CISA Releases Five ICS Advisories Covering Vulnerabilities, and Exploits Surrounding ICS


The Cybersecurity and Infrastructure Security Agency released five critical Industrial Control Systems advisories on December 2, 2025, addressing significant security threats across industrial environments.

These advisories cover vulnerabilities and active exploits affecting systems used in manufacturing, power generation, and medical device operations worldwide.

The timing of this release highlights growing concerns about the targeted nature of industrial control system attacks and their potential to disrupt essential infrastructure.

Industrial control systems operate the backbone of critical infrastructure, managing everything from power plants to water treatment facilities and medical equipment.

When vulnerabilities emerge in these systems, they create pathways for attackers to access sensitive operational technology networks. The five advisories released by CISA target vendors including Mitsubishi Electric, Iskra, and Mirion Technologies, affecting a broad spectrum of industrial equipment deployed globally.

Organizations using these systems face the challenge of deploying security updates while maintaining continuous operations, a delicate balance that makes these warnings particularly urgent.

google

CISA security analysts identified multiple exploitation attempts targeting some of the affected systems, indicating that attackers are actively leveraging these vulnerabilities in real-world scenarios.

The advisories include coverage of Industrial Video & Control Longwatch systems, Iskra iHUB platforms, and Mirion Medical EC2 software used in radiation dose tracking applications.

Additionally, updates were provided for previously disclosed vulnerabilities in Mitsubishi Electric’s CNC Series and MELSEC iQ-R Series products, suggesting ongoing evolution in attack tactics.

Vulnerability Exploitation and Attack Surface

The vulnerabilities identified span authentication bypasses, remote code execution flaws, and improper input validation issues.

Attackers exploit these weaknesses by sending specially crafted requests to targeted systems, potentially gaining unauthorized access to critical operational functions.

For organizations operating these systems, understanding the attack surface is essential.

Network segmentation becomes crucial, ensuring that vulnerable systems remain isolated from external internet connectivity whenever possible.

CISA encourages administrators to implement the recommended mitigations immediately, including applying security patches, enforcing strong authentication mechanisms, and deploying network monitoring solutions to detect suspicious activities.

Advisory IDVendorProductCVEVulnerability TypeCVSS v3.1CVSS v4Affected VersionsRisk DescriptionExploitation
ICSA-25-336-01Industrial Video & ControlLongwatchCVE-2025-13658Improper Control of Generation of Code (Code Injection)9.89.36.309 to 6.334Remote code execution with SYSTEM-level privilegesRemotely exploitable with low attack complexity
ICSA-25-336-02IskraiHUB and iHUB LiteCVE-2025-13510Missing Authentication for Critical Function9.19.3All VersionsDevice reconfiguration, firmware updates, system manipulation without credentialsRemotely exploitable with low attack complexity
ICSMA-25-336-01Mirion MedicalEC2 Software NMIS BioDoseCVE-2025-64642Incorrect Permission Assignment for Critical Resource8.07.1Prior to 23.0Modification of program executables and librariesLocally exploitable with low attack complexity
ICSMA-25-336-01Mirion MedicalEC2 Software NMIS BioDoseCVE-2025-64298Incorrect Permission Assignment for Critical Resource8.48.6Prior to 23.0Unauthorized access to SQL Server database and configuration filesLocally exploitable with low attack complexity
ICSMA-25-336-01Mirion MedicalEC2 Software NMIS BioDoseCVE-2025-61940Use of Client-Side Authentication8.38.7Prior to 23.0Unauthorized database access and data modificationNetwork exploitable requiring low privilege
ICSMA-25-336-01Mirion MedicalEC2 Software NMIS BioDoseCVE-2025-64778Use of Hard-coded Credentials7.38.4Prior to 23.0Unauthorized application and database accessLocally exploitable by low privilege user
ICSMA-25-336-01Mirion MedicalEC2 Software NMIS BioDoseCVE-2025-62575Incorrect Permission Assignment for Critical Resource8.38.7Prior to 23.0Remote code execution through database stored proceduresNetwork exploitable requiring low privilege
ICSA-25-201-01Mitsubishi ElectricCNC SeriesCVE-2016-2542Uncontrolled Search Path Element7.0N/AMultiple versionsMalicious code execution via DLL hijackingLocally exploitable with user interaction required
ICSA-23-157-02Mitsubishi ElectricMELSEC iQ-R/iQ-F SeriesCVE-2023-2060Weak Password Requirements7.58.7RJ71EIP91, FX5-ENET/IP all versionsFTP authentication bypass via dictionary attackRemotely exploitable with low attack complexity
ICSA-23-157-02Mitsubishi ElectricMELSEC iQ-R/iQ-F SeriesCVE-2023-2061Use of Hard-coded Credentials6.26.9RJ71EIP91, FX5-ENET/IP all versionsFTP authentication bypass with hard-coded passwordLocally exploitable with low attack complexity
ICSA-23-157-02Mitsubishi ElectricMELSEC iQ-R/iQ-F SeriesCVE-2023-2062Missing Password Field Masking6.26.9SW1DNN-EIPCT-BD, SW1DNN-EIPCTFX5-BD v1.01B and priorAuthentication bypass through password disclosureLocally exploitable with low attack complexity
ICSA-23-157-02Mitsubishi ElectricMELSEC iQ-R/iQ-F SeriesCVE-2023-2063Unrestricted Upload of File with Dangerous Type6.35.3RJ71EIP91, FX5-ENET/IP all versionsInformation disclosure and data tampering via FTPNetwork exploitable requiring low privilege

Organizations should prioritize patching systems identified in the advisories, particularly those connected to production environments where operational disruption could affect public safety and economic stability.

The release demonstrates CISA’s commitment to protecting industrial infrastructure through timely disclosure and actionable guidance.

These advisories serve as blueprints for defensive measures, helping organizations strengthen their security posture against determined threat actors targeting industrial systems.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews



Source link