{"id":149605,"date":"2022-11-06T17:22:40","date_gmt":"2022-11-06T23:22:40","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/11\/cisa-warns-of-critical-vulnerabilities-in-3-industrial-control-system-software"},"modified":"2022-11-06T17:22:40","modified_gmt":"2022-11-06T23:22:40","slug":"cisa-warns-of-critical-vulnerabilities-in-3-industrial-control-system-software","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/11\/cisa-warns-of-critical-vulnerabilities-in-3-industrial-control-system-software","title":{"rendered":"CISA Warns of Critical Vulnerabilities in 3 Industrial Control System Software"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/cisa-warns-of-critical-vulnerabilities-in-3-industrial-control-system-software.jpg\"><\/a><\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/11\/03\/cisa-releases-three-industrial-control-systems-advisories\" rel=\"noopener\" target=\"_blank\">published<\/a> three Industrial Control Systems (ICS) advisories about multiple vulnerabilities in software from ETIC Telecom, Nokia, and Delta Industrial Automation.<\/p>\n<p>Prominent among them is a set of three flaws affecting ETIC Telecom\u2019s Remote Access Server (RAS), which \u201ccould allow an attacker to obtain sensitive information and compromise the vulnerable device and other connected machines,\u201d CISA said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published three Industrial Control Systems (ICS) advisories about multiple vulnerabilities in software from ETIC Telecom, Nokia, and Delta Industrial Automation. Prominent among them is a set of three flaws affecting ETIC Telecom\u2019s Remote Access Server (RAS), which \u201ccould allow an attacker to obtain sensitive information and [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,6],"tags":[],"class_list":["post-149605","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/149605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=149605"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/149605\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=149605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=149605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=149605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}