{"id":47233,"date":"2022-06-23T16:14:15","date_gmt":"2022-06-23T16:14:15","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33572\/CISA-Warns-Over-Software-Flaws-In-Industrial-Control-Systems.html"},"modified":"2022-06-23T16:14:15","modified_gmt":"2022-06-23T16:14:15","slug":"cisa-warns-over-software-flaws-in-industrial-control-systems","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/","title":{"rendered":"CISA Warns Over Software Flaws In Industrial Control Systems"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6b77a5fd197abe6efda06d9e56e53677cd45c912\/2022\/02\/16\/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d\/getty-hacker-hands-on-a-keyboard.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\" class=\"ff-og-image-inserted\"><\/div>\n<p>The US Cybersecurity and Infrastructure Agency (CISA) has warned organizations to check recently disclosed vulnerabilities affecting operational technology (OT) devices that should but aren&#8217;t always isolated from the internet.&nbsp;<\/p>\n<p>CISA has <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/current-activity\/2022\/06\/22\/cisa-releases-security-advisories-related-oticefall-insecure\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">released released five advisories<\/a> covering multiple vulnerabilities affecting industrial control systems discovered by researchers at Forescout.&nbsp;<\/p>\n<p>Forescout this week released its report &#8220;OT:ICEFALL&#8221;, which covers a set of common security issues in software for operational technology (OT) devices. The bugs they disclosed affect devices from Honeywell, Motorola, Siemens and others.&nbsp;<\/p>\n<p>OT is a subset of the Internet of Things (IoT). OT covers industrial control systems (ICS) that may be connected to the internet while the broader IoT category includes consumer items like TVs, doorbells, and routers.&nbsp;<\/p>\n<p>Forescout detailed the <a href=\"https:\/\/www.forescout.com\/blog\/ot-icefall-56-vulnerabilities-caused-by-insecure-by-design-practices-in-ot\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">56 vulnerabilities in a single report<\/a> to highlight these common problems.<\/p>\n<p>CISA has released five corresponding Industrial Controls Systems Advisories (ICSAs) which it said provide notice of the reported vulnerabilities and identify baseline mitigations for reducing risks to these and other cybersecurity attacks. &nbsp;<\/p>\n<p>The advisories include details of critical flaws affecting software from Japan&#8217;s JTEKT, three flaws affecting devices from US vendor Phoenix Contact, and one affecting products from German firm Siemens. &nbsp;<\/p>\n<p>The ICSA-22-172-02 advisory for <a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-172-02\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">JTEKT TOYOPUC<\/a> details missing authentication and privilege escalation flaws. These have a severity rating of 7-2 out of 10.<\/p>\n<p>Flaws affecting Phoenix devices are detailed in the advisories ICSA-22-172-03 for <a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-172-03\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Phoenix Contact Classic Line Controllers<\/a>; ICSA-22-172-04 for <a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-172-04\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Phoenix Contact ProConOS and MULTIPROG<\/a>; and ICSA-22-172-05 : <a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-172-05\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Phoenix Contact Classic Line Industrial Controllers<\/a>.&nbsp;<\/p>\n<p>The Siemens software with critical vulnerabilities are detailed in the advisory ICSA-22-172-06 for <a href=\"https:\/\/www.cisa.gov\/uscert\/ics\/advisories\/icsa-22-172-06\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Siemens WinCC OA<\/a>. It&#8217;s a remotely exploitable bug with a severity score of 9.8 out of 10.&nbsp;<\/p>\n<p>&#8220;Successful exploitation of this vulnerability could allow an attacker to impersonate other users or exploit the client-server protocol without being authenticated,&#8221; CISA notes.<\/p>\n<p>OT devices <a href=\"https:\/\/www.zdnet.com\/article\/not-as-complex-as-we-thought-cyberattacks-on-operational-technology-are-on-the-rise\/\" rel=\"follow\">should be air-gapped on a network but often they&#8217;re not<\/a>, giving sophisticated cyber attackers a broader canvass to penetrate. &nbsp;<\/p>\n<p>The 56 vulnerabilities identified by Forescount fell into four main categories, including insecure engineering protocols, weak cryptography or broken authentication schemes, insecure firmware updates, and remote code execution via native functionality.&nbsp;<\/p>\n<p>The firm published the vulnerabilities (CVEs) as a collection to illustrate that flaws in the supply of critical infrastructure hardware are a common problem. &nbsp;<\/p>\n<p>&#8220;With OT:ICEFALL, we wanted to disclose and provide a quantitative overview of OT insecure-by-design vulnerabilities rather than rely on the periodic bursts of CVEs for a single product or a small set of public, real-world incidents that are often brushed off as a particular vendor or asset owner being at fault,&#8221; <a href=\"https:\/\/www.forescout.com\/blog\/ot-icefall-56-vulnerabilities-caused-by-insecure-by-design-practices-in-ot\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Forescout said<\/a>.&nbsp;<\/p>\n<p>&#8220;The goal is to illustrate how the opaque and proprietary nature of these systems, the suboptimal vulnerability management surrounding them and the often-false sense of security offered by certifications significantly complicate OT risk management efforts,&#8221; it said.<\/p>\n<p>&nbsp;As firm <a href=\"https:\/\/www.forescout.com\/blog\/ot-icefall-56-vulnerabilities-caused-by-insecure-by-design-practices-in-ot\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">details in a blogpost<\/a>, there are some common faults that developers should be aware of:<\/p>\n<ul>\n<li><strong>Insecure-by-design vulnerabilities abound<\/strong>: More than a third of the vulnerabilities it found (38%) allow for compromise of credentials, with firmware manipulation coming in second (21%) and remote code execution coming third (14%).&nbsp;<\/li>\n<li><strong>Vulnerable products are often certified<\/strong>: 74% of the product families affected have some form of security certification and most issues it warns of should be discovered relatively quickly during in-depth vulnerability discovery. Factors contributing to this problem include limited scope for evaluations, opaque security definitions and focus on functional testing.<\/li>\n<li><strong>Risk management is complicated by the lack of CVEs<\/strong>: It is not enough to know that a device or protocol is insecure. To make informed risk management decisions, asset owners need to know how these components are insecure. Issues considered the result of insecurity by design have not always been assigned CVEs, so they often remain less visible and actionable than they ought to be.<\/li>\n<li><strong>There are insecure-by-design supply chain components<\/strong>: Vulnerabilities in OT supply chain components tend to not be reported by every affected manufacturer, which contributes to the difficulties of risk management.<\/li>\n<li><strong>Not all insecure designs are created equal<\/strong>: None of the systems analyzed support logic signing and most (52%) compile their logic to native machine code. 62% of those systems accept firmware downloads via Ethernet, while only 51% have authentication for this functionality.<\/li>\n<li><strong>Offensive capabilities are more feasible to develop than often imagined<\/strong>: Reverse engineering a single proprietary protocol took between 1 day and 2 weeks, while achieving the same for complex, multi-protocol systems took 5 to 6 months.&nbsp;<\/li>\n<\/ul>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33572\/CISA-Warns-Over-Software-Flaws-In-Industrial-Control-Systems.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10066],"class_list":["post-47233","post","type-post","status-publish","format-standard","hentry","category-packet-storm","tag-headlinegovernmentusaflawscada"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Warns Over Software Flaws In Industrial Control Systems 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Warns Over Software Flaws In Industrial Control Systems 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-23T16:14:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6b77a5fd197abe6efda06d9e56e53677cd45c912\/2022\/02\/16\/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d\/getty-hacker-hands-on-a-keyboard.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"CISA Warns Over Software Flaws In Industrial Control Systems\",\"datePublished\":\"2022-06-23T16:14:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/\"},\"wordCount\":763,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6b77a5fd197abe6efda06d9e56e53677cd45c912\\\/2022\\\/02\\\/16\\\/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d\\\/getty-hacker-hands-on-a-keyboard.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"keywords\":[\"headline,government,usa,flaw,scada\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/\",\"name\":\"CISA Warns Over Software Flaws In Industrial Control Systems 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6b77a5fd197abe6efda06d9e56e53677cd45c912\\\/2022\\\/02\\\/16\\\/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d\\\/getty-hacker-hands-on-a-keyboard.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"datePublished\":\"2022-06-23T16:14:15+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6b77a5fd197abe6efda06d9e56e53677cd45c912\\\/2022\\\/02\\\/16\\\/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d\\\/getty-hacker-hands-on-a-keyboard.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6b77a5fd197abe6efda06d9e56e53677cd45c912\\\/2022\\\/02\\\/16\\\/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d\\\/getty-hacker-hands-on-a-keyboard.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cisa-warns-over-software-flaws-in-industrial-control-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,flaw,scada\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusaflawscada\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CISA Warns Over Software Flaws In Industrial Control Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA Warns Over Software Flaws In Industrial Control Systems 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/","og_locale":"en_US","og_type":"article","og_title":"CISA Warns Over Software Flaws In Industrial Control Systems 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-06-23T16:14:15+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/6b77a5fd197abe6efda06d9e56e53677cd45c912\/2022\/02\/16\/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d\/getty-hacker-hands-on-a-keyboard.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"CISA Warns Over Software Flaws In Industrial Control Systems","datePublished":"2022-06-23T16:14:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/"},"wordCount":763,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6b77a5fd197abe6efda06d9e56e53677cd45c912\/2022\/02\/16\/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d\/getty-hacker-hands-on-a-keyboard.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","keywords":["headline,government,usa,flaw,scada"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/","url":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/","name":"CISA Warns Over Software Flaws In Industrial Control Systems 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6b77a5fd197abe6efda06d9e56e53677cd45c912\/2022\/02\/16\/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d\/getty-hacker-hands-on-a-keyboard.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","datePublished":"2022-06-23T16:14:15+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/6b77a5fd197abe6efda06d9e56e53677cd45c912\/2022\/02\/16\/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d\/getty-hacker-hands-on-a-keyboard.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6b77a5fd197abe6efda06d9e56e53677cd45c912\/2022\/02\/16\/dcea0eae-86e4-40d6-92c7-1f25e2d9ee0d\/getty-hacker-hands-on-a-keyboard.jpg?auto=webp&amp;fit=crop&amp;height=675&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cisa-warns-over-software-flaws-in-industrial-control-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,flaw,scada","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusaflawscada\/"},{"@type":"ListItem","position":3,"name":"CISA Warns Over Software Flaws In Industrial Control Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47233"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47233\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}