On This Page
Department of Homeland Security
The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) works to reduce risks within and across all critical infrastructure sectors by partnering with law enforcement agencies and the intelligence community and coordinating efforts among Federal, state, local, and tribal governments and control systems owners, operators, and vendors. Additionally, ICS-CERT collaborates with international and private sector Computer Emergency Response Teams (CERTs) to share control systems-related security incidents and mitigation measures.
Control Systems Advisories and Reports
Alerts provide timely notification to critical infrastructure owners and operators concerning threats to critical infrastructure networks.
Advisories provide timely information about current security issues, vulnerabilities, and exploits.
We provide this newsletter as a service to personnel actively engaged in the protection of critical infrastructure assets.
|Joint Security Awareness Reports (JSARs)|
ICS-CERT coordinates with US-CERT and other partners to develop Joint Security Awareness Reports (JSARs) to provide situational awareness for the public on cybersecurity issues.
Technical Information Papers (TIPs), Annual Reports (Year in Review), and other products that ICS-CERT believes are of interest to persons engaged in protecting industrial control systems.
The Economist published a special cyber-security report on July 12, 2014. http://www.economist.com/sites/default/files/20140712_cyber-security.pdfTuesday, July 15, 2014 - 10:53
http://threatpost.com/new-oil-and-natural-gas-isac-launches/106902Wednesday, July 2, 2014 - 12:07
http://www.symantec.com/connect/blogs/dragonfly-western-energy-companies-under-sabotage-threatMonday, June 30, 2014 - 12:42
The Department of Homeland Security’s (DHS) Office of Cybersecurity & Communications (CS&C) conducts complimentary and voluntary assessments to evaluate operational resilience and cybersecurity capabilities within critical infrastructure sectors, as well as state, local, tribal, and territorial governments.Friday, May 30, 2014 - 12:35
Thursday, May 1, 2014 - 11:05
Morpho Itemiser 3 Hard-Coded Credential
This advisory provides vulnerability information for hard-coded credentials in the Morpho Itemiser 3.07/24/2014 - 12:44
Siemens SIMATIC WinCC Vulnerabilities
This advisory provides mitigation details for vulnerabilities in the Siemens SIMATIC WinCC application.07/24/2014 - 12:31
Siemens OpenSSL Vulnerabilities (Update A)
This updated advisory is a follow-up to the original advisory titled ICSA-14-198-03 Siemens OpenSSL Vulnerabilities that was published July 17, 2014, on the NCCIC/ICS-CERT web site. This updated advisory provides mitigation details for vulnerabilities in the Siemens OpenSSL cryptographic software library affecting several Siemens industrial products.07/23/2014 - 16:46
Sierra Wireless AirLink Raven X EV-DO Vulnerabilities (Update B)
This updated advisory is a follow-up to the advisory titled ICSA-14-007-01A Sierra Wireless AirLink Raven X EV-DO Multiple Vulnerabilities that was published January 16, 2014, on the NCCIC/ICS CERT web site.07/23/2014 - 16:14
Omron NS Series HMI Vulnerabilities
This advisory provides mitigation details for multiple vulnerabilities in Omron Corporation’s NS series human-machine interface (HMI) terminals.07/22/2014 - 15:34
Honeywell FALCON XLWeb Controllers Vulnerabilities
This advisory was originally posted to the US-CERT secure Portal library on June 24, 2014, and is being released to the NCCIC/ICS-CERT web site. This advisory provides mitigation details for vulnerabilities in Honeywell FALCON XLWeb controllers.07/22/2014 - 14:23
OleumTech WIO Family Vulnerabilities
This advisory provides vulnerability details in OleumTech’s WIO family including the sensors and the DH2 data collector.07/21/2014 - 16:45
Advantech WebAccess Vulnerabilities
This advisory provides mitigation details for vulnerabilities affecting the Advantech WebAccess application.07/17/2014 - 17:22
Cogent DataHub Code Injection Vulnerability
This advisory provides mitigation details for a code injection vulnerability affecting the Cogent DataHub application.07/17/2014 - 17:20
Yokogawa Centum Buffer Overflow Vulnerability
Researcher group Rapid7 has identified a buffer overflow vulnerability in Yokogawa CENTUM products. Yokogawa has produced a patch that mitigates this vulnerability. This vulnerability could be exploited remotely.07/08/2014 - 16:07