Attack complexity is Low (AC:L), no privileges needed (PR:N).9 CISA saw no public exploitation, not remotely hittable.9 Fun fact: many Arena bugs seem to be found by the same researcher.53
- The Damage: A successful hit could leak info or let an attacker run arbitrary code on the computer running Arena.9 This could mean stealing sensitive simulation data (leading to bad business decisions) or using the engineer’s workstation as a launchpad to steal other data or move deeper into the network.
- The Fix & Defense: Rockwell says upgrade Arena to V16.20.09 or later.9 Follow Rockwell’s security best practices.19 Past advice included: don’t open untrusted Arena files, and maybe hold CTRL when opening files to block malicious VBA code.52 Standard CISA advice applies too.9
- The Bottom Line: Finding the same type of memory bugs over and over 9 related to file parsing hints at deeper issues in how Arena handles data. Patch promptly! While Arena doesn’t directly run machines, the engineers and analysts using it 31 often have access to sensitive stuff. Hacking Arena via a bad file is a great way for attackers to get an initial foothold, steal data, or pivot elsewhere. Relies on user clicks, so training about file sources is crucial.
4.8 ICSA-25-100-09 ABB Arctic Wireless Gateways: Modem Mayhem & SSH Shenanigans 4
- What’s Affected & Where: ABB Arctic Wireless Gateways (ARG600, ARC600, ARR600) using the Telit PLS62-W modem, plus specific firmware versions of ARP600, ARC600, ARR600 with an SSH bug.4 These gateways live in the Energy sector, part of ABB’s grid automation gear.4 They let utilities remotely monitor/control stuff out in the field (like power line switches or substation gear), translate old protocols for modern SCADA systems, and provide general wireless connections for industrial apps.32
- The Bugs & Scores: Eight CVEs detailed 4:
- CVE-2023-47610: Classic Buffer Overflow (via SMS!), CVSS 8.1 (v3) / 9.2 (v4).4
- CVE-2023-47611: Improper Privilege Management, CVSS 6.8 (v3) / 5.4 (v4).4
- CVE-2023-47612, -47614, -47616: Leaking Sensitive Info, CVSS scores vary (low to 6.8/5.4).4
- CVE-2023-47613: Path Traversal, CVSS 3.2 (v3) / 2.4 (v4).4
- CVE-2023-47615: Leaking Sensitive Info via Env Variables, CVSS 4.3 (v3) / 5.1 (v4).4
- CVE-2024-6387: Race Condition in OpenSSH signal handling, CVSS 8.1 (v3) / 9.2 (v4).4 These bugs live in both the third-party Telit modem 12 and the gateway’s own OpenSSH server.13
- The Risk & How Hackers Exploit It: Mixed bag again. The critical SMS overflow and SSH race condition are Network exploitable (AV:N); others need Physical (AV:P) or Local access.4 Complexity is High (AC:H) for the remote bugs, Low (AC:L) for local/physical.4 No privileges needed (PR:N) for the remote exploits and some info leaks; others need Low (PR:L).4 No user interaction needed (UI:N).4 CISA saw no public exploitation of these ABB gateways specifically.4 BUT, the underlying Telit modem bugs (CVE-2023-4761x) 12 and the OpenSSH race condition (CVE-2024-6387) 13 are public knowledge. Exploit details exist, especially for CVE-2024-6387 – it’s complex but maybe doable, especially on 32-bit Linux.13
- The Damage: Successful hits could give attackers RCE with root privileges via the SMS or SSH bugs.4 Other impacts: DoS, messing with unencrypted traffic, bumping privileges up to “manufacturer” level 4, reading/writing modem files (even hidden ones) 4, path traversal 4, and leaking config data or passwords.4 In the Energy sector? That could mean remotely messing with the power grid.32
- Combo Attacks (Chaining): Not explicitly stated, but owning the modem via SMS or getting root via SSH gives attackers a powerful base to launch further attacks inside the OT network or fiddle with the gateway itself.
- The Fix & Defense: Mitigation depends on the bug:
- Telit Modem (CVE-2023-4761x): ABB says call your cell provider and tell them to block binary SMS for the device. If you don’t use SMS, turn it off on the gateway.4 Using a private cellular network (APN) and locking down physical access helps too.4
- OpenSSH (CVE-2024-6387): ABB strongly advises using OpenVPN tunnels for remote connections instead of exposing SSH directly, especially to the internet.4 General workarounds for this SSH bug include setting LoginGraceTime 0 in the config (but that risks DoS) and using IP blockers like fail2ban.14
- General: Follow standard ABB/CISA security rules: network isolation, secure VPNs for all remote access, update when possible.4
- The Bottom Line: This advisory shows how messy ICS security gets with devices built from many parts. Bugs can come from third parties (Telit modem, OpenSSH) 12, needing fixes that involve others (cell carriers) 4 or careful configuration to hide vulnerable parts (like firewalling SSH).4 The potential for unauthenticated RCE (via SMS or SSH) 4 on gateways controlling Energy gear 4 is a huge risk. Lock down those remote access paths!
5.0 Sector Spotlight: Why Manufacturing & Energy Are Sweating
The security holes CISA flagged hit Critical Manufacturing and Energy sectors particularly hard. Here’s why these industries need to pay extra attention:
- Why the Bullseye is Bigger Here:
- They Use This Stuff Everywhere: Siemens, Rockwell, ABB? They’re the go-to vendors for control systems, software, and network gear in factories and power plants.18 So, the affected products – license servers 7, design tools 8, process software 6, edge computers 2, IIoT platforms 3, power monitors 5, simulation software 9, wireless gateways 4 – are likely running all over the place in these critical sectors.
- When Things Go Wrong, They Go Really Wrong: Hacking energy systems can cause blackouts, messing with national security and the economy.16 Hitting manufacturing can stop production lines cold (costing maybe $260k+ per hour 19), wreck product safety, steal valuable designs, or cause accidents.19 Safety is paramount in both fields.19
- Cookie-Cutter Tech Stacks: Many orgs in these sectors use similar setups: older Windows versions 33, standard industrial protocols (like Modbus, DNP3, OPC UA 39), popular software (Arena 30, Solid Edge 25), and new tech like edge computing (Industrial Edge 27) or cloud platforms (Insights Hub 28). This means one vulnerability can hit lots of places.
- Old Gear & Patching Headaches: OT environments are often full of ancient systems that vendors don’t support anymore or that are terrifying to patch because you cannot afford downtime or breaking things.18 Tons of ICS devices run old OSes and don’t get auto-updates.33 That Siemens SENTRON advisory telling folks to replace hardware instead of patching?5 Perfect example. These long vulnerability windows are hacker playgrounds.
- Opening the Doors (Connectivity): Everyone wants efficiency and data, so IT and OT networks are getting tangled, and remote access is booming.19 More connections mean more ways in for attackers. Vulnerabilities in gateways (ABB Arctic 4), edge devices (Siemens Industrial Edge 2), and remote access tools become super dangerous front doors.
- What Hackers Are Actually Doing:
- Bad actors, including state-sponsored crews (like VOLTZITE/Volt Typhoon, KAMACITE, ELECTRUM, China-linked groups) and ransomware gangs, are actively hammering energy and manufacturing.15 They want secrets (OT network maps, designs), disruption, or cash.16
- Their methods match the vulnerabilities perfectly. They hit known bugs 16, abuse weak/stolen/default passwords 33, use remote access flaws 16, poke around networks with standard tools 17, steal credentials 17, disable security 17, and grab data.17 The flaws CISA found – RCE 3, auth bypass 2, hardcoded passwords 5, path traversal 4, bad file handling 8 – are exactly what these attackers need. Even if these specific CVEs haven’t been seen in attacks yet, the pattern fits. It’s a matter of when, not if.
- Your To-Do List (Sector-Specific Advice): If you’re in Manufacturing or Energy, get moving on these, like, yesterday:
- Patch Like Your Job Depends On It (Because It Might): Slam those patches in, especially for the critical/remote bugs in Siemens SIDIS Prime 6, Industrial Edge 2, Insights Hub 3, Rockwell Arena 9, and ABB Arctic Gateways.4 For the unpatchable stuff (those specific Industrial Edge models 2, the SENTRON 7KT PAC1260 5), slap on strong compensating controls now and start planning (and budgeting) to upgrade or replace them ASAP. Don’t ignore end-of-life gear!5
- Fortify the Gates (Remote Access & Edge): Lock down all remote access – VPNs 2, edge devices 2, wireless gateways.4 Turn off stuff you don’t need (like SMS on Arctic gateways if possible 4, or direct SSH if you can use a VPN tunnel 4). Use private APNs for cell connections.4 Use Multi-Factor Authentication (MFA) everywhere you can.33
- Build Walls (Network Segmentation): Get serious about network segmentation. Use models like Purdue or IEC 62443 zones.34 Use firewalls and access rules to strictly control traffic between IT/OT and within OT zones. Only allow exactly what’s needed.7 Keep the crown jewels (critical control systems) isolated.19
- Know Your Stuff (Asset & Vuln Management): Keep a detailed list of everything on your OT network – hardware, software, versions, connections.19 Use tools (carefully!) and processes to regularly scan for vulnerabilities, bad configurations, unpatched systems, and unencrypted traffic.33
- Least Privilege is Your Friend (Access Control): Nobody gets more access than they absolutely need.33 Use Role-Based Access Control (RBAC).33 Change default passwords immediately, enforce strong ones, and kill hardcoded credentials.33 Control who can physically touch the gear.33
- Watch Everything (Monitoring & Detection): Use Intrusion Detection/Prevention Systems (IDS/IPS) that understand OT.21 Look for weird network traffic, unauthorized logins, or signs of known attacker TTPs.16 Collect logs from critical systems and security tools (maybe feed them to a SIEM that gets OT). Use CISA’s threat intel sharing (AIS).21
- Train Your Humans: Regular training on ICS risks is key. Teach them about phishing, social engineering, and being super careful with files and USB drives (especially for Solid Edge 8 and Arena 9 users).33 Hammer home the “don’t click strange links/files” message.5
- Plan for the Worst (Incident Response): Have an ICS-specific incident response plan. Test it. Update it. Be ready.
- RTFM (Vendor Guidance): Follow the specific security advice and hardening guides from Siemens 7, Rockwell 19, and ABB.24
6.0 How Fast Should You Run? (Urgency & Real-World Cases)
So, how quickly do you need to act on these April 10 advisories? Let’s cut to the chase.
- Exploits in the Wild? CISA’s official word was “no known public exploits specifically targeting these CVEs” when they published.2
- But Wait, There’s More (Underlying Risk): Don’t let that fool you. Several advisories point to bugs in common building blocks where exploit details are public. We’re talking IngressNightmare (hitting Siemens Insights Hub) 10, Telit modem flaws (hitting ABB Arctic Gateways) 12, and the OpenSSH race condition (also ABB Arctic Gateways).13 Public PoCs or deep technical dives exist for some of these 11, making it much easier for attackers to cook up exploits for any system using them.
- The Bad Guys Are Ready: Skilled hackers, including state-backed groups, are already targeting Energy and Manufacturing.16 They know how to reverse-engineer patches and find clever ways to exploit bugs (remember Ivanti CVE-2025-22457? 15). They build custom malware for ICS.15 They use both brand-new zero-days and older N-days.15 Finding critical, remote bugs in major ICS vendor gear (Siemens, Rockwell, ABB) is like Christmas morning for these actors.
- Patching is Slow: Let’s be real, patching OT is hard. Stability, uptime, legacy gear – it all slows things down.19 The fact that some devices have no patch (SENTRON 7KT PAC1260 5, some Industrial Edge models 2) means those systems are sitting ducks indefinitely, relying on potentially weaker defenses.
- The Verdict (Urgency): Given the sky-high CVSS scores (9s and even a 10!) 2, the remote exploitability of key network-facing gear (Industrial Edge, Insights Hub, Arctic Gateways) 2, the fact that capable enemies are already hunting in these sectors 16, the public info on some underlying bugs 10, and the potential for major real-world damage – the urgency is HIGH. Don’t wait for CISA to add these to the KEV list. Act now.
7.0 The Bottom Line: Key Takeaways & Your Action Plan
Okay, let’s boil down CISA’s April 10, 2025 ICS advisories for Siemens, Rockwell, and ABB into what you absolutely need to know and do, especially if you’re in Critical Manufacturing or Energy.
- Top Threats to Sweat About:
- Siemens Industrial Edge Login Bypass: CVE-2024-54092 is critical, remote, and unpatched on SCALANCE LPE9413 and IPC427E models.2 Yikes.
- Remote Takeover Risks: Potential RCE via IngressNightmare bugs (esp. CVE-2025-1974) in Siemens Insights Hub 3, and via SMS or SSH flaws (CVE-2023-47610, CVE-2024-6387) in ABB Arctic Gateways.4
- The Unpatchable Mess: Siemens SENTRON 7KT PAC1260 has critical flaws (hardcoded creds – CVE-2024-41794, CVSS 10.0; path traversal – CVE-2024-41792) and needs replacing.5
- Siemens SIDIS Prime’s Many Holes: So many vulnerabilities, so many ways in. Higher chance of exploitation.6
- Malicious File Mayhem: Recurring memory bugs in Rockwell Arena 9 and Siemens Solid Edge 8 mean opening the wrong file can lead to workstation compromise and data theft.
- Your Immediate To-Do List:
- Patch Now: Update Siemens License Server (V4.3+), SIDIS Prime (V4.0.700+), Solid Edge (latest updates), most Industrial Edge devices (V1.21.1-1-a+ or V3.0+), and contact Siemens support for Insights Hub patches. Update Rockwell Arena (V16.20.09+). Hit the critical/remote ones first.
- Deal with the Unpatchables: For those unpatched Siemens Industrial Edge models (SCALANCE LPE9413, IPC427E), isolate them network-wise, lock down access, and monitor them closely right now. For the Siemens SENTRON 7KT PAC1260, start planning (and finding budget) to replace it with the 7KT PAC1261.
- Secure the Perimeter (Edge & Remote Access): Harden configs for Industrial Edge, Arctic Gateways, and VPNs. Turn off risky services like SMS or direct SSH on gateways if you can use VPN tunnels instead.4 Use private APNs for cell connections.4 Enforce MFA everywhere for remote access.
- Build Higher Walls (Segmentation): Seriously review and enforce network segmentation (IT/OT, OT zones) using standards like IEC 62443.34 Make sure firewalls only allow essential traffic, especially around critical/vulnerable systems.
- Lock Down Access: Use least privilege for everyone and everything.33 Change defaults, kill hardcoded creds, use strong passwords.33 Use RBAC.33
- Eyes Everywhere (Monitoring): Use OT-aware IDS/IPS.21 Watch for weird traffic, unauthorized logins (esp. to edge/gateways), big file transfers, or known attacker moves.16 Get logs into a SIEM if you can.
- Train Your People: Drill users on phishing, social engineering, and the danger of unknown files/links (especially Solid Edge 8 & Arena 9 users).
8.0 Wrapping It Up (Conclusion)
CISA’s April 10, 2025 batch of ICS advisories is a stark reminder: the cyber threats against critical infrastructure, especially Energy and Manufacturing, aren’t going away – they’re getting worse. The bugs found in common Siemens, Rockwell, and ABB gear are serious, ranging from critical remote takeovers and login bypasses to a slew of local privilege bumps and info leaks. The fact that some devices won’t get patches, and others rely on third-party parts with known flaws, shows just how tough securing modern ICS can be.
Don’t be fooled by the lack of specific exploits reported at the time. The potential is sky-high, given who’s targeting these sectors and the public nature of some underlying bugs. Complacency is not an option. You need a defense-in-depth game plan: patch relentlessly where you can, but back it up with strong compensating controls – especially network segmentation, hardened remote access, tight access controls, and vigilant monitoring. Stay alert, follow vendor security advice (especially Siemens ProductCERT for ongoing updates 7), use CISA’s resources 21, and work together to keep the lights on and the factories running safely.
9.0 Sources We Used (References)
- CISA Advisories (April 10, 2025):
- ICSA-25-100-01 Siemens License Server: https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-01 7
- ICSA-25-100-02 Siemens SIDIS Prime: https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-02 6
- ICSA-25-100-03 Siemens Solid Edge: https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-03 8
- ICSA-25-100-04 Siemens Industrial Edge Devices: https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-04 2
- ICSA-25-100-05 Siemens Insights Hub Private Cloud: https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-05 3
- ICSA-25-100-06 Siemens SENTRON 7KT PAC1260 Data Manager: https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06 5
- ICSA-25-100-07 Rockwell Automation Arena: https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-07 9
- ICSA-25-100-09 ABB Arctic Wireless Gateways: https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-09 4
- Vendor Advisories (Examples):
- Siemens ProductCERT Security Advisories: https://cert-portal.siemens.com/productcert/ (Referenced in multiple snippets, e.g.7)
- Siemens SSA-634640 (Industrial Edge): https://cert-portal.siemens.com/productcert/html/ssa-634640.html 22
- Siemens SSA-817234 (Insights Hub): Referenced in 3
- Siemens SSA-187636 (SENTRON 7KT): Referenced in 46
- Rockwell Automation Security Advisory Portal: https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html 23
- ABB Cybersecurity Advisory 2NGA002427 (Arctic Gateways): https://search.abb.com/library/Download.aspx?DocumentID=2NGA002427&LanguageCode=en&DocumentPartId=pdf&Action=Launch 24
- Other Key Sources:
- CISA Known Exploited Vulnerabilities Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog 21
- Mandiant Blog on Ivanti Exploitation (UNC5221): https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability 15
- Dragos ICS/OT Cybersecurity Year in Review (Concepts referenced): 16
- Kaspersky Blog on Telit Modem Vulnerabilities: https://usa.kaspersky.com/blog/telit-cinterion-m2m-modems-vulnerabilities/30118/ 12
- Qualys Blog on OpenSSH Vulnerability (CVE-2024-6387): Referenced in 14
- CISA Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies: Referenced in multiple snippets, e.g.7
- Siemens Operational Guidelines for Industrial Security: Referenced in multiple snippets, e.g.7
- Rockwell Automation Security Best Practices: Referenced in 19
- ABB Cyber Security Reference Architecture: 34
10.0 Cheat Sheet (Appendix: Vulnerability Summary Table)
Advisory ID |
Vendor |
Product(s) Affected |
CVE ID(s) |
CVSS v3 / v4 (Highest) |
Attack Vector (AV) |
Attack Complexity (AC) |
Privileges Required (PR) |
User Interaction (UI) |
Brief Impact Summary |
Mitigation Status |
ICSA-25-100-01 |
Siemens |
License Server (SLS) < V4.3 |
CVE-2025-29999/30000 |
6.7 / 5.4 |
Local |
High |
Low |
Required |
Privilege Escalation, Potential Local ACE |
Patch Available (V4.3+) |
ICSA-25-100-02 |
Siemens |
SIDIS Prime < V4.0.700 |
14 CVEs listed |
8.7 / 9.1 |
Network/Local/Adj |
Low/High |
None/Low/High |
None/Required |
RCE Potential, Info Leak, DoS, Unauthorized Deletions, State Corruption |
Patch Available (V4.0.700+) |
ICSA-25-100-03 |
Siemens |
Solid Edge SE2024/SE2025 (Specific versions) |
CVE-2024-54091 |
7.8 / 7.3 |
Local |
Low (v3) / High (v4) |
None |
Required |
Local ACE via malicious file (IP theft/sabotage risk) |
Patch Available (Latest Updates) |
ICSA-25-100-04 |
Siemens |
Industrial Edge Devices (Multiple HW/SW) |
CVE-2024-54092 |
9.8 / 9.3 |
Network |
Low |
None |
None |
Remote Auth Bypass (Impersonation), potential device takeover |
Patch Available (Most); No Patch (SCALANCE LPE9413, IPC427E) |
ICSA-25-100-05 |
Siemens |
Insights Hub Private Cloud (All versions) |
5 CVEs (IngressNightmare) |
9.8 / N/A |
Network |
Low (mostly) |
None/Low |
None |
RCE Potential (Controller), Info Leak (Secrets), DoS, potential cluster compromise |
Contact Vendor Support for Patch/Update Info |
ICSA-25-100-06 |
Siemens |
SENTRON 7KT PAC1260 Data Manager (All versions) |
9 CVEs listed |
10.0 / 10.0 |
Network |
Low |
None/High |
None/Required |
RCE (Root), Root File Access, Full Access (Hardcoded Creds), CSRF, Chaining Risk |
No Patch Planned – Replace Device |
ICSA-25-100-07 |
Rockwell Automation |
Arena <= V16.20.08 |
11 CVEs listed |
7.8 / 8.5 |
Local |
Low |
None |
Required |
Local ACE / Info Disclosure via malicious file (Workstation compromise risk) |
Patch Available (V16.20.09+) |
ICSA-25-100-09 |
ABB |
Arctic Wireless Gateways (Specific HW/FW/Modem) |
8 CVEs listed |
8.1 / 9.2 |
Network/Physical |
High (Remote)/Low (Local) |
None/Low |
None |
RCE (Root via SMS/SSH), Priv Esc, Info Leak, DoS, Traffic Tampering |
Workarounds (Disable SMS, Secure SSH via VPN) |
Works cited
- CISA Releases Ten Industrial Control Systems Advisories, accessed April 11, 2025, https://www.cisa.gov/news-events/alerts/2025/04/10/cisa-releases-ten-industrial-control-systems-advisories
- Siemens Industrial Edge Devices | CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-04
- Siemens Insights Hub Private Cloud | CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-05
- ABB Arctic Wireless Gateways | CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-09
- Siemens SENTRON 7KT PAC1260 Data Manager – CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06
- Siemens SIDIS Prime | CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-02
- Siemens License Server | CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-01
- Siemens Solid Edge | CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-03
- Rockwell Automation Arena | CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-07
- CVE-2025-1974: Critical Set of Vulnerabilities in Ingress NGINX Controller for Kubernetes Leading to Unauthenticated RCE – SOC Prime, accessed April 11, 2025, https://socprime.com/blog/cve-2025-1974-aka-ingress-nightmare/
- IngressNightmare: Unauth RCE in Ingress NGINX (CVE-2025-1974) – Project Discovery, accessed April 11, 2025, https://projectdiscovery.io/blog/ingressnightmare-unauth-rce-in-ingress-nginx
- Critical vulnerabilities in Telit Cinterion M2M modems – Kaspersky, accessed April 11, 2025, https://usa.kaspersky.com/blog/telit-cinterion-m2m-modems-vulnerabilities/30118/
- CVE-2024-6387 Race Condition in Signal Handling for OpenSSH – Lumifi Cyber, accessed April 11, 2025, https://www.lumificyber.com/threat-library/cve-2024-6387-race-condition-in-signal-handling-for-openssh/
- CVE-2024-6387: Critical Remote Code Execution Vulnerability in OpenSSH – Arctic Wolf, accessed April 11, 2025, https://arcticwolf.com/resources/blog/cve-2024-6387/
- Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457) | Google Cloud Blog, accessed April 11, 2025, https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability
- Dragos Reports OT/ICS Cyber Threats Escalate Amid Geopolitical Conflicts and Increasing Ransomware Attacks, accessed April 11, 2025, https://www.dragos.com/resources/press-release/dragos-reports-ot-ics-cyber-threats-escalate-amid-geopolitical-conflicts-and-increasing-ransomware-attacks/
- UAT-5918 APT group targets Taiwan critical infrastructure, possible linkage to Volt Typhoon, accessed April 11, 2025, https://industrialcyber.co/critical-infrastructure/uat-5918-apt-group-targets-taiwan-critical-infrastructure-possible-linkage-to-volt-typhoon/
- Hardware vulnerabilities in Hitachi Energy, ABB, B&R ICS devices pose critical infrastructure threat – Industrial Cyber, accessed April 11, 2025, https://industrialcyber.co/cisa/hardware-vulnerabilities-in-hitachi-energy-abb-br-ics-devices-pose-critical-infrastructure-threat/
- A Comprehensive Guide to ICS Protection | Rockwell Automation | UK, accessed April 11, 2025, https://www.rockwellautomation.com/en-gb/company/news/blogs/what-is-ics-security.html
- Cybersecurity Alerts & Advisories – CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories
- Industrial Control Systems | Cybersecurity and Infrastructure Security Agency CISA, accessed April 11, 2025, https://www.cisa.gov/topics/industrial-control-systems
- SSA-634640: Weak Authentication Vulnerability in Siemens Industrial Edge Devices, accessed April 11, 2025, https://cert-portal.siemens.com/productcert/html/ssa-634640.html
- Security Advisories | Rockwell Automation | US, accessed April 11, 2025, https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html
- Arctic Wireless Gateway Modem Module and OpenSSH vulnerabilities, accessed April 11, 2025, https://search.abb.com/library/Download.aspx?DocumentID=2NGA002427&LanguageCode=en&DocumentPartId=pdf&Action=Launch
- www.6sense.com, accessed April 11, 2025, https://www.6sense.com/tech/cad-software/siemens-solid-edge-market-share#:~:text=What%20is%20Siemens%20Solid%20Edge%20market%20share%20in%20the%20cad,tools%20in%20cad%2Dsoftware%20category.
- Solid Edge named CAD software industry leader in G2 Fall 2022 Grid® Report, accessed April 11, 2025, https://blogs.sw.siemens.com/solidedge/solid-edge-leader-in-g2-fall-2022/
- Siemens drives AI adoption with Industrial Operations X and NVIDIA-accelerated Industrial PCs – Digital Asset Management, accessed April 11, 2025, https://assets.new.siemens.com/siemens/assets/api/uuid:a34f27f9-1e10-4932-8a97-60b1dcbf309a/HQDIPR202411077040EN.pdf
- Siemens Insights Hub Production Copilot being tested by The Bad Neustadt Electric Motors Factory (EWN), accessed April 11, 2025, https://blogs.sw.siemens.com/insights-hub/2025/02/26/siemens-insights-hub-production-copilot-being-tested-by-the-bad-neustadt-electric-motors-factory-ewn/
- 7KT1260 – Siemens WW – Industry Mall, accessed April 11, 2025, https://mall.industry.siemens.com/mall/vn/EN/Catalog/Product/?mlfb=7KT1260
- Factory Simulation Software Market Size, Trends & Forecast | 2025-2033, accessed April 11, 2025, https://www.globalgrowthinsights.com/market-reports/factory-simulation-software-market-110959
- Arena Simulation Software – Rockwell Automation, accessed April 11, 2025, https://www.rockwellautomation.com/en-us/products/software/arena-simulation.html
- Wireless I/O Gateway ARR600 – Arctic family (Communication devices) – ABB, accessed April 11, 2025, https://new.abb.com/medium-voltage/digital-substations/communication-devices/arctic-family/wireless-io-gateway-arr600
- ICS Security Best Practices | Malisko Blog, accessed April 11, 2025, https://malisko.com/industrial-control-system-security-best-practices/
- ABB ICS Cyber Security Reference Architecture, accessed April 11, 2025, https://new.abb.com/process-automation/process-automation-service/advanced-digital-services/cyber-security/abb-cyber-security-reference-architecture
- Energy Delivery Systems – Cyber Security Procurement Guidance, accessed April 11, 2025, https://www.energynetworks.org/assets/images/Resource%20library/BEIS%20ENA%20Cyber%20Security%20Procurement%20Language%20Guidance%20(final).pdf?1721117165
- Siemens Industrial Edge Management – ICS Advisory – CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-25-016-02
- Feed aggregator – Information Security – Cal Poly, San Luis Obispo, accessed April 11, 2025, https://security.calpoly.edu/aggregator
- CISA adds Ivanti Connect Secure vulnerability to KEV catalog – Cybersecurity Dive, accessed April 11, 2025, https://www.cybersecuritydive.com/news/cisa-ivanti-connect-secure-vulnerability-kev/744603/
- Siemens SIDIS Prime | CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-24-046-02
- Siemens drives AI adoption with Industrial Operations X and NVIDIA-accelerated Industrial PCs | Press | Company, accessed April 11, 2025, https://press.siemens.com/global/en/pressrelease/siemens-drives-ai-adoption-industrial-operations-x-and-nvidia-accelerated-industrial
- CVE-2024-54092 Detail – NVD, accessed April 11, 2025, https://nvd.nist.gov/vuln/detail/CVE-2024-54092
- Siemens Industrial Edge Management | CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-24-256-11
- Siemens Insights Hub Private Cloud – ASSURANT™, accessed April 11, 2025, https://www.assurantcyber.com/blog/icsa-25-100-05/
- Insights Hub FAQ | Siemens Software, accessed April 11, 2025, https://plm.sw.siemens.com/en-US/insights-hub/resources/faq/
- CISA ออกคำแนะนำเกี่ยวกับระบบควบคุมอุตสาหกรรม 10 รายการ – NCSA Webboard, accessed April 11, 2025, https://webboard-nsoc.ncsa.or.th/topic/1827/cisa-%E0%B8%AD%E0%B8%AD%E0%B8%81%E0%B8%84%E0%B8%B3%E0%B9%81%E0%B8%99%E0%B8%B0%E0%B8%99%E0%B8%B3%E0%B9%80%E0%B8%81-%E0%B8%A2%E0%B8%A7%E0%B8%81-%E0%B8%9A%E0%B8%A3%E0%B8%B0%E0%B8%9A%E0%B8%9A%E0%B8%84%E0%B8%A7%E0%B8%9A%E0%B8%84-%E0%B8%A1%E0%B8%AD-%E0%B8%95%E0%B8%AA%E0%B8%B2%E0%B8%AB%E0%B8%81%E0%B8%A3%E0%B8%A3%E0%B8%A1-10-%E0%B8%A3%E0%B8%B2%E0%B8%A2%E0%B8%81%E0%B8%B2%E0%B8%A3/
- CVE-2024-41794 Detail – NVD, accessed April 11, 2025, https://nvd.nist.gov/vuln/detail/CVE-2024-41794?utm_source=feedly
- CVE-2024-41794 | Tenable®, accessed April 11, 2025, https://www.tenable.com/cve/CVE-2024-41794
- CVE-2024-41792 Detail – NVD, accessed April 11, 2025, https://nvd.nist.gov/vuln/detail/CVE-2024-41792?utm_source=feedly
- CVE-2024-41792.json – cisagov/vulnrichment – GitHub, accessed April 11, 2025, https://github.com/cisagov/vulnrichment/blob/develop/2024/41xxx/CVE-2024-41792.json
- Siemens 7KT PAC1200 Data Manager – CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-17-278-02
- Siemens SENTRON | CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-06
- Rockwell Automation Arena (Update A) – CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-24-345-06
- Rockwell Automation Arena – CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-04
- 2025 January, Industrial Control Systems security feed List of Contents – Black Cell, accessed April 11, 2025, https://blackcell.io/wp-content/uploads/2025/02/2025_january_ICS_security_feed_final.pdf
- ICS Patch Tuesday: Vulnerabilities Addressed by Rockwell, ABB, Siemens, Schneider, accessed April 11, 2025, https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-rockwell-abb-siemens-schneider/
- Communication gateway – ARG600 – ABB Oy Distribution Automation – industrial / wireless / Ethernet TCP/IP – DirectIndustry, accessed April 11, 2025, https://www.directindustry.com/prod/abb-oy-distribution-automation/product-41044-2520169.html
- Siemens SENTRON 7KM PAC3x20 | CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-01
- Siemens SINEMA Remote Connect Client – ICS Advisory – CISA, accessed April 11, 2025, https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-10
Told you it was deep.
CISA's Latest Security Warnings
Major Vulnerabilities in ICS Products
The Cybersecurity and Infrastructure Security Agency (CISA) has issued new advisories highlighting severe vulnerabilities in industrial control systems (ICS) from Siemens, Rockwell Automation, and ABB. These vulnerabilities pose significant risks to the Energy and Critical Manufacturing sectors, demanding immediate attention and action.
Key issues include remote authentication bypass, remote code execution, and hardcoded credentials, affecting systems like power monitors and IIoT platforms. With some devices lacking available patches, organizations must prioritize hardware replacement and enhance their security measures to mitigate potential threats.
Key Vulnerabilities Identified
Remote Authentication Bypass
Siemens Industrial Edge Devices are susceptible to remote authentication bypass, allowing unauthorized access without credentials. Immediate isolation of affected models is recommended.
Remote Code Execution Risks
ABB Arctic Gateways face remote code execution threats via SMS or SSH, compromising grid infrastructure security. Urgent patching and access restrictions are crucial.
Mitigation Steps for Vulnerabilities
Step 1
Step 1: Immediate Patching
Identify and apply available patches for affected systems, prioritizing those with known exploits.
Step 2
Step 2: Hardware Replacement
Replace unpatchable hardware, such as certain Siemens power monitors, to eliminate vulnerabilities.
Step 3
Step 3: Secure Remote Access
Disable unnecessary remote access protocols and enforce multi-factor authentication to protect against unauthorized entry.