US-CERT warns of vulnerability in industrial control systems

A unit of the U.S Computer Emergency Readiness Team has alerted utility and other infrastructure companies about a vulnerability in two user interface products that could allow remote code execution.

The Industrial Control Systems Cyber Emergency Response Team’s advisory states that the vulnerability affects two products from Iconics, Genesis32 and BizViz (Versions 9 through 9.21), and, if successfully exploited, “results in remote arbitrary code execution with privileges of the current user.”

Iconics has issued a patch that solves the problem, ICS-CERT's advisory said.

Genesis32 and BizViz, provide graphical interfaces to supervisory control and data acquisition (SCADA) systems used in industrial processes, giving users control via a browser.

Genesis32, for example, is used in manufacturing, building automation, oil and gas, water and wastewater, electric utilities, and other systems, the advisory said.

About the Author

Kevin McCaney is a former editor of Defense Systems and GCN.

Featured

  • business meeting (Monkey Business Images/Shutterstock.com)

    Civic tech volunteers help states with legacy systems

    As COVID-19 exposed vulnerabilities in state and local government IT systems, the newly formed U.S. Digital Response stepped in to help. Its successes offer insight into existing barriers and the future of the civic tech movement.

  • data analytics (Shutterstock.com)

    More visible data helps drive DOD decision-making

    CDOs in the Defense Department are opening up their data to take advantage of artificial intelligence and machine learning tools that help surface insights and improve decision-making.

Stay Connected