CISA Publishes 13 New Alerts on ICS Vulnerabilities and Exploitation Risks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released thirteen new advisories addressing recently discovered vulnerabilities and exploitation risks within Industrial Control Systems (ICS).

Published on July 10, 2025, these advisories provide vital intelligence to operators, administrators, and vendors operating across critical infrastructure sectors.

The range of affected products spans from industrial software solutions and hardware controllers to automation platforms widely deployed worldwide.

Critical ICS Security Advisories Released

Among the newly disclosed advisories, multiple Siemens solutions are affected, including SINEC NMS, Solid Edge, TIA Administrator, SIMATIC CN 4100, TIA Project-Server, TIA Portal, and the SIPROTEC 5 protection relay devices.

For industrial operators relying on Delta Electronics automation, a major advisory focuses on DTM Soft software, which sits at the heart of numerous industrial process control environments.

Additionally, Advantech’s iView platform and several Kunbus GmbH products, including the Revolution Pi line and RevPi Webstatus interface, are also impacted, highlighting the breadth of vulnerabilities spanning both software and hardware endpoints.

CISA has also updated existing advisories for KUNBUS Revolution Pi (ICSA-25-121-01 Update A), ECOVACS DEEBOT vacuum and base station systems (ICSA-25-135-19 Update A), and IDEC Products (ICSA-24-263-02 Update A).

These updates typically reflect new information regarding technical details, risk posture, confirmed exploits in the wild, or revised mitigation strategies based on vendor or researcher input.

A notable inclusion is the advisory on the End-of-Train and Head-of-Train Remote Linking Protocol, emphasizing that vulnerabilities are emerging not just in traditional plant operations but also in the vital logistics and railway sectors.

As supply chains and critical industries become more interconnected, such disclosures heighten awareness of the systemic risks facing modern ICS environments.

Urgent Review Recommended for Siemens

CISA’s advisories describe these vulnerabilities in depth, covering aspects such as privilege escalation opportunities, insecure default configurations, remote code execution vulnerabilities, improper access control, and flaws in authentication protocols.

The technical documentation includes CVE identifiers, detailed impact assessments, proof-of-concept exploit scenarios where available, and vendor-specific remediation steps.

For several Siemens and Delta Electronics products, mitigations may require prompt firmware upgrades, configuration hardening, or network segmentation to prevent unauthorized access and lateral movement within operational environments.

The rapid cadence and volume of advisories underscore the growing complexity and attack surface of ICS deployments, which manage everything from manufacturing lines and energy grids to transportation and building automation.

CISA strongly encourages all ICS users and administrators, regardless of sector, to promptly review these advisories and take immediate steps toward remediation.

Failure to address such vulnerabilities can result in operational disruption, unauthorized control, data loss, or physical safety hazards.

As always, CISA reminds organizations that these products and the associated technical details are provided subject to their standard Notification and Privacy & Use policies.

For the most current technical details, users are advised to consult the original advisories through CISA’s website or their vendor’s dedicated security resources.

This proactive approach is essential to maintaining resilient and secure industrial environments in the face of evolving cyber threats.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here