From 1b44d03369706064850e0b113da5919f37cd3be5 Mon Sep 17 00:00:00 2001 From: Dinindu-Wick <116336975+Dinindu-Wick@users.noreply.github.com> Date: Wed, 25 Sep 2024 14:04:07 +0800 Subject: [PATCH] CISA Publishes New ICS Advisories - 20240925001 (#1000) * CISA Publishes New ICS Advisories - 20240925001 * Update 20240925001 Shorted filename. Reformatted content to table. Used correct Hyperlink formatting for CISA URL. --------- Co-authored-by: JadonWill <117053393+JadonWill@users.noreply.github.com> --- .../20240925001-CISA-ICS-Advisories.md | 25 +++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 docs/advisories/20240925001-CISA-ICS-Advisories.md diff --git a/docs/advisories/20240925001-CISA-ICS-Advisories.md b/docs/advisories/20240925001-CISA-ICS-Advisories.md new file mode 100644 index 00000000..c6cf8b0b --- /dev/null +++ b/docs/advisories/20240925001-CISA-ICS-Advisories.md @@ -0,0 +1,25 @@ +# CISA Publishes New ICS Advisories - 20240925001 + +## Overview + +CISA has released Eight Industrial Control Systems Advisories around current security issues, vulnerabilities and exploits. + +## What is vulnerable? + + +| Vendor | Advisory Link(s) | +| --- | --- | +| OPW Fuel | [ICSA-24-268-01](https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-01) | +| Alisonic Sibylla | [ICSA-24-268-02](https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-02) | +| Franklin Fueling | [ICSA-24-268-03](https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-03) | +| Dover Fueling | [ICSA-24-268-04](https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-04) | +| Moxa MXview One | [ICSA-24-268-05](https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-05) | +| OMNTEC Proteus Tank | [ICSA-24-268-06](https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-06) | +| Uniview | [ICSA-24-156-01](https://www.cisa.gov/news-events/ics-advisories/icsa-24-156-01) | +| Interpeak IPnet | [ICSA-19-274-01](https://www.cisa.gov/news-events/ics-advisories/icsa-19-274-01) | + +## Recommendation + +The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month...* (refer [Patch Management](../guidelines/patch-management.md)): + +- CISA: