On This Page
Department of Homeland Security
The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) works to reduce risks within and across all critical infrastructure sectors by partnering with law enforcement agencies and the intelligence community and coordinating efforts among Federal, state, local, and tribal governments and control systems owners, operators, and vendors. Additionally, ICS-CERT collaborates with international and private sector Computer Emergency Response Teams (CERTs) to share control systems-related security incidents and mitigation measures.
Control Systems Advisories and Reports
Alerts provide timely notification to critical infrastructure owners and operators concerning threats to critical infrastructure networks.
Advisories provide timely information about current security issues, vulnerabilities, and exploits.
We provide this newsletter as a service to personnel actively engaged in the protection of critical infrastructure assets.
|Joint Security Awareness Reports (JSARs)|
ICS-CERT coordinates with US-CERT and other partners to develop Joint Security Awareness Reports (JSARs) to provide situational awareness for the public on cybersecurity issues.
Technical Information Papers (TIPs), Annual Reports (Year in Review), and other products that ICS-CERT believes are of interest to persons engaged in protecting industrial control systems.
Without updates after April 8 Windows XP is expected to fall prey to any number of zero-day attacks for which Microsoft will provide no defense, but there are some things die-hard XP users can do to make their machines safer.Thursday, March 6, 2014 - 11:29
Dramatic attacks can have simple beginnings, even when the target is a critical infrastructure company.Tuesday, March 4, 2014 - 09:45
Energy companies should create a new industry-led body to deflect cyber threats to the electric grid — from large generators to local distribution utilities, according to a new report co-authored by Ret. Gen. Michael Hayden, former CIA and National Security Agency director.Monday, March 3, 2014 - 08:36
The ICS-CERT "Year in Review 2013" is a compilation of ICS-CERT programmatic activities for the past year.Tuesday, February 25, 2014 - 10:19
The Department of Homeland Security (DHS) is expanding its role in helping the private sector protect networks and infrastructure from cyber attack. Under the program, DHS will provide assistance in implementing the Cybersecurity Framework, released on Feb. 12 by the National Institute of Standards and Technology.Tuesday, February 25, 2014 - 10:17
Schneider Electric Floating License Manager Vulnerability
This advisory provides mitigation details for an “unquoted service path” vulnerability in the Schneider Electric Floating License Manager.02/27/2014 - 11:07
Schneider Electric OFS Buffer Overflow Vulnerability
This advisory provides mitigation details for a Stack Buffer Overflow vulnerability supplied with the Schneider Electric OPC Factory Server (OSF).02/27/2014 - 11:03
Schneider Electric CitectSCADA Products Exception Handler Vulnerability (Update A)
This updated advisory is a follow-up to the original advisory titled ICSA-13-350-01 Schneider Electric SCADA Products Exception Handler Vulnerability that was published February 25, 2014, on the NCCIC/ICS-CERT web site. This advisory provides mitigation details for an exception handling vulnerability in the Schneider Electric CitectSCADA application.02/26/2014 - 18:13
ICS-CERT Year in Review 2013
02/24/2014 - 12:33
ICONICS GENESIS32 Insecure ActiveX Control
This advisory provides mitigation details for a vulnerability in the ICONICS GENESIS32 v8.x application.02/20/2014 - 16:51
Mitsubishi Electric Automation, Inc MC-WorX Suite Insecure ActiveX Control
This advisory provides mitigation details for an improper input validation vulnerability in the Mitsubishi Electric Automation, Inc MC-WorX Suite application version 8.02.02/20/2014 - 15:29
Siemens RuggedCom Uncontrolled Resource Consumption Vulnerability
This advisory provides mitigation details for an uncontrolled resource consumption vulnerability in the Siemens RuggedCom ROS-based devices.02/20/2014 - 14:23
NTP Reflection Attack
This advisory provides mitigation details for denial-of-service (DoS) attacks using Network Time Protocol (NTP) Reflection.02/20/2014 - 14:00
The NCCIC/ICS-CERT Monitor for October-December 2013 is a summary of NCCIC/ICS-CERT activities for the previous quarter.02/14/2014 - 16:22
MatrikonOPC Improper Input Validation
This advisory was originally posted to the US-CERT secure Portal library on January 10, 2014, and is now being released to the NCCIC/ICS-CERT web site. This advisory provides mitigation details for an improper input validation vulnerability in the MatrikonOPC SCADA DNP3 OPC Server application.02/11/2014 - 14:08