![]() CRITICAL INFRASTRUCTURE SECTORS: Manufacturingįederico Maggi of Trend Micro reported this vulnerability to CISA.A CVSS v3 base score of 4.3 has been calculated the CVSS vector string is ( AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N). KUKA recommends upgrading KUKA.Sim Pro to Version 3.1.2 or above to mitigate this vulnerability. The update is provided for users with a licensed Version 3.1. ![]() Version 3.1 is the only affected version that is still maintained. Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.Īll previous versions of KUKA.Sim Pro have been discontinued Version 3.0 has been discontinued since the beginning of 2019.ĬISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability.Locate control system networks and remote devices behind firewalls, and isolate them from the business network.When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available.Also recognize that VPN is only as secure as the connected devices.ĬISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.ĬISA also provides a section for control systems security recommended practices on the ICS webpage on.
0 Comments
Leave a Reply. |